NACK/Cmnt: [PATCH 0/2] Xen Security Advisory 371 v3 (CVE-2021-28688) - Linux: blkback driver may leak persistent grants

Stefan Bader stefan.bader at canonical.com
Thu Apr 8 09:27:36 UTC 2021


On 01.04.21 18:08, Tim Gardner wrote:
> H/G/F/X are clean cherry-picks. Look at Bionic closely to make sure I got the backport correct
> as the code is a bit different.
> 
> [SRU Justification]
> 
> See [XSA 371](http://xenbits.xen.org/xsa/advisory-371.html). commit
> 871997bc9e423f05c7da7c9178e62dde5df2a7f8 ("xen-blkback: fix error handling in
> xen_blkbk_map()") introduced a security vulnerability.
> 
> Original Commit:
> 871997bc9e423f05c7da7c9178e62dde5df2a7f8 ("xen-blkback: fix error handling in xen_blkbk_map()")
> 
> New commit with security fix:
> a846738f8c3788d846ed1f587270d2f2e3d32432 ("xen-blkback: don't leak persistent grants from xen_blkbk_map()")
> 
> [Test Plan]
> none
> 
> [Where problems could occur]
> Unknown
> 
> [Other Info]
> - http://xenbits.xen.org/xsa/advisory-371.html
> - http://xenbits.xen.org/xsa/xsa371-linux.patch
> - http://xenbits.xen.org/xsa/advisory-365.html
> - http://xenbits.xen.org/xsa/xsa365-linux.patch
> 
> 
The cover email does not say which series this applies to and with plenty of 
NACKs for some of the series and the re-submission of Bionic this all becomes 
rather unclear. Please re-submit this for F/G(?), so it gets proper attention.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20210408/9f709b32/attachment.sig>


More information about the kernel-team mailing list