summaryrefslogtreecommitdiffstats
path: root/main/xen/xsa34-4.2.patch
diff options
context:
space:
mode:
authorWilliam Pitcock <nenolod@dereferenced.org>2013-06-01 16:12:19 -0500
committerWilliam Pitcock <nenolod@dereferenced.org>2013-06-01 16:12:19 -0500
commitd3978bf9dc42f00c8d05d8eac255f93ef154b503 (patch)
tree8c5f90ac44c52e8078202b45ce1e980081c59f10 /main/xen/xsa34-4.2.patch
parentf43d4be65d60aff92ecb0352209c4037ccc38d33 (diff)
downloadaports-d3978bf9dc42f00c8d05d8eac255f93ef154b503.tar.bz2
aports-d3978bf9dc42f00c8d05d8eac255f93ef154b503.tar.xz
main/xen: remove obsolete XSA patches.
Diffstat (limited to 'main/xen/xsa34-4.2.patch')
-rw-r--r--main/xen/xsa34-4.2.patch30
1 files changed, 0 insertions, 30 deletions
diff --git a/main/xen/xsa34-4.2.patch b/main/xen/xsa34-4.2.patch
deleted file mode 100644
index f5328eff9..000000000
--- a/main/xen/xsa34-4.2.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-x86_32: don't allow use of nested HVM
-
-There are (indirect) uses of map_domain_page() in the nested HVM code
-that are unsafe when not just using the 1:1 mapping.
-
-This is XSA-34 / CVE-2013-0151.
-
-Signed-off-by: Jan Beulich <jbeulich@suse.com>
-
---- a/xen/arch/x86/hvm/hvm.c
-+++ b/xen/arch/x86/hvm/hvm.c
-@@ -3926,6 +3926,10 @@ long do_hvm_op(unsigned long op, XEN_GUE
- rc = -EINVAL;
- break;
- case HVM_PARAM_NESTEDHVM:
-+#ifdef __i386__
-+ if ( a.value )
-+ rc = -EINVAL;
-+#else
- if ( a.value > 1 )
- rc = -EINVAL;
- if ( !is_hvm_domain(d) )
-@@ -3940,6 +3944,7 @@ long do_hvm_op(unsigned long op, XEN_GUE
- for_each_vcpu(d, v)
- if ( rc == 0 )
- rc = nestedhvm_vcpu_initialise(v);
-+#endif
- break;
- case HVM_PARAM_BUFIOREQ_EVTCHN:
- rc = -EINVAL;