From patchwork Sat Nov 21 12:42:06 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Peter Korsgaard X-Patchwork-Id: 1404334 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.136; helo=silver.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=korsgaard.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=J4vaEMbh; dkim-atps=neutral Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CdY3M3SP2z9sRR for ; Sat, 21 Nov 2020 23:42:36 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id 59C9820420; Sat, 21 Nov 2020 12:42:33 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zN6VXHn2OFV8; Sat, 21 Nov 2020 12:42:29 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by silver.osuosl.org (Postfix) with ESMTP id B816320368; Sat, 21 Nov 2020 12:42:29 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by ash.osuosl.org (Postfix) with ESMTP id 24C811BF37A for ; Sat, 21 Nov 2020 12:42:13 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 1AECC86EBC for ; Sat, 21 Nov 2020 12:42:13 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YVxZPD5CFq+7 for ; Sat, 21 Nov 2020 12:42:11 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mail-ej1-f66.google.com (mail-ej1-f66.google.com [209.85.218.66]) by whitealder.osuosl.org (Postfix) with ESMTPS id 8264C86E70 for ; Sat, 21 Nov 2020 12:42:11 +0000 (UTC) Received: by mail-ej1-f66.google.com with SMTP id oq3so16685234ejb.7 for ; Sat, 21 Nov 2020 04:42:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=Iw2iO9XhCHpwF6sRLYVhPO3FW8saC0L0ZExmmjbTX9U=; b=J4vaEMbhkmXo1PYObx7TcN+6HCkfTBmqBvQVcTBUMMBsvGmM6qWKcjzLv7iOC/wrdN reb4PxGlu6P0/853OfhJ8EA1wbw+eNrDK3vI2RglF2HbMuszcypko8JnlpOToROVMyFY ATjYNrbj46qBjKmrQjQjoyzkzh2Mf9I+GPFAQVh1Fobej/88j46Q18OzDadVTpVlliyQ GGaWjNBaiq8Cknu9nt90V8XmvBgoorqGomDZ3YY93HBFOj9uPnSViT3R1aPmL8KiXaYu G9s7DB4ASMwBkGlB2w4/9Rq292ERkh6iJS/NIzyixLRBmnnPhIm+BuY9CwUTLvju6Km8 z/bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :mime-version:content-transfer-encoding; bh=Iw2iO9XhCHpwF6sRLYVhPO3FW8saC0L0ZExmmjbTX9U=; b=TfBXuN1YdP9mU0G0svivFFVBS0a+vUpftNzdr1bksGucLa1uPaMw6si5hfb4bkp4Zk FZ2GQaoT6pxFMLgsBCZoYroLirzXw3znTGShag+xmhXR0am/mVnBsX4NPgnpIdoNeyVq nC8A+6fhIAvf63FrG5Nd6or7Xig9buIPTEEPaU+GaGzyrPWHj1eymr2NHGM2RO02TWyR On4QNIYXrPLXLtM23gHKxe4rmDHuSllE+tKsy0ixSYFDEkJKLsU39lbaApLsGPIdhhIp +r3bv8ed9lp9snTEMgVTDN8Q51EwfZhHxu+GzfoEfiKj3mC8uJL70ge9XWWAoP84hZbn ytcw== X-Gm-Message-State: AOAM533UYeYANPUdenPQK8Fv23405yOpK82+XZWeNiog9qhmv+tjYXon NefjtNrDnwUswWcTPBh8CY0XMlHGh3E= X-Google-Smtp-Source: ABdhPJznRxN41wTrxqpEp0eNy791XL9BAL0pAv+Iqvzjtpmq+xS3zLOxW+Y/4uIEBmgc8uitAWW4Xg== X-Received: by 2002:a17:906:480d:: with SMTP id w13mr15576971ejq.456.1605962529450; Sat, 21 Nov 2020 04:42:09 -0800 (PST) Received: from dell.be.48ers.dk (d51A5BC31.access.telenet.be. [81.165.188.49]) by smtp.gmail.com with ESMTPSA id d23sm2381855edz.19.2020.11.21.04.42.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 21 Nov 2020 04:42:08 -0800 (PST) Received: from peko by dell.be.48ers.dk with local (Exim 4.92) (envelope-from ) id 1kgSDP-0006PJ-KM; Sat, 21 Nov 2020 13:42:07 +0100 From: Peter Korsgaard To: buildroot@buildroot.org Date: Sat, 21 Nov 2020 13:42:06 +0100 Message-Id: <20201121124206.24581-1-peter@korsgaard.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Subject: [Buildroot] [PATCH] package/xen: add XSA-333..344 security fixes X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Matt Weber , Peter Korsgaard , Alistair Francis Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" Fixes the following security issues: - XSA-333: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (CVE-2020-25602) https://xenbits.xenproject.org/xsa/advisory-333.html - XSA-334: Missing unlock in XENMEM_acquire_resource error path (CVE-2020-25598) https://xenbits.xenproject.org/xsa/advisory-334.html - XSA-336: race when migrating timers between x86 HVM vCPU-s (CVE-2020-25604) https://xenbits.xenproject.org/xsa/advisory-336.html - XSA-337: PCI passthrough code reading back hardware registers (CVE-2020-25595) https://xenbits.xenproject.org/xsa/advisory-337.html - XSA-338: once valid event channels may not turn invalid (CVE-2020-25597) https://xenbits.xenproject.org/xsa/advisory-338.html - XSA-339: x86 pv guest kernel DoS via SYSENTER (CVE-2020-25596) https://xenbits.xenproject.org/xsa/advisory-339.html - XSA-340: Missing memory barriers when accessing/allocating an event channel (CVE-2020-25603) https://xenbits.xenproject.org/xsa/advisory-340.html - XSA-342: out of bounds event channels available to 32-bit x86 domains (CVE-2020-25600) https://xenbits.xenproject.org/xsa/advisory-342.html - XSA-343: races with evtchn_reset() (CVE-2020-25599) https://xenbits.xenproject.org/xsa/advisory-343.html - XSA-344: lack of preemption in evtchn_reset() / evtchn_destroy() (CVE-2020-25601) https://xenbits.xenproject.org/xsa/advisory-344.html Signed-off-by: Peter Korsgaard --- package/xen/xen.hash | 24 ++++++++++++++++++++++++ package/xen/xen.mk | 37 +++++++++++++++++++++++++++++++++++++ 2 files changed, 61 insertions(+) diff --git a/package/xen/xen.hash b/package/xen/xen.hash index 709eeb3d45..eb5b18b416 100644 --- a/package/xen/xen.hash +++ b/package/xen/xen.hash @@ -1,3 +1,27 @@ # Locally computed sha256 06839f68ea7620669dbe8b67861213223cc2a7d02ced61b56e5249c50e87f035 xen-4.14.0.tar.gz sha256 ecca9538e9d3f7e3c2bff827502f4495e2ef9e22c451298696ea08886b176c2c COPYING +# https://xenbits.xenproject.org/xsa/advisory-333.html +sha256 8edec914fbdf036fba8cb54a75d3a9b025fac936e0af35512954a2dc2b12a26f xsa333.patch +# https://xenbits.xenproject.org/xsa/advisory-334.html +sha256 323cd9d24b2e95643833865a9943172c56edd25dfd170e4741034d28dfd0d4bd xsa334.patch +# https://xenbits.xenproject.org/xsa/advisory-336.html +sha256 ecb59876fb92cfe0916ed5f3227a30efe038224c1f6ec36bc3706c4e2214552c xsa336.patch +# https://xenbits.xenproject.org/xsa/advisory-337.html +sha256 98c48781dd46bf6ff6cc46246c6c9f2e2be6ec696c0e7918d4b82845588ce04e xsa337-1.patch +sha256 9e8ae24222371379f2ea62e14fcc7f7282e01c356dff230c22c9ab1d2fb941e2 xsa337-2.patch +# https://xenbits.xenproject.org/xsa/advisory-338.html +sha256 7345eac1cbad23b082523e9cbd0331f8a9f16c6e459fb2a686606253f5514c9b xsa338.patch +# https://xenbits.xenproject.org/xsa/advisory-339.html +sha256 b6ffa7671d905aa12498ad64915be3b7cba74ce1c5bf6bce18b1f106ebf6d715 xsa339.patch +# https://xenbits.xenproject.org/xsa/advisory-340.html +sha256 2bb088fcc1f8f79bf5ddb7b4e101cb1db76a343d2fb1cdafb7cd54612e4009da xsa340.patch +# https://xenbits.xenproject.org/xsa/advisory-342.html +sha256 060caee3fb5971fca0f2fbdef622c52d9bc6e0ed9efad33de5b6b504651c2112 xsa342.patch +# https://xenbits.xenproject.org/xsa/advisory-343.html +sha256 d714a542bae9d96b6a061c5a8f754549d699dcfb7bf2a766b721f6bbe33aefd2 xsa343-1.patch +sha256 657c44c8ea13523d2e59776531237bbc20166c9b7c3960e0e9ad381fce927344 xsa343-2.patch +sha256 2b275e3fa559167c1b59e6fd4a20bc4d1df9d9cb0cbd0050a3db9c3d0299b233 xsa343-3.patch +# https://xenbits.xenproject.org/xsa/advisory-344.html +sha256 5f9dbdc48bed502d614a76e5819afa41a72cec603c5a2c9491d73873a991a5ed xsa344-1.patch +sha256 381ca5c51bc120bfd5c742be3988f570abb870c4b75c8a48cf49ae4fa1046d73 xsa344-2.patch diff --git a/package/xen/xen.mk b/package/xen/xen.mk index 8cbe532d2b..0c3ecbb909 100644 --- a/package/xen/xen.mk +++ b/package/xen/xen.mk @@ -6,6 +6,43 @@ XEN_VERSION = 4.14.0 XEN_SITE = https://downloads.xenproject.org/release/xen/$(XEN_VERSION) +XEN_PATCH = \ + https://xenbits.xenproject.org/xsa/xsa333.patch \ + https://xenbits.xenproject.org/xsa/xsa334.patch \ + https://xenbits.xenproject.org/xsa/xsa336.patch \ + https://xenbits.xenproject.org/xsa/xsa337/xsa337-1.patch \ + https://xenbits.xenproject.org/xsa/xsa337/xsa337-2.patch \ + https://xenbits.xenproject.org/xsa/xsa338.patch \ + https://xenbits.xenproject.org/xsa/xsa339.patch \ + https://xenbits.xenproject.org/xsa/xsa340.patch \ + https://xenbits.xenproject.org/xsa/xsa342.patch \ + https://xenbits.xenproject.org/xsa/xsa343/xsa343-1.patch \ + https://xenbits.xenproject.org/xsa/xsa343/xsa343-2.patch \ + https://xenbits.xenproject.org/xsa/xsa343/xsa343-3.patch \ + https://xenbits.xenproject.org/xsa/xsa344/xsa344-1.patch \ + https://xenbits.xenproject.org/xsa/xsa344/xsa344-2.patch + +# xsa333.patch +XEN_IGNORE_CVES += CVE-2020-25602 +# xsa334.patch +XEN_IGNORE_CVES += CVE-2020-25598 +# xsa336.patch +XEN_IGNORE_CVES += CVE-2020-25604 +# xsa337-1.patch, xsa337-2.patch +XEN_IGNORE_CVES += CVE-2020-25595 +# xsa338.patch +XEN_IGNORE_CVES += CVE-2020-25597 +# xsa339.patch +XEN_IGNORE_CVES += CVE-2020-25596 +# xsa340.patch +XEN_IGNORE_CVES += CVE-2020-25603 +# xsa342.patch +XEN_IGNORE_CVES += CVE-2020-25600 +# xsa343-1.patch, xsa-343-2.patch, xsa-343-3.patch +XEN_IGNORE_CVES += CVE-2020-25599 +# xsa344-1.patch, xsa344-2.patch +XEN_IGNORE_CVES += CVE-2020-25601 + XEN_LICENSE = GPL-2.0 XEN_LICENSE_FILES = COPYING XEN_DEPENDENCIES = host-acpica host-python3