Fixes the following security issues:
- CVE-2021-3308: IRQ vector leak on x86
https://xenbits.xenproject.org/xsa/advisory-360.html
- CVE-2021-26933: arm: The cache may not be cleaned for newly allocated
scrubbed pages
https://xenbits.xenproject.org/xsa/advisory-364.html
- CVE-2021-28687: HVM soft-reset crashes toolstack
https://xenbits.xenproject.org/xsa/advisory-368.html
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
# Locally computed
sha256 cf0d7316ad674491f49b7ef0518cb1d906a2e3bfad639deef0ef2343b119ac0c xen-4.14.1.tar.gz
sha256 ecca9538e9d3f7e3c2bff827502f4495e2ef9e22c451298696ea08886b176c2c COPYING
+# https://xenbits.xenproject.org/xsa/advisory-360.html
+sha256 809515011efb781a2a8742e9acfd76412d3920c2d4142bb187588cd36f77383e xsa360-4.14.patch
+# https://xenbits.xenproject.org/xsa/advisory-364.html
+sha256 dc313c70bb07b4096bbc4612cbbc180589923277411dede2fda37f04ecc846d6 xsa364.patch
+# https://xenbits.xenproject.org/xsa/advisory-368.html
+sha256 55bbe59c75b69f493e364dfcf6cdbc7db4acd32dbf0b4d2466815b7c1f1823ce xsa368-4.14.patch
XEN_CPE_ID_VENDOR = xen
XEN_CPE_ID_PREFIX = cpe:2.3:o
XEN_DEPENDENCIES = host-acpica host-python3
+XEN_PATCH = \
+ https://xenbits.xenproject.org/xsa/xsa360-4.14.patch \
+ https://xenbits.xenproject.org/xsa/xsa364.patch \
+ https://xenbits.xenproject.org/xsa/xsa368-4.14.patch
+
+# xsa360-4.14.patch
+XEN_IGNORE_CVES += CVE-2021-3308
+
+# xsa364.patch
+XEN_IGNORE_CVES += CVE-2021-26933
+
+# xsa368-4.14.patch
+XEN_IGNORE_CVES += CVE-2021-28687
# Calculate XEN_ARCH
ifeq ($(ARCH),aarch64)