summaryrefslogtreecommitdiffstats
path: root/main/xen/xsa34-4.2.patch
diff options
context:
space:
mode:
authorRoger Pau Monne <roger.pau@citrix.com>2013-01-22 16:40:46 +0100
committerNatanael Copa <ncopa@alpinelinux.org>2013-01-23 12:40:11 +0000
commit0c0b33191e243c3b0de1d0331e6bd5a107b61626 (patch)
tree2c1fbc59ffb8ea161a5a858d63a47c13bb7f50de /main/xen/xsa34-4.2.patch
parentd758f391c27452254702d582bc667bfa1af15aac (diff)
downloadaports-0c0b33191e243c3b0de1d0331e6bd5a107b61626.tar.bz2
aports-0c0b33191e243c3b0de1d0331e6bd5a107b61626.tar.xz
xen: XSA-34 and XSA-35
Security fixes for nested virtualization. This only apply to Xen 4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
Diffstat (limited to 'main/xen/xsa34-4.2.patch')
-rw-r--r--main/xen/xsa34-4.2.patch30
1 files changed, 30 insertions, 0 deletions
diff --git a/main/xen/xsa34-4.2.patch b/main/xen/xsa34-4.2.patch
new file mode 100644
index 000000000..f5328eff9
--- /dev/null
+++ b/main/xen/xsa34-4.2.patch
@@ -0,0 +1,30 @@
+x86_32: don't allow use of nested HVM
+
+There are (indirect) uses of map_domain_page() in the nested HVM code
+that are unsafe when not just using the 1:1 mapping.
+
+This is XSA-34 / CVE-2013-0151.
+
+Signed-off-by: Jan Beulich <jbeulich@suse.com>
+
+--- a/xen/arch/x86/hvm/hvm.c
++++ b/xen/arch/x86/hvm/hvm.c
+@@ -3926,6 +3926,10 @@ long do_hvm_op(unsigned long op, XEN_GUE
+ rc = -EINVAL;
+ break;
+ case HVM_PARAM_NESTEDHVM:
++#ifdef __i386__
++ if ( a.value )
++ rc = -EINVAL;
++#else
+ if ( a.value > 1 )
+ rc = -EINVAL;
+ if ( !is_hvm_domain(d) )
+@@ -3940,6 +3944,7 @@ long do_hvm_op(unsigned long op, XEN_GUE
+ for_each_vcpu(d, v)
+ if ( rc == 0 )
+ rc = nestedhvm_vcpu_initialise(v);
++#endif
+ break;
+ case HVM_PARAM_BUFIOREQ_EVTCHN:
+ rc = -EINVAL;