diff options
author | William Pitcock <nenolod@dereferenced.org> | 2013-06-01 16:12:19 -0500 |
---|---|---|
committer | William Pitcock <nenolod@dereferenced.org> | 2013-06-01 16:12:19 -0500 |
commit | d3978bf9dc42f00c8d05d8eac255f93ef154b503 (patch) | |
tree | 8c5f90ac44c52e8078202b45ce1e980081c59f10 /main/xen/xsa34-4.2.patch | |
parent | f43d4be65d60aff92ecb0352209c4037ccc38d33 (diff) | |
download | aports-d3978bf9dc42f00c8d05d8eac255f93ef154b503.tar.bz2 aports-d3978bf9dc42f00c8d05d8eac255f93ef154b503.tar.xz |
main/xen: remove obsolete XSA patches.
Diffstat (limited to 'main/xen/xsa34-4.2.patch')
-rw-r--r-- | main/xen/xsa34-4.2.patch | 30 |
1 files changed, 0 insertions, 30 deletions
diff --git a/main/xen/xsa34-4.2.patch b/main/xen/xsa34-4.2.patch deleted file mode 100644 index f5328eff9..000000000 --- a/main/xen/xsa34-4.2.patch +++ /dev/null @@ -1,30 +0,0 @@ -x86_32: don't allow use of nested HVM - -There are (indirect) uses of map_domain_page() in the nested HVM code -that are unsafe when not just using the 1:1 mapping. - -This is XSA-34 / CVE-2013-0151. - -Signed-off-by: Jan Beulich <jbeulich@suse.com> - ---- a/xen/arch/x86/hvm/hvm.c -+++ b/xen/arch/x86/hvm/hvm.c -@@ -3926,6 +3926,10 @@ long do_hvm_op(unsigned long op, XEN_GUE - rc = -EINVAL; - break; - case HVM_PARAM_NESTEDHVM: -+#ifdef __i386__ -+ if ( a.value ) -+ rc = -EINVAL; -+#else - if ( a.value > 1 ) - rc = -EINVAL; - if ( !is_hvm_domain(d) ) -@@ -3940,6 +3944,7 @@ long do_hvm_op(unsigned long op, XEN_GUE - for_each_vcpu(d, v) - if ( rc == 0 ) - rc = nestedhvm_vcpu_initialise(v); -+#endif - break; - case HVM_PARAM_BUFIOREQ_EVTCHN: - rc = -EINVAL; |