M A Young writes ("Re: DRAFT XSA 142 - libxl fails to honour readonly flag on
disks with qemu-xen"):
> Of course you still need a separate patch for xen 4.5.1 and earlier as the
> xsa142.patch file attached is only valid for xen 4.6.0. Replacing
> ERROR_INVAL with NULL works for xen 4.5.1 and co
* DRAFT DRAFT DRAFT *
Xen Security Advisory XSA-142
libxl fails to honour readonly flag on disks with qemu-xen
ISSUE DESCRIPTION
=
Callers of libxl can specify that a disk should be read-only to the
guest. However, there is no code in libxl t
On Mon, 21 Sep 2015, Xen.org security team wrote:
> * DRAFT DRAFT DRAFT *
>
> Xen Security Advisory XSA-142
>
> ...
>
> xsa142.patch Xen 4.3.x and later
>
> $ sha256sum xsa142*.patch
> de0d6d19becac199037dce5a6a49e35cb7de5c99b8e2950600ed71fdc2d5a752
Ian Campbell writes ("Re: DRAFT XSA 142 - libxl fails to honour readonly flag
on disks with qemu-xen"):
> On Tue, 2015-09-15 at 16:22 +, Xen.org security team wrote:
> > VULNERABLE SYSTEMS
> > ==
> >
> [...]
> > Only systems using libxl or libxl-based toolstacks are vulnerable
* DRAFT DRAFT DRAFT *
Xen Security Advisory XSA-142
libxl fails to honour readonly flag on disks with qemu-xen
ISSUE DESCRIPTION
=
Callers of libxl can specify that a disk should be read-only to the
guest. However, there is no code in libxl t
On Tue, 2015-09-15 at 16:22 +, Xen.org security team wrote:
> VULNERABLE SYSTEMS
> ==
>
[...]
> Only systems using libxl or libxl-based toolstacks are vulnerable.
> (This includes libvirt with the libxl driver.)
^xl and ... ?
>
> All versions of libxl which
* DRAFT DRAFT DRAFT *
Xen Security Advisory XSA-142
libxl fails to honour readonly flag on disks with qemu-xen
ISSUE DESCRIPTION
=
Callers of libxl can specify that a disk should be read-only to the
guest. However, there is no code in libxl t