summaryrefslogtreecommitdiffstats
path: root/net/ipv4/xfrm4_mode_tunnel.c
diff options
context:
space:
mode:
authorJuergen Gross <jgross@suse.com>2016-12-22 08:19:46 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2017-11-30 08:39:15 +0000
commite8cee9ccac68b0ba8a14727d828b030a92a6acc6 (patch)
treed2049098534fdaeb5b176d16a9bd13cac5973da2 /net/ipv4/xfrm4_mode_tunnel.c
parent82040f5c1bba893cf1a257a250962beb90d4b152 (diff)
downloadlinux-stable-e8cee9ccac68b0ba8a14727d828b030a92a6acc6.tar.gz
linux-stable-e8cee9ccac68b0ba8a14727d828b030a92a6acc6.tar.bz2
linux-stable-e8cee9ccac68b0ba8a14727d828b030a92a6acc6.zip
xen: xenbus driver must not accept invalid transaction ids
[ Upstream commit 639b08810d6ad74ded2c5f6e233c4fcb9d147168 ] When accessing Xenstore in a transaction the user is specifying a transaction id which he normally obtained from Xenstore when starting the transaction. Xenstore is validating a transaction id against all known transaction ids of the connection the request came in. As all requests of a domain not being the one where Xenstore lives share one connection, validation of transaction ids of different users of Xenstore in that domain should be done by the kernel of that domain being the multiplexer between the Xenstore users in that domain and Xenstore. In order to prohibit one Xenstore user "hijacking" a transaction from another user the xenbus driver has to verify a given transaction id against all known transaction ids of the user before forwarding it to Xenstore. Signed-off-by: Juergen Gross <jgross@suse.com> Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com> Signed-off-by: Juergen Gross <jgross@suse.com> Signed-off-by: Sasha Levin <alexander.levin@verizon.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/ipv4/xfrm4_mode_tunnel.c')
0 files changed, 0 insertions, 0 deletions