All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes
@ 2020-11-21 12:42 Peter Korsgaard
  2020-11-22 14:31 ` Peter Korsgaard
  2020-12-08  9:59 ` Peter Korsgaard
  0 siblings, 2 replies; 3+ messages in thread
From: Peter Korsgaard @ 2020-11-21 12:42 UTC (permalink / raw)
  To: buildroot

Fixes the following security issues:

- XSA-333: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
  (CVE-2020-25602)
  https://xenbits.xenproject.org/xsa/advisory-333.html

- XSA-334: Missing unlock in XENMEM_acquire_resource error path
  (CVE-2020-25598)
  https://xenbits.xenproject.org/xsa/advisory-334.html

- XSA-336: race when migrating timers between x86 HVM vCPU-s
  (CVE-2020-25604)
  https://xenbits.xenproject.org/xsa/advisory-336.html

- XSA-337: PCI passthrough code reading back hardware registers
  (CVE-2020-25595)
  https://xenbits.xenproject.org/xsa/advisory-337.html

- XSA-338: once valid event channels may not turn invalid (CVE-2020-25597)
  https://xenbits.xenproject.org/xsa/advisory-338.html

- XSA-339: x86 pv guest kernel DoS via SYSENTER (CVE-2020-25596)
  https://xenbits.xenproject.org/xsa/advisory-339.html

- XSA-340: Missing memory barriers when accessing/allocating an event
  channel (CVE-2020-25603)
  https://xenbits.xenproject.org/xsa/advisory-340.html

- XSA-342: out of bounds event channels available to 32-bit x86 domains
  (CVE-2020-25600)
  https://xenbits.xenproject.org/xsa/advisory-342.html

- XSA-343: races with evtchn_reset() (CVE-2020-25599)
  https://xenbits.xenproject.org/xsa/advisory-343.html

- XSA-344: lack of preemption in evtchn_reset() / evtchn_destroy()
  (CVE-2020-25601)
  https://xenbits.xenproject.org/xsa/advisory-344.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/xen/xen.hash | 24 ++++++++++++++++++++++++
 package/xen/xen.mk   | 37 +++++++++++++++++++++++++++++++++++++
 2 files changed, 61 insertions(+)

diff --git a/package/xen/xen.hash b/package/xen/xen.hash
index 709eeb3d45..eb5b18b416 100644
--- a/package/xen/xen.hash
+++ b/package/xen/xen.hash
@@ -1,3 +1,27 @@
 # Locally computed
 sha256  06839f68ea7620669dbe8b67861213223cc2a7d02ced61b56e5249c50e87f035  xen-4.14.0.tar.gz
 sha256  ecca9538e9d3f7e3c2bff827502f4495e2ef9e22c451298696ea08886b176c2c  COPYING
+# https://xenbits.xenproject.org/xsa/advisory-333.html
+sha256  8edec914fbdf036fba8cb54a75d3a9b025fac936e0af35512954a2dc2b12a26f  xsa333.patch
+# https://xenbits.xenproject.org/xsa/advisory-334.html
+sha256  323cd9d24b2e95643833865a9943172c56edd25dfd170e4741034d28dfd0d4bd  xsa334.patch
+# https://xenbits.xenproject.org/xsa/advisory-336.html
+sha256  ecb59876fb92cfe0916ed5f3227a30efe038224c1f6ec36bc3706c4e2214552c  xsa336.patch
+# https://xenbits.xenproject.org/xsa/advisory-337.html
+sha256  98c48781dd46bf6ff6cc46246c6c9f2e2be6ec696c0e7918d4b82845588ce04e  xsa337-1.patch
+sha256  9e8ae24222371379f2ea62e14fcc7f7282e01c356dff230c22c9ab1d2fb941e2  xsa337-2.patch
+# https://xenbits.xenproject.org/xsa/advisory-338.html
+sha256  7345eac1cbad23b082523e9cbd0331f8a9f16c6e459fb2a686606253f5514c9b  xsa338.patch
+# https://xenbits.xenproject.org/xsa/advisory-339.html
+sha256  b6ffa7671d905aa12498ad64915be3b7cba74ce1c5bf6bce18b1f106ebf6d715  xsa339.patch
+# https://xenbits.xenproject.org/xsa/advisory-340.html
+sha256  2bb088fcc1f8f79bf5ddb7b4e101cb1db76a343d2fb1cdafb7cd54612e4009da  xsa340.patch
+# https://xenbits.xenproject.org/xsa/advisory-342.html
+sha256  060caee3fb5971fca0f2fbdef622c52d9bc6e0ed9efad33de5b6b504651c2112  xsa342.patch
+# https://xenbits.xenproject.org/xsa/advisory-343.html
+sha256  d714a542bae9d96b6a061c5a8f754549d699dcfb7bf2a766b721f6bbe33aefd2  xsa343-1.patch
+sha256  657c44c8ea13523d2e59776531237bbc20166c9b7c3960e0e9ad381fce927344  xsa343-2.patch
+sha256  2b275e3fa559167c1b59e6fd4a20bc4d1df9d9cb0cbd0050a3db9c3d0299b233  xsa343-3.patch
+# https://xenbits.xenproject.org/xsa/advisory-344.html
+sha256  5f9dbdc48bed502d614a76e5819afa41a72cec603c5a2c9491d73873a991a5ed  xsa344-1.patch
+sha256  381ca5c51bc120bfd5c742be3988f570abb870c4b75c8a48cf49ae4fa1046d73  xsa344-2.patch
diff --git a/package/xen/xen.mk b/package/xen/xen.mk
index 8cbe532d2b..0c3ecbb909 100644
--- a/package/xen/xen.mk
+++ b/package/xen/xen.mk
@@ -6,6 +6,43 @@
 
 XEN_VERSION = 4.14.0
 XEN_SITE = https://downloads.xenproject.org/release/xen/$(XEN_VERSION)
+XEN_PATCH = \
+	https://xenbits.xenproject.org/xsa/xsa333.patch \
+	https://xenbits.xenproject.org/xsa/xsa334.patch \
+	https://xenbits.xenproject.org/xsa/xsa336.patch \
+	https://xenbits.xenproject.org/xsa/xsa337/xsa337-1.patch \
+	https://xenbits.xenproject.org/xsa/xsa337/xsa337-2.patch \
+	https://xenbits.xenproject.org/xsa/xsa338.patch \
+	https://xenbits.xenproject.org/xsa/xsa339.patch \
+	https://xenbits.xenproject.org/xsa/xsa340.patch \
+	https://xenbits.xenproject.org/xsa/xsa342.patch \
+	https://xenbits.xenproject.org/xsa/xsa343/xsa343-1.patch \
+	https://xenbits.xenproject.org/xsa/xsa343/xsa343-2.patch \
+	https://xenbits.xenproject.org/xsa/xsa343/xsa343-3.patch \
+	https://xenbits.xenproject.org/xsa/xsa344/xsa344-1.patch \
+	https://xenbits.xenproject.org/xsa/xsa344/xsa344-2.patch
+
+# xsa333.patch
+XEN_IGNORE_CVES += CVE-2020-25602
+# xsa334.patch
+XEN_IGNORE_CVES += CVE-2020-25598
+# xsa336.patch
+XEN_IGNORE_CVES += CVE-2020-25604
+# xsa337-1.patch, xsa337-2.patch
+XEN_IGNORE_CVES += CVE-2020-25595
+# xsa338.patch
+XEN_IGNORE_CVES += CVE-2020-25597
+# xsa339.patch
+XEN_IGNORE_CVES += CVE-2020-25596
+# xsa340.patch
+XEN_IGNORE_CVES += CVE-2020-25603
+# xsa342.patch
+XEN_IGNORE_CVES += CVE-2020-25600
+# xsa343-1.patch, xsa-343-2.patch, xsa-343-3.patch
+XEN_IGNORE_CVES += CVE-2020-25599
+# xsa344-1.patch, xsa344-2.patch
+XEN_IGNORE_CVES += CVE-2020-25601
+
 XEN_LICENSE = GPL-2.0
 XEN_LICENSE_FILES = COPYING
 XEN_DEPENDENCIES = host-acpica host-python3
-- 
2.20.1

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes
  2020-11-21 12:42 [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes Peter Korsgaard
@ 2020-11-22 14:31 ` Peter Korsgaard
  2020-12-08  9:59 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2020-11-22 14:31 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > - XSA-333: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
 >   (CVE-2020-25602)
 >   https://xenbits.xenproject.org/xsa/advisory-333.html

 > - XSA-334: Missing unlock in XENMEM_acquire_resource error path
 >   (CVE-2020-25598)
 >   https://xenbits.xenproject.org/xsa/advisory-334.html

 > - XSA-336: race when migrating timers between x86 HVM vCPU-s
 >   (CVE-2020-25604)
 >   https://xenbits.xenproject.org/xsa/advisory-336.html

 > - XSA-337: PCI passthrough code reading back hardware registers
 >   (CVE-2020-25595)
 >   https://xenbits.xenproject.org/xsa/advisory-337.html

 > - XSA-338: once valid event channels may not turn invalid (CVE-2020-25597)
 >   https://xenbits.xenproject.org/xsa/advisory-338.html

 > - XSA-339: x86 pv guest kernel DoS via SYSENTER (CVE-2020-25596)
 >   https://xenbits.xenproject.org/xsa/advisory-339.html

 > - XSA-340: Missing memory barriers when accessing/allocating an event
 >   channel (CVE-2020-25603)
 >   https://xenbits.xenproject.org/xsa/advisory-340.html

 > - XSA-342: out of bounds event channels available to 32-bit x86 domains
 >   (CVE-2020-25600)
 >   https://xenbits.xenproject.org/xsa/advisory-342.html

 > - XSA-343: races with evtchn_reset() (CVE-2020-25599)
 >   https://xenbits.xenproject.org/xsa/advisory-343.html

 > - XSA-344: lack of preemption in evtchn_reset() / evtchn_destroy()
 >   (CVE-2020-25601)
 >   https://xenbits.xenproject.org/xsa/advisory-344.html

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes
  2020-11-21 12:42 [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes Peter Korsgaard
  2020-11-22 14:31 ` Peter Korsgaard
@ 2020-12-08  9:59 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2020-12-08  9:59 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes the following security issues:
 > - XSA-333: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
 >   (CVE-2020-25602)
 >   https://xenbits.xenproject.org/xsa/advisory-333.html

 > - XSA-334: Missing unlock in XENMEM_acquire_resource error path
 >   (CVE-2020-25598)
 >   https://xenbits.xenproject.org/xsa/advisory-334.html

 > - XSA-336: race when migrating timers between x86 HVM vCPU-s
 >   (CVE-2020-25604)
 >   https://xenbits.xenproject.org/xsa/advisory-336.html

 > - XSA-337: PCI passthrough code reading back hardware registers
 >   (CVE-2020-25595)
 >   https://xenbits.xenproject.org/xsa/advisory-337.html

 > - XSA-338: once valid event channels may not turn invalid (CVE-2020-25597)
 >   https://xenbits.xenproject.org/xsa/advisory-338.html

 > - XSA-339: x86 pv guest kernel DoS via SYSENTER (CVE-2020-25596)
 >   https://xenbits.xenproject.org/xsa/advisory-339.html

 > - XSA-340: Missing memory barriers when accessing/allocating an event
 >   channel (CVE-2020-25603)
 >   https://xenbits.xenproject.org/xsa/advisory-340.html

 > - XSA-342: out of bounds event channels available to 32-bit x86 domains
 >   (CVE-2020-25600)
 >   https://xenbits.xenproject.org/xsa/advisory-342.html

 > - XSA-343: races with evtchn_reset() (CVE-2020-25599)
 >   https://xenbits.xenproject.org/xsa/advisory-343.html

 > - XSA-344: lack of preemption in evtchn_reset() / evtchn_destroy()
 >   (CVE-2020-25601)
 >   https://xenbits.xenproject.org/xsa/advisory-344.html

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

For 2020.02.x and 2020.08.x I have instead bumped to 4.13.2, which
contains security fixes up to XSA-347.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-12-08  9:59 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-11-21 12:42 [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes Peter Korsgaard
2020-11-22 14:31 ` Peter Korsgaard
2020-12-08  9:59 ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.