File 5535f633-dont-leak-hypervisor-stack-to-toolstacks.patch of Package xen.openSUSE_13.1_Update

# HG changeset patch
# User Andrew Cooper <andrew.cooper3@citrix.com>
# Date 1429601103 -7200
# Node ID 1ee3cf48d11d052c20289d2d0333666d8d8f719c
# Parent  e7824433c85b899c01fab5aa0c3027dedcdd0a3f
domctl/sysctl: don't leak hypervisor stack to toolstacks

This is CVE-2015-3340 / XSA-132.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
master commit: 4ff3449f0e9d175ceb9551d3f2aecb59273f639d
master date: 2015-04-21 09:03:15 +0200

Index: xen-4.3.4-testing/xen/arch/x86/domctl.c
===================================================================
--- xen-4.3.4-testing.orig/xen/arch/x86/domctl.c
+++ xen-4.3.4-testing/xen/arch/x86/domctl.c
@@ -939,7 +939,7 @@ long arch_do_domctl(
 
     case XEN_DOMCTL_gettscinfo:
     {
-        xen_guest_tsc_info_t info;
+        xen_guest_tsc_info_t info = { 0 };
 
         ret = -EINVAL;
         if ( d == current->domain ) /* no domain_pause() */
Index: xen-4.3.4-testing/xen/common/sysctl.c
===================================================================
--- xen-4.3.4-testing.orig/xen/common/sysctl.c
+++ xen-4.3.4-testing/xen/common/sysctl.c
@@ -76,7 +76,7 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xe
     case XEN_SYSCTL_getdomaininfolist:
     { 
         struct domain *d;
-        struct xen_domctl_getdomaininfo info;
+        struct xen_domctl_getdomaininfo info = { 0 };
         u32 num_domains = 0;
 
         rcu_read_lock(&domlist_read_lock);
openSUSE Build Service is sponsored by