kumquat-buildroot/package/xen/xen.mk
Peter Korsgaard b473ad2ec2 package/xen: add XSA-333..344 security fixes
Fixes the following security issues:

- XSA-333: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
  (CVE-2020-25602)
  https://xenbits.xenproject.org/xsa/advisory-333.html

- XSA-334: Missing unlock in XENMEM_acquire_resource error path
  (CVE-2020-25598)
  https://xenbits.xenproject.org/xsa/advisory-334.html

- XSA-336: race when migrating timers between x86 HVM vCPU-s
  (CVE-2020-25604)
  https://xenbits.xenproject.org/xsa/advisory-336.html

- XSA-337: PCI passthrough code reading back hardware registers
  (CVE-2020-25595)
  https://xenbits.xenproject.org/xsa/advisory-337.html

- XSA-338: once valid event channels may not turn invalid (CVE-2020-25597)
  https://xenbits.xenproject.org/xsa/advisory-338.html

- XSA-339: x86 pv guest kernel DoS via SYSENTER (CVE-2020-25596)
  https://xenbits.xenproject.org/xsa/advisory-339.html

- XSA-340: Missing memory barriers when accessing/allocating an event
  channel (CVE-2020-25603)
  https://xenbits.xenproject.org/xsa/advisory-340.html

- XSA-342: out of bounds event channels available to 32-bit x86 domains
  (CVE-2020-25600)
  https://xenbits.xenproject.org/xsa/advisory-342.html

- XSA-343: races with evtchn_reset() (CVE-2020-25599)
  https://xenbits.xenproject.org/xsa/advisory-343.html

- XSA-344: lack of preemption in evtchn_reset() / evtchn_destroy()
  (CVE-2020-25601)
  https://xenbits.xenproject.org/xsa/advisory-344.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2020-11-22 15:31:29 +01:00

101 lines
3.0 KiB
Makefile

################################################################################
#
# Xen
#
################################################################################
XEN_VERSION = 4.14.0
XEN_SITE = https://downloads.xenproject.org/release/xen/$(XEN_VERSION)
XEN_PATCH = \
https://xenbits.xenproject.org/xsa/xsa333.patch \
https://xenbits.xenproject.org/xsa/xsa334.patch \
https://xenbits.xenproject.org/xsa/xsa336.patch \
https://xenbits.xenproject.org/xsa/xsa337/xsa337-1.patch \
https://xenbits.xenproject.org/xsa/xsa337/xsa337-2.patch \
https://xenbits.xenproject.org/xsa/xsa338.patch \
https://xenbits.xenproject.org/xsa/xsa339.patch \
https://xenbits.xenproject.org/xsa/xsa340.patch \
https://xenbits.xenproject.org/xsa/xsa342.patch \
https://xenbits.xenproject.org/xsa/xsa343/xsa343-1.patch \
https://xenbits.xenproject.org/xsa/xsa343/xsa343-2.patch \
https://xenbits.xenproject.org/xsa/xsa343/xsa343-3.patch \
https://xenbits.xenproject.org/xsa/xsa344/xsa344-1.patch \
https://xenbits.xenproject.org/xsa/xsa344/xsa344-2.patch
# xsa333.patch
XEN_IGNORE_CVES += CVE-2020-25602
# xsa334.patch
XEN_IGNORE_CVES += CVE-2020-25598
# xsa336.patch
XEN_IGNORE_CVES += CVE-2020-25604
# xsa337-1.patch, xsa337-2.patch
XEN_IGNORE_CVES += CVE-2020-25595
# xsa338.patch
XEN_IGNORE_CVES += CVE-2020-25597
# xsa339.patch
XEN_IGNORE_CVES += CVE-2020-25596
# xsa340.patch
XEN_IGNORE_CVES += CVE-2020-25603
# xsa342.patch
XEN_IGNORE_CVES += CVE-2020-25600
# xsa343-1.patch, xsa-343-2.patch, xsa-343-3.patch
XEN_IGNORE_CVES += CVE-2020-25599
# xsa344-1.patch, xsa344-2.patch
XEN_IGNORE_CVES += CVE-2020-25601
XEN_LICENSE = GPL-2.0
XEN_LICENSE_FILES = COPYING
XEN_DEPENDENCIES = host-acpica host-python3
# Calculate XEN_ARCH
ifeq ($(ARCH),aarch64)
XEN_ARCH = arm64
else ifeq ($(ARCH),arm)
XEN_ARCH = arm32
endif
XEN_CONF_OPTS = \
--disable-golang \
--disable-ocamltools \
--with-initddir=/etc/init.d
XEN_CONF_ENV = PYTHON=$(HOST_DIR)/bin/python3
XEN_MAKE_ENV = \
XEN_TARGET_ARCH=$(XEN_ARCH) \
CROSS_COMPILE=$(TARGET_CROSS) \
HOST_EXTRACFLAGS="-Wno-error" \
XEN_HAS_CHECKPOLICY=n \
$(TARGET_CONFIGURE_OPTS)
ifeq ($(BR2_PACKAGE_XEN_HYPERVISOR),y)
XEN_MAKE_OPTS += dist-xen
XEN_INSTALL_IMAGES = YES
define XEN_INSTALL_IMAGES_CMDS
cp $(@D)/xen/xen $(BINARIES_DIR)
endef
else
XEN_CONF_OPTS += --disable-xen
endif
ifeq ($(BR2_PACKAGE_XEN_TOOLS),y)
XEN_DEPENDENCIES += \
dtc libaio libglib2 ncurses openssl pixman slirp util-linux yajl
ifeq ($(BR2_PACKAGE_ARGP_STANDALONE),y)
XEN_DEPENDENCIES += argp-standalone
endif
XEN_INSTALL_TARGET_OPTS += DESTDIR=$(TARGET_DIR) install-tools
XEN_MAKE_OPTS += dist-tools
XEN_CONF_OPTS += --with-extra-qemuu-configure-args="--disable-sdl --disable-opengl"
define XEN_INSTALL_INIT_SYSV
mv $(TARGET_DIR)/etc/init.d/xencommons $(TARGET_DIR)/etc/init.d/S50xencommons
mv $(TARGET_DIR)/etc/init.d/xen-watchdog $(TARGET_DIR)/etc/init.d/S50xen-watchdog
mv $(TARGET_DIR)/etc/init.d/xendomains $(TARGET_DIR)/etc/init.d/S60xendomains
endef
else
XEN_INSTALL_TARGET = NO
XEN_CONF_OPTS += --disable-tools
endif
$(eval $(autotools-package))