summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'app-emulation/xen')
-rw-r--r--app-emulation/xen/Manifest3
-rw-r--r--app-emulation/xen/files/xen-4-CVE-2012-5634-XSA-33.patch18
-rw-r--r--app-emulation/xen/files/xen-4-CVE-2013-0151-XSA-34_35.patch70
-rw-r--r--app-emulation/xen/files/xen-4-CVE-2013-0154-XSA-37.patch23
-rw-r--r--app-emulation/xen/xen-4.2.2.ebuild (renamed from app-emulation/xen/xen-4.2.1-r2.ebuild)9
5 files changed, 3 insertions, 120 deletions
diff --git a/app-emulation/xen/Manifest b/app-emulation/xen/Manifest
index ddf30d9..44e619d 100644
--- a/app-emulation/xen/Manifest
+++ b/app-emulation/xen/Manifest
@@ -1,2 +1 @@
-DIST xen-4.2.0.tar.gz 15587687 SHA256 43f4a086e4e0330145a27b7ace8365c42b5afbc95cefadafe067be91bd3e5cfb SHA512 4fb56c79d722fb307bc657f16d02079c6636427e7650c4354193632d38d2d1db8e588f844ff0ca6e757c108ed639a528565ec9fc7c00bb4d5b6fbc9d122d8a70 WHIRLPOOL 369a109375864cb61920b56cf501522051d28513e738f0fd0e7b76244c3e08a8a0a6ff6cf245872d9bbd9c0f22c7da76c9cbc0f852bad6108ca25fd42dc677c0
-DIST xen-4.2.1.tar.gz 15593695 SHA256 fb8df5827ce3e2d2d3b078d9e5afde502beb5e7ab9442e51a94087061bd450c6 SHA512 fe27a965e2b34035bd025482eda9fc4d4e82523c929323fd30813367d5ffbe2fa1ed3d7d4479f2632e8b5625972448b7bd6a7768e8dc1dcd1b6747d281cc1a9e WHIRLPOOL 226bbed059541e804f1a44e721023ffbc04bae43000653b1d7d6a9bfec0d9efbf7a48b1b0a7ad3fcb8e34f8b91e1c620c2a8eddf97baad487e9db37d49a58f37
+DIST xen-4.2.2.tar.gz 15602746 SHA256 c9bfe91a5e72f8545acebad9889d64368020359bfe18044c0e683133e55ae005 SHA512 4943b18016ed8c2b194a3b55e6655b3b734b39ffb8cb7ee0a0580f2f4460a1d0e92e1de8ac23f5186272914fad1650586af51fd7c3644d0310eb16f2e11c5e80 WHIRLPOOL 519eb87cb2da694696cbc3e72070a0a3bdb07c46fa266d855d8379eec3a92adfa4d434af3ac01c37834ce4a9174081a6c40030b185a70902329b185cb8d0bbea
diff --git a/app-emulation/xen/files/xen-4-CVE-2012-5634-XSA-33.patch b/app-emulation/xen/files/xen-4-CVE-2012-5634-XSA-33.patch
deleted file mode 100644
index 20342ec..0000000
--- a/app-emulation/xen/files/xen-4-CVE-2012-5634-XSA-33.patch
+++ /dev/null
@@ -1,18 +0,0 @@
-VT-d: fix interrupt remapping source validation for devices behind legacy bridges
-Using SVT_VERIFY_BUS here doesn't make sense;
-
-native Linux also uses SVT_VERIFY_SID_SQ here instead.
-This is XSA-33 / CVE-2012-5634.
-Signed-off-by: Jan Beulich <jbeulich@suse.com>
-
---- xen/drivers/passthrough/vtd/intremap.c
-+++ xen/drivers/passthrough/vtd/intremap.c
-@@ -466,7 +466,7 @@ static void set_msi_source_id(struct pci_dev *pdev, struct iremap_entry *ire)
- set_ire_sid(ire, SVT_VERIFY_BUS, SQ_ALL_16,
- (bus << 8) | pdev->bus);
- else if ( pdev_type(seg, bus, devfn) == DEV_TYPE_LEGACY_PCI_BRIDGE )
-- set_ire_sid(ire, SVT_VERIFY_BUS, SQ_ALL_16,
-+ set_ire_sid(ire, SVT_VERIFY_SID_SQ, SQ_ALL_16,
- PCI_BDF2(bus, devfn));
- }
- break;
diff --git a/app-emulation/xen/files/xen-4-CVE-2013-0151-XSA-34_35.patch b/app-emulation/xen/files/xen-4-CVE-2013-0151-XSA-34_35.patch
deleted file mode 100644
index f074fa6..0000000
--- a/app-emulation/xen/files/xen-4-CVE-2013-0151-XSA-34_35.patch
+++ /dev/null
@@ -1,70 +0,0 @@
-commit 66141b2e068fa39f28bdda6be05882e323663687
-Author: Michael Young
-Date: Tue Jan 22 22:22:10 2013 +0000
-
- Security fix from nested virtualization CVE-2013-0151,
- restore status option to xend which is used by libvirt
-#diff --git a/xsa34-4.2.patch b/xsa34-4.2.patch
-#new file mode 100644
-#index 0000000..f5328ef
-#--- /dev/null
-#+++ xsa34-4.2.patch
-#@@ -0,0 +1,30 @@
-#+x86_32: don't allow use of nested HVM
-#+
-#+There are (indirect) uses of map_domain_page() in the nested HVM code
-#+that are unsafe when not just using the 1:1 mapping.
-#+
-#+This is XSA-34 / CVE-2013-0151.
-#+
-#+Signed-off-by: Jan Beulich
-#+
-#diff --git a/xsa35-4.2-with-xsa34.patch b/xsa35-4.2-with-xsa34.patch
-#new file mode 100644
-#index 0000000..28c6171
-#--- /dev/null
-#+++ xsa35-4.2-with-xsa34.patch
-#@@ -0,0 +1,24 @@
-#+xen: Do not allow guests to enable nested HVM on themselves
-#+
-#+There is no reason for this and doing so exposes a memory leak to
-#+guests. Only toolstacks need write access to this HVM param.
-#+
-#+This is XSA-35 / CVE-2013-0152.
-#+
-#+Signed-off-by: Ian Campbell
-#+Acked-by: Jan Beulich
-#+
---- xen/arch/x86/hvm/hvm.c
-+++ xen/arch/x86/hvm/hvm.c
-@@ -3858,6 +3858,11 @@
- rc = -EINVAL;
- break;
- case HVM_PARAM_NESTEDHVM:
-+ if ( !IS_PRIV(current->domain) )
-+ {
-+ rc = -EPERM;
-+ break;
-+ }
- if ( a.value > 1 )
- rc = -EINVAL;
- if ( !is_hvm_domain(d) )
-@@ -3926,6 +3926,10 @@ long do_hvm_op(unsigned long op, XEN_GUE
- rc = -EINVAL;
- break;
- case HVM_PARAM_NESTEDHVM:
-+#ifdef __i386__
-+ if ( a.value )
-+ rc = -EINVAL;
-+#else
- if ( a.value > 1 )
- rc = -EINVAL;
- if ( !is_hvm_domain(d) )
-@@ -3940,6 +3944,7 @@ long do_hvm_op(unsigned long op, XEN_GUE
- for_each_vcpu(d, v)
- if ( rc == 0 )
- rc = nestedhvm_vcpu_initialise(v);
-+#endif
- break;
- case HVM_PARAM_BUFIOREQ_EVTCHN:
- rc = -EINVAL;
diff --git a/app-emulation/xen/files/xen-4-CVE-2013-0154-XSA-37.patch b/app-emulation/xen/files/xen-4-CVE-2013-0154-XSA-37.patch
deleted file mode 100644
index bb43acd..0000000
--- a/app-emulation/xen/files/xen-4-CVE-2013-0154-XSA-37.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-x86: fix assertion in get_page_type()
-
-c/s 22998:e9fab50d7b61 (and immediately following ones) made it
-possible that __get_page_type() returns other than -EINVAL, in
-particular -EBUSY. Consequently, the assertion in get_page_type()
-should check for only the return values we absolutely don't expect to
-see there.
-
-This is XSA-37 / CVE-2013-0154.
-
-Signed-off-by: Jan Beulich <jbeulich@suse.com>
-
---- xen/arch/x86/mm.c
-+++ xen/arch/x86/mm.c
-@@ -2586,7 +2586,7 @@ int get_page_type(struct page_info *page
- int rc = __get_page_type(page, type, 0);
- if ( likely(rc == 0) )
- return 1;
-- ASSERT(rc == -EINVAL);
-+ ASSERT(rc != -EINTR && rc != -EAGAIN);
- return 0;
- }
-
diff --git a/app-emulation/xen/xen-4.2.1-r2.ebuild b/app-emulation/xen/xen-4.2.2.ebuild
index b7951e9..ad8588b 100644
--- a/app-emulation/xen/xen-4.2.1-r2.ebuild
+++ b/app-emulation/xen/xen-4.2.2.ebuild
@@ -67,8 +67,8 @@ src_prepare() {
if use efi; then
epatch "${FILESDIR}"/${PN}-4.2-efi.patch
- export EFI_VENDOR="gentoo"
- export EFI_MOUNTPOINT="boot"
+ export EFI_VENDOR="${EFI_VENDOR:-gentoo}"
+ export EFI_MOUNTPOINT="${EFI_MOUNTPOINT:-boot}"
fi
# if the user *really* wants to use their own custom-cflags, let them
@@ -86,11 +86,6 @@ src_prepare() {
# not strictly necessary to fix this
sed -i 's/, "-Werror"//' "${S}/tools/python/setup.py" || die "failed to re-set setup.py"
-
- #Security patches
- epatch "${FILESDIR}"/${PN}-4-CVE-2012-5634-XSA-33.patch \
- "${FILESDIR}"/${PN}-4-CVE-2013-0151-XSA-34_35.patch \
- "${FILESDIR}"/${PN}-4-CVE-2013-0154-XSA-37.patch
}
src_configure() {