qemu/hw/rdma/vmw
Yuval Shaia 7ba83d0ae4 [PATCH v3] hw/pvrdma: Protect against buggy or malicious guest driver
Message-Id: <20220403095234.2210-1-yuval.shaia.ml@gmail.com>
Bug-Debian: https://bugs.debian.org/1014589

Guest driver might execute HW commands when shared buffers are not yet
allocated.
This could happen on purpose (malicious guest) or because of some other
guest/host address mapping error.
We need to protect againts such case.

Fixes: CVE-2022-1050

Reported-by: Raven <wxhusst@gmail.com>
Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com>

Gbp-Pq: Name hw-pvrdma-protect-against-guest-driver-CVE-2022-1050.patch
Signed-off-by: Cong Liu <liucong2@kylinos.cn>
2022-11-09 22:24:24 +08:00
..
pvrdma.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
pvrdma_cmd.c [PATCH v3] hw/pvrdma: Protect against buggy or malicious guest driver 2022-11-09 22:24:24 +08:00
pvrdma_dev_ring.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
pvrdma_dev_ring.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
pvrdma_main.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
pvrdma_qp_ops.c New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
pvrdma_qp_ops.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
trace-events New upstream version 7.1.0 2022-11-03 14:19:34 +08:00
trace.h New upstream version 7.1.0 2022-11-03 14:19:34 +08:00