XEN_DOMCTL_gettscinfo (XSA-132) 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch - bnc#929339 - VUL-0: CVE-2015-3456: qemu kvm xen: VENOM qemu floppy driver host code execution CVE-2015-3456-xsa133-qemuu.patch CVE-2015-3456-xsa133-qemut.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=362
38 lines
1.3 KiB
Diff
38 lines
1.3 KiB
Diff
Subject: domctl/sysctl: don't leak hypervisor stack to toolstacks
|
|
From: Andrew Cooper andrew.cooper3@citrix.com Tue Apr 21 09:03:15 2015 +0200
|
|
Date: Tue Apr 21 09:03:15 2015 +0200:
|
|
Git: 4ff3449f0e9d175ceb9551d3f2aecb59273f639d
|
|
|
|
This is CVE-2015-3340 / XSA-132.
|
|
|
|
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
|
|
Reviewed-by: Jan Beulich <jbeulich@suse.com>
|
|
Acked-by: Ian Campbell <ian.campbell@citrix.com>
|
|
|
|
Index: xen-4.5.0-testing/xen/arch/x86/domctl.c
|
|
===================================================================
|
|
--- xen-4.5.0-testing.orig/xen/arch/x86/domctl.c
|
|
+++ xen-4.5.0-testing/xen/arch/x86/domctl.c
|
|
@@ -886,7 +886,7 @@ long arch_do_domctl(
|
|
|
|
case XEN_DOMCTL_gettscinfo:
|
|
{
|
|
- xen_guest_tsc_info_t info;
|
|
+ xen_guest_tsc_info_t info = { 0 };
|
|
|
|
domain_pause(d);
|
|
tsc_get_info(d, &info.tsc_mode,
|
|
Index: xen-4.5.0-testing/xen/common/sysctl.c
|
|
===================================================================
|
|
--- xen-4.5.0-testing.orig/xen/common/sysctl.c
|
|
+++ xen-4.5.0-testing/xen/common/sysctl.c
|
|
@@ -76,7 +76,7 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xe
|
|
case XEN_SYSCTL_getdomaininfolist:
|
|
{
|
|
struct domain *d;
|
|
- struct xen_domctl_getdomaininfo info;
|
|
+ struct xen_domctl_getdomaininfo info = { 0 };
|
|
u32 num_domains = 0;
|
|
|
|
rcu_read_lock(&domlist_read_lock);
|