Displaying 7 results from an estimated 7 matches for "xen_domctl_gettscinfo".
2015 May 02
2
Bug#784011: xen: CVE-2015-3340: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
...verity: normal
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for xen.
CVE-2015-3340[0]:
| Xen 4.2.x through 4.5.x does not initialize certain fields, which
| allows certain remote service domains to obtain sensitive information
| from memory via a (1) XEN_DOMCTL_gettscinfo or (2)
| XEN_SYSCTL_getdomaininfolist request.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2015-3340
[1] http://xenbits....
Bug#784011: Bug#784011: xen: CVE-2015-3340: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
2015 May 02
0
Bug#784011: Bug#784011: xen: CVE-2015-3340: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
On Sat, May 02, 2015 at 07:04:34AM +0200, Salvatore Bonaccorso wrote:
> the following vulnerability was published for xen.
I consider this issue as unimportant. Not sure how I can mark it this
way in the security tracker.
Bastian
--
Knowledge, sir, should be free to all!
-- Harry Mudd, "I, Mudd", stardate 4513.3
2015 Nov 05
0
Processed: closing 784011
Processing commands for control at bugs.debian.org:
> close 784011 4.5.1~rc1-1
Bug #784011 [src:xen] xen: CVE-2015-3340: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
Marked as fixed in versions xen/4.5.1~rc1-1.
Bug #784011 [src:xen] xen: CVE-2015-3340: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
Marked Bug as done
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
784011: http://bugs.debian.org/cgi-bin/bu...
2015 Jun 13
0
xen_4.1.4-3+deb7u8_amd64.changes ACCEPTED into oldstable-proposed-updates->oldstable-new
...l unintended writes to host MSI message data field via qemu
* CVE-2015-4104 (XSA 129)
- PCI MSI mask bits inadvertently exposed to guests
* CVE-2015-4105 (XSA 130)
- Guest triggerable qemu MSI-X pass-through error messages
* CVE-2015-3340 (XSA 132)
- Information leak through XEN_DOMCTL_gettscinfo
* CVE-2015-4106 (XSA 131)
- Unmediated PCI register access in qemu
Checksums-Sha1:
7a66247bea23a05bbfc9a3bb6bf43ff219eca919 3040 xen_4.1.4-3+deb7u8.dsc
0bd6b97bd76345a3f8f96a7bc120099234c34f18 253480 xen_4.1.4-3+deb7u8.debian.tar.gz
a8899780de513a402770976e97a46c3e4898da0c 1172400 xen...
2015 Jun 14
0
xen_4.1.4-3+deb7u8_amd64.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
...l unintended writes to host MSI message data field via qemu
* CVE-2015-4104 (XSA 129)
- PCI MSI mask bits inadvertently exposed to guests
* CVE-2015-4105 (XSA 130)
- Guest triggerable qemu MSI-X pass-through error messages
* CVE-2015-3340 (XSA 132)
- Information leak through XEN_DOMCTL_gettscinfo
* CVE-2015-4106 (XSA 131)
- Unmediated PCI register access in qemu
Checksums-Sha1:
7a66247bea23a05bbfc9a3bb6bf43ff219eca919 3040 xen_4.1.4-3+deb7u8.dsc
0bd6b97bd76345a3f8f96a7bc120099234c34f18 253480 xen_4.1.4-3+deb7u8.debian.tar.gz
a8899780de513a402770976e97a46c3e4898da0c 1172400 xen...
2012 Sep 04
2
[PATCH] valgrind: Support for ioctls used by Xen toolstack processes.
...;u._union._field))
+#define PRE_XEN_DOMCTL_READ(_domctl, _field) \
+ __PRE_XEN_DOMCTL_READ(_domctl, _domctl, _field)
+
+ switch (domctl->cmd) {
+ case XEN_DOMCTL_destroydomain:
+ case XEN_DOMCTL_pausedomain:
+ case XEN_DOMCTL_max_vcpus:
+ case XEN_DOMCTL_get_address_size:
+ case XEN_DOMCTL_gettscinfo:
+ case XEN_DOMCTL_getdomaininfo:
+ case XEN_DOMCTL_unpausedomain:
+ /* No input fields. */
+ break;
+
+ case XEN_DOMCTL_createdomain:
+ PRE_XEN_DOMCTL_READ(createdomain, ssidref);
+ PRE_XEN_DOMCTL_READ(createdomain, handle);
+ PRE_XEN_DOMCTL_READ(createdomain, flags)...
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH