diff options
author | prlw1 <prlw1@pkgsrc.org> | 2014-02-22 01:28:23 +0000 |
---|---|---|
committer | prlw1 <prlw1@pkgsrc.org> | 2014-02-22 01:28:23 +0000 |
commit | 22a7ad979bd1023718efa0bde7697109954b8d17 (patch) | |
tree | a0d78fa9692ed25aa371094420034b3b61559409 | |
parent | 809191ba3216ad7de78ebdff380d20c60e1499ba (diff) | |
download | pkgsrc-22a7ad979bd1023718efa0bde7697109954b8d17.tar.gz |
Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a
This fixes the following critical vulnerabilities:
- CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with
PCI passthrough
- CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
- CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
- CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
- CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
- CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting
info
- CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
- CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press
ure
- CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
- CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
- CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t
able locks
- CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo
ck
- CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
- CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu
ests
- CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
- CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
- CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
- CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri
ng IRQ setup
- CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
- CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
- CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
- CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege
d guests
- CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre
ssure
Apart from those there are many further bug fixes and improvements.
-rw-r--r-- | sysutils/xentools42/Makefile | 5 | ||||
-rw-r--r-- | sysutils/xentools42/distinfo | 9 | ||||
-rw-r--r-- | sysutils/xentools42/patches/patch-libxc_xc_dom_h | 13 |
3 files changed, 6 insertions, 21 deletions
diff --git a/sysutils/xentools42/Makefile b/sysutils/xentools42/Makefile index ee7b6e70e96..fc6f70f018b 100644 --- a/sysutils/xentools42/Makefile +++ b/sysutils/xentools42/Makefile @@ -1,11 +1,10 @@ -# $NetBSD: Makefile,v 1.15 2014/01/25 10:45:21 wiz Exp $ +# $NetBSD: Makefile,v 1.16 2014/02/22 01:28:23 prlw1 Exp $ -VERSION= 4.2.3 +VERSION= 4.2.4 VERSION_IPXE= 1.0.0 DISTNAME= xen-${VERSION} PKGNAME= xentools42-${VERSION} -PKGREVISION= 3 CATEGORIES= sysutils MASTER_SITES= http://bits.xensource.com/oss-xen/release/${VERSION}/ diff --git a/sysutils/xentools42/distinfo b/sysutils/xentools42/distinfo index fad5e34d950..2d3d7dcc444 100644 --- a/sysutils/xentools42/distinfo +++ b/sysutils/xentools42/distinfo @@ -1,11 +1,11 @@ -$NetBSD: distinfo,v 1.9 2013/12/08 19:17:56 riz Exp $ +$NetBSD: distinfo,v 1.10 2014/02/22 01:28:23 prlw1 Exp $ SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485 RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547 Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes -SHA1 (xen-4.2.3.tar.gz) = 7c72e1aa870cc938afdc50bd9f2d879118aa8b99 -RMD160 (xen-4.2.3.tar.gz) = da0fbb7bbc0796bd83c223f7d21015ce0d4c8553 -Size (xen-4.2.3.tar.gz) = 15613235 bytes +SHA1 (xen-4.2.4.tar.gz) = ab661bf0f64a18155f971343a9c07b7e7d1410f1 +RMD160 (xen-4.2.4.tar.gz) = b2210d3ff6a9fdf9cae1a5a38b829667dfd6fd2f +Size (xen-4.2.4.tar.gz) = 15663999 bytes SHA1 (patch-.._.._ipxe_src_Makefile.housekeeping) = 5ec8020a9705b2f64096c2942473a8de4db578bb SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808 SHA1 (patch-.._.._ipxe_src_arch_i386_scripts_i386.lds) = 4c0cbb7f535be43e1b6f53c284340a8bafc37c0b @@ -41,7 +41,6 @@ SHA1 (patch-include_xen-sys_NetBSD_gntdev.h) = 25c99a428fda6dee709888ddbcfdcfef5 SHA1 (patch-libfsimage_common_Makefile) = c3cc5335a1d6b066307c5f03fe72f513a9eb2bdb SHA1 (patch-libfsimage_ufs_ufs.h) = dc59f33cf3abd08a8cdee5977ca4168613327513 SHA1 (patch-libxc_xc__netbsd.c) = c94a2f7b38bfc1479401acf1bb124251bb4e3fcf -SHA1 (patch-libxc_xc_dom_h) = b89785a97208454eb3f2e1e43ba4674ad0828aa6 SHA1 (patch-libxl_libxl__create.c) = a212b3760f1bb796c6f126e5c795154f4e8030e2 SHA1 (patch-libxl_libxl__internal.h) = f8ff92400f7ba7858cc1963b11c1e8ee23d4e51f SHA1 (patch-ocaml_common.make) = c59d32301198d65691ab23529dd791de5ac40199 diff --git a/sysutils/xentools42/patches/patch-libxc_xc_dom_h b/sysutils/xentools42/patches/patch-libxc_xc_dom_h deleted file mode 100644 index 07ef6235494..00000000000 --- a/sysutils/xentools42/patches/patch-libxc_xc_dom_h +++ /dev/null @@ -1,13 +0,0 @@ -$NetBSD: patch-libxc_xc_dom_h,v 1.1 2013/12/08 19:17:56 riz Exp $ - ---- libxc/xc_dom.h.orig 2013-11-29 18:20:47.000000000 +0000 -+++ libxc/xc_dom.h 2013-11-29 18:22:14.000000000 +0000 -@@ -303,7 +303,7 @@ static inline void *xc_dom_vaddr_to_ptr( - if ( ptr == NULL ) - return ptr; - *safe_region_out = (safe_region_count << XC_DOM_PAGE_SHIFT(dom)) - offset; -- return ptr; -+ return ptr + offset; - } - - static inline int xc_dom_feature_translated(struct xc_dom_image *dom) |