Skip to content

Commit 307c8de

Browse files
roygerjgross1
authored andcommitted
xen/netfront: fix leaking data in shared pages
When allocating pages to be used for shared communication with the backend always zero them, this avoids leaking unintended data present on the pages. This is CVE-2022-33740, part of XSA-403. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Juergen Gross <jgross@suse.com> Signed-off-by: Juergen Gross <jgross@suse.com>
1 parent 2f446ff commit 307c8de

1 file changed

Lines changed: 2 additions & 1 deletion

File tree

drivers/net/xen-netfront.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,8 @@ static struct sk_buff *xennet_alloc_one_rx_buffer(struct netfront_queue *queue)
271271
if (unlikely(!skb))
272272
return NULL;
273273

274-
page = page_pool_dev_alloc_pages(queue->page_pool);
274+
page = page_pool_alloc_pages(queue->page_pool,
275+
GFP_ATOMIC | __GFP_NOWARN | __GFP_ZERO);
275276
if (unlikely(!page)) {
276277
kfree_skb(skb);
277278
return NULL;

0 commit comments

Comments
 (0)