You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
xen/netfront: force data bouncing when backend is untrusted
jira VULN-1439
cve CVE-2022-33741
commit-author Roger Pau Monne <[email protected]>
commit 4491001
upstream-diff Some merge conflicts were fixed up mainly due
to the fact that this version of the driver does
not have xdp support. The content of the added code
itself is identical to the upstream change with the
exception of PAGE_SIZE replacing XEN_PAGE_SIZE. In
this kernel there is no difference between the two
where as in future kernels the ARM kernel page size
might be 64k while the xen page size stays 4k.
Bounce all data on the skbs to be transmitted into zeroed pages if the
backend is untrusted. This avoids leaking data present in the pages
shared with the backend but not part of the skb fragments. This
requires introducing a new helper in order to allocate skbs with a
size multiple of XEN_PAGE_SIZE so we don't leak contiguous data on the
granted pages.
Reporting whether the backend is to be trusted can be done using a
module parameter, or from the xenstore frontend path as set by the
toolstack when adding the device.
This is CVE-2022-33741, part of XSA-403.
Signed-off-by: Roger Pau Monné <[email protected]>
Reviewed-by: Juergen Gross <[email protected]>
Signed-off-by: Juergen Gross <[email protected]>
(cherry picked from commit 4491001)
Signed-off-by: Brett Mastbergen <[email protected]>
0 commit comments