summaryrefslogtreecommitdiff
path: root/sysutils/xenkernel41/patches/patch-CVE-2014-7156
diff options
context:
space:
mode:
Diffstat (limited to 'sysutils/xenkernel41/patches/patch-CVE-2014-7156')
-rw-r--r--sysutils/xenkernel41/patches/patch-CVE-2014-715625
1 files changed, 0 insertions, 25 deletions
diff --git a/sysutils/xenkernel41/patches/patch-CVE-2014-7156 b/sysutils/xenkernel41/patches/patch-CVE-2014-7156
deleted file mode 100644
index ab28472ef3d..00000000000
--- a/sysutils/xenkernel41/patches/patch-CVE-2014-7156
+++ /dev/null
@@ -1,25 +0,0 @@
-$NetBSD: patch-CVE-2014-7156,v 1.1 2014/09/26 10:45:00 bouyer Exp $
-
-x86emul: only emulate software interrupt injection for real mode
-
-Protected mode emulation currently lacks proper privilege checking of
-the referenced IDT entry, and there's currently no legitimate way for
-any of the respective instructions to reach the emulator when the guest
-is in protected mode.
-
-This is XSA-106.
-
-Reported-by: Andrei LUTAS <vlutas@bitdefender.com>
-Signed-off-by: Jan Beulich <jbeulich@suse.com>
-Acked-by: Keir Fraser <keir@xen.org>
-
---- xen/arch/x86/x86_emulate/x86_emulate.c.orig
-+++ xen/arch/x86/x86_emulate/x86_emulate.c
-@@ -2634,6 +2634,7 @@ x86_emulate(
- case 0xcd: /* int imm8 */
- src.val = insn_fetch_type(uint8_t);
- swint:
-+ fail_if(!in_realmode(ctxt, ops)); /* XSA-106 */
- fail_if(ops->inject_sw_interrupt == NULL);
- rc = ops->inject_sw_interrupt(src.val, _regs.eip - ctxt->regs->eip,
- ctxt) ? : X86EMUL_EXCEPTION;