diff options
author | Roger Pau Monne <roger.pau@citrix.com> | 2022-04-06 18:38:04 +0300 |
---|---|---|
committer | Juergen Gross <jgross@suse.com> | 2022-07-01 11:00:14 +0300 |
commit | 307c8de2b02344805ebead3440d8feed28f2f010 (patch) | |
tree | 528e53d9d27eea583793dd2a9c7e7057c3e8ebd7 /drivers/net/xen-netfront.c | |
parent | 2f446ffe9d737e9a844b97887919c4fda18246e7 (diff) | |
download | linux-307c8de2b02344805ebead3440d8feed28f2f010.tar.xz |
xen/netfront: fix leaking data in shared pages
When allocating pages to be used for shared communication with the
backend always zero them, this avoids leaking unintended data present
on the pages.
This is CVE-2022-33740, part of XSA-403.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
Diffstat (limited to 'drivers/net/xen-netfront.c')
-rw-r--r-- | drivers/net/xen-netfront.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c index 8c0b9546d5a2..e3165139629d 100644 --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -271,7 +271,8 @@ static struct sk_buff *xennet_alloc_one_rx_buffer(struct netfront_queue *queue) if (unlikely(!skb)) return NULL; - page = page_pool_dev_alloc_pages(queue->page_pool); + page = page_pool_alloc_pages(queue->page_pool, + GFP_ATOMIC | __GFP_NOWARN | __GFP_ZERO); if (unlikely(!page)) { kfree_skb(skb); return NULL; |