qemu/hw/rdma
Yuval Shaia 7ba83d0ae4 [PATCH v3] hw/pvrdma: Protect against buggy or malicious guest driver
Message-Id: <20220403095234.2210-1-yuval.shaia.ml@gmail.com>
Bug-Debian: https://bugs.debian.org/1014589

Guest driver might execute HW commands when shared buffers are not yet
allocated.
This could happen on purpose (malicious guest) or because of some other
guest/host address mapping error.
We need to protect againts such case.

Fixes: CVE-2022-1050

Reported-by: Raven <wxhusst@gmail.com>
Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com>

Gbp-Pq: Name hw-pvrdma-protect-against-guest-driver-CVE-2022-1050.patch
Signed-off-by: Cong Liu <liucong2@kylinos.cn>
2022-11-09 22:24:24 +08:00
..
vmw [PATCH v3] hw/pvrdma: Protect against buggy or malicious guest driver 2022-11-09 22:24:24 +08:00
Kconfig New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
meson.build New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_backend.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_backend.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_backend_defs.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_rm.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_rm.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_rm_defs.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_utils.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
rdma_utils.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
trace-events New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
trace.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00