From a824d445bbe2abb22ca2362898b7e72054639120 Mon Sep 17 00:00:00 2001 From: Natanael Copa Date: Fri, 15 May 2015 11:20:29 +0000 Subject: main/xen: upgrade to 4.5 --- main/xen/xsa132.patch | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 main/xen/xsa132.patch (limited to 'main/xen/xsa132.patch') diff --git a/main/xen/xsa132.patch b/main/xen/xsa132.patch new file mode 100644 index 000000000..321c87bf6 --- /dev/null +++ b/main/xen/xsa132.patch @@ -0,0 +1,29 @@ +domctl/sysctl: don't leak hypervisor stack to toolstacks + +This is XSA-132. + +Signed-off-by: Andrew Cooper +Reviewed-by: Jan Beulich + +--- a/xen/arch/x86/domctl.c ++++ b/xen/arch/x86/domctl.c +@@ -884,7 +884,7 @@ long arch_do_domctl( + + case XEN_DOMCTL_gettscinfo: + { +- xen_guest_tsc_info_t info; ++ xen_guest_tsc_info_t info = { 0 }; + + ret = -EINVAL; + if ( d == current->domain ) /* no domain_pause() */ +--- a/xen/common/sysctl.c ++++ b/xen/common/sysctl.c +@@ -76,7 +76,7 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xe + case XEN_SYSCTL_getdomaininfolist: + { + struct domain *d; +- struct xen_domctl_getdomaininfo info; ++ struct xen_domctl_getdomaininfo info = { 0 }; + u32 num_domains = 0; + + rcu_read_lock(&domlist_read_lock); -- cgit v1.2.3