diff mbox series

[2/3] package/xen: security bump to version 4.12.2

Message ID 20200119170358.5408-2-peter@korsgaard.com
State Accepted
Headers show
Series [1/3] package/xen: explicitly disable checkpolicy logic | expand

Commit Message

Peter Korsgaard Jan. 19, 2020, 5:03 p.m. UTC
The 4.12.2 release brings a large number of fixes:

https://xenproject.org/downloads/xen-project-archives/xen-project-4-12-series/xen-project-4-12-2/

Including a number of security fixes:

XSA-296: VCPUOP_initialise DoS (CVE-2019-18420)
XSA-298: missing descriptor table limit checking in x86 PV emulation
	 (CVE-2019-18425)
XSA-299: Issues with restartable PV type change operations (CVE-2019-18421)
XSA-301: add-to-physmap can be abused to DoS Arm hosts (CVE-2019-18423)
XSA-302: passed through PCI devices may corrupt host memory after
         deassignment (CVE-2019-18424)
XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers
	 (CVE-2019-18422)
XSA-304: x86: Machine Check Error on Page Size Change DoS (CVE-2018-12207)
XSA-305: TSX Asynchronous Abort speculative side channel (CVE-2019-11135)
XSA-306: Device quarantine for alternate pci assignment methods
	 (CVE-2019-19579)
XSA-307: find_next_bit() issues (CVE-2019-19581 CVE-2019-19582)
XSA-308: VMX: VMentry failure with debug exceptions and blocked states
	 (CVE-2019-19583)
XSA-309: Linear pagetable use / entry miscounts (CVE-2019-19578)
XSA-310: Further issues with restartable PV type change operations
	 (CVE-2019-19580)
XSA-311: Bugs in dynamic height handling for AMD IOMMU pagetables
	 (CVE-2019-19577)

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/xen/xen.hash | 2 +-
 package/xen/xen.mk   | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

Comments

Alistair Francis Jan. 20, 2020, 12:26 a.m. UTC | #1
On Mon, Jan 20, 2020 at 3:04 AM Peter Korsgaard <peter@korsgaard.com> wrote:
>
> The 4.12.2 release brings a large number of fixes:
>
> https://xenproject.org/downloads/xen-project-archives/xen-project-4-12-series/xen-project-4-12-2/
>
> Including a number of security fixes:
>
> XSA-296: VCPUOP_initialise DoS (CVE-2019-18420)
> XSA-298: missing descriptor table limit checking in x86 PV emulation
>          (CVE-2019-18425)
> XSA-299: Issues with restartable PV type change operations (CVE-2019-18421)
> XSA-301: add-to-physmap can be abused to DoS Arm hosts (CVE-2019-18423)
> XSA-302: passed through PCI devices may corrupt host memory after
>          deassignment (CVE-2019-18424)
> XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers
>          (CVE-2019-18422)
> XSA-304: x86: Machine Check Error on Page Size Change DoS (CVE-2018-12207)
> XSA-305: TSX Asynchronous Abort speculative side channel (CVE-2019-11135)
> XSA-306: Device quarantine for alternate pci assignment methods
>          (CVE-2019-19579)
> XSA-307: find_next_bit() issues (CVE-2019-19581 CVE-2019-19582)
> XSA-308: VMX: VMentry failure with debug exceptions and blocked states
>          (CVE-2019-19583)
> XSA-309: Linear pagetable use / entry miscounts (CVE-2019-19578)
> XSA-310: Further issues with restartable PV type change operations
>          (CVE-2019-19580)
> XSA-311: Bugs in dynamic height handling for AMD IOMMU pagetables
>          (CVE-2019-19577)
>
> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Reviewed-by: Alistair Francis <alistair.francis@wdc.com>

Alistair

> ---
>  package/xen/xen.hash | 2 +-
>  package/xen/xen.mk   | 2 +-
>  2 files changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/package/xen/xen.hash b/package/xen/xen.hash
> index a15bc7d852..ad6220d94b 100644
> --- a/package/xen/xen.hash
> +++ b/package/xen/xen.hash
> @@ -1,3 +1,3 @@
>  # Locally computed
> -sha256 5450a85497b84167df1d229b3ab98fb24ef4d6b0510dce522798c13c1b090159 xen-4.12.1.tar.gz
> +sha256 1c75cbe728dfabf02b7f9a17ce96ee7d202d2fd4b4689490018d3a28b63f9fa3 xen-4.12.2.tar.gz
>  sha256 dba0d79260259c013c52e5d4daeaea564a2fbb9ff7fc6778c377a401ec3898de COPYING
> diff --git a/package/xen/xen.mk b/package/xen/xen.mk
> index 167f0ad638..7eb2643343 100644
> --- a/package/xen/xen.mk
> +++ b/package/xen/xen.mk
> @@ -4,7 +4,7 @@
>  #
>  ################################################################################
>
> -XEN_VERSION = 4.12.1
> +XEN_VERSION = 4.12.2
>  XEN_SITE = https://downloads.xenproject.org/release/xen/$(XEN_VERSION)
>  XEN_LICENSE = GPL-2.0
>  XEN_LICENSE_FILES = COPYING
> --
> 2.20.1
>
> _______________________________________________
> buildroot mailing list
> buildroot@busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot
Peter Korsgaard Jan. 20, 2020, 7:39 a.m. UTC | #2
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > The 4.12.2 release brings a large number of fixes:
 > https://xenproject.org/downloads/xen-project-archives/xen-project-4-12-series/xen-project-4-12-2/

 > Including a number of security fixes:

 > XSA-296: VCPUOP_initialise DoS (CVE-2019-18420)
 > XSA-298: missing descriptor table limit checking in x86 PV emulation
 > 	 (CVE-2019-18425)
 > XSA-299: Issues with restartable PV type change operations (CVE-2019-18421)
 > XSA-301: add-to-physmap can be abused to DoS Arm hosts (CVE-2019-18423)
 > XSA-302: passed through PCI devices may corrupt host memory after
 >          deassignment (CVE-2019-18424)
 > XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers
 > 	 (CVE-2019-18422)
 > XSA-304: x86: Machine Check Error on Page Size Change DoS (CVE-2018-12207)
 > XSA-305: TSX Asynchronous Abort speculative side channel (CVE-2019-11135)
 > XSA-306: Device quarantine for alternate pci assignment methods
 > 	 (CVE-2019-19579)
 > XSA-307: find_next_bit() issues (CVE-2019-19581 CVE-2019-19582)
 > XSA-308: VMX: VMentry failure with debug exceptions and blocked states
 > 	 (CVE-2019-19583)
 > XSA-309: Linear pagetable use / entry miscounts (CVE-2019-19578)
 > XSA-310: Further issues with restartable PV type change operations
 > 	 (CVE-2019-19580)
 > XSA-311: Bugs in dynamic height handling for AMD IOMMU pagetables
 > 	 (CVE-2019-19577)

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed, thanks.
Peter Korsgaard March 5, 2020, 8:25 p.m. UTC | #3
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > The 4.12.2 release brings a large number of fixes:
 > https://xenproject.org/downloads/xen-project-archives/xen-project-4-12-series/xen-project-4-12-2/

 > Including a number of security fixes:

 > XSA-296: VCPUOP_initialise DoS (CVE-2019-18420)
 > XSA-298: missing descriptor table limit checking in x86 PV emulation
 > 	 (CVE-2019-18425)
 > XSA-299: Issues with restartable PV type change operations (CVE-2019-18421)
 > XSA-301: add-to-physmap can be abused to DoS Arm hosts (CVE-2019-18423)
 > XSA-302: passed through PCI devices may corrupt host memory after
 >          deassignment (CVE-2019-18424)
 > XSA-303: ARM: Interrupts are unconditionally unmasked in exception handlers
 > 	 (CVE-2019-18422)
 > XSA-304: x86: Machine Check Error on Page Size Change DoS (CVE-2018-12207)
 > XSA-305: TSX Asynchronous Abort speculative side channel (CVE-2019-11135)
 > XSA-306: Device quarantine for alternate pci assignment methods
 > 	 (CVE-2019-19579)
 > XSA-307: find_next_bit() issues (CVE-2019-19581 CVE-2019-19582)
 > XSA-308: VMX: VMentry failure with debug exceptions and blocked states
 > 	 (CVE-2019-19583)
 > XSA-309: Linear pagetable use / entry miscounts (CVE-2019-19578)
 > XSA-310: Further issues with restartable PV type change operations
 > 	 (CVE-2019-19580)
 > XSA-311: Bugs in dynamic height handling for AMD IOMMU pagetables
 > 	 (CVE-2019-19577)

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2019.11.x, thanks.

For 2019.02.x I will instead bump to 4.11.3.
diff mbox series

Patch

diff --git a/package/xen/xen.hash b/package/xen/xen.hash
index a15bc7d852..ad6220d94b 100644
--- a/package/xen/xen.hash
+++ b/package/xen/xen.hash
@@ -1,3 +1,3 @@ 
 # Locally computed
-sha256 5450a85497b84167df1d229b3ab98fb24ef4d6b0510dce522798c13c1b090159 xen-4.12.1.tar.gz
+sha256 1c75cbe728dfabf02b7f9a17ce96ee7d202d2fd4b4689490018d3a28b63f9fa3 xen-4.12.2.tar.gz
 sha256 dba0d79260259c013c52e5d4daeaea564a2fbb9ff7fc6778c377a401ec3898de COPYING
diff --git a/package/xen/xen.mk b/package/xen/xen.mk
index 167f0ad638..7eb2643343 100644
--- a/package/xen/xen.mk
+++ b/package/xen/xen.mk
@@ -4,7 +4,7 @@ 
 #
 ################################################################################
 
-XEN_VERSION = 4.12.1
+XEN_VERSION = 4.12.2
 XEN_SITE = https://downloads.xenproject.org/release/xen/$(XEN_VERSION)
 XEN_LICENSE = GPL-2.0
 XEN_LICENSE_FILES = COPYING