Skip to content

Commit 307c8de

Browse files
roygerjgross1
authored andcommitted
xen/netfront: fix leaking data in shared pages
When allocating pages to be used for shared communication with the backend always zero them, this avoids leaking unintended data present on the pages. This is CVE-2022-33740, part of XSA-403. Signed-off-by: Roger Pau Monné <roger.pau@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Juergen Gross <jgross@suse.com> Signed-off-by: Juergen Gross <jgross@suse.com>
1 parent 2f446ff commit 307c8de

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

drivers/net/xen-netfront.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,8 @@ static struct sk_buff *xennet_alloc_one_rx_buffer(struct netfront_queue *queue)
271271
if (unlikely(!skb))
272272
return NULL;
273273

274-
page = page_pool_dev_alloc_pages(queue->page_pool);
274+
page = page_pool_alloc_pages(queue->page_pool,
275+
GFP_ATOMIC | __GFP_NOWARN | __GFP_ZERO);
275276
if (unlikely(!page)) {
276277
kfree_skb(skb);
277278
return NULL;

0 commit comments

Comments
 (0)