diff options
author | Roger Pau Monne <roger.pau@citrix.com> | 2013-01-22 16:40:46 +0100 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2013-01-23 12:40:11 +0000 |
commit | 0c0b33191e243c3b0de1d0331e6bd5a107b61626 (patch) | |
tree | 2c1fbc59ffb8ea161a5a858d63a47c13bb7f50de /main/xen/xsa34-4.2.patch | |
parent | d758f391c27452254702d582bc667bfa1af15aac (diff) | |
download | aports-0c0b33191e243c3b0de1d0331e6bd5a107b61626.tar.bz2 aports-0c0b33191e243c3b0de1d0331e6bd5a107b61626.tar.xz |
xen: XSA-34 and XSA-35
Security fixes for nested virtualization. This only apply to Xen
4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
Diffstat (limited to 'main/xen/xsa34-4.2.patch')
-rw-r--r-- | main/xen/xsa34-4.2.patch | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/main/xen/xsa34-4.2.patch b/main/xen/xsa34-4.2.patch new file mode 100644 index 000000000..f5328eff9 --- /dev/null +++ b/main/xen/xsa34-4.2.patch @@ -0,0 +1,30 @@ +x86_32: don't allow use of nested HVM + +There are (indirect) uses of map_domain_page() in the nested HVM code +that are unsafe when not just using the 1:1 mapping. + +This is XSA-34 / CVE-2013-0151. + +Signed-off-by: Jan Beulich <jbeulich@suse.com> + +--- a/xen/arch/x86/hvm/hvm.c ++++ b/xen/arch/x86/hvm/hvm.c +@@ -3926,6 +3926,10 @@ long do_hvm_op(unsigned long op, XEN_GUE + rc = -EINVAL; + break; + case HVM_PARAM_NESTEDHVM: ++#ifdef __i386__ ++ if ( a.value ) ++ rc = -EINVAL; ++#else + if ( a.value > 1 ) + rc = -EINVAL; + if ( !is_hvm_domain(d) ) +@@ -3940,6 +3944,7 @@ long do_hvm_op(unsigned long op, XEN_GUE + for_each_vcpu(d, v) + if ( rc == 0 ) + rc = nestedhvm_vcpu_initialise(v); ++#endif + break; + case HVM_PARAM_BUFIOREQ_EVTCHN: + rc = -EINVAL; |