diff options
author | drochner <drochner@pkgsrc.org> | 2013-09-11 18:00:33 +0000 |
---|---|---|
committer | drochner <drochner@pkgsrc.org> | 2013-09-11 18:00:33 +0000 |
commit | 34fdabb241bad83fa1cc7e782fd5b8db91cec6a3 (patch) | |
tree | 7de12a563188e3f585d8d3cf96bbe3182e22ca92 /sysutils/xenkernel41/patches/patch-CVE-2013-1918_10 | |
parent | 337da97f8593c786679d3975003b9942aa15368e (diff) | |
download | pkgsrc-34fdabb241bad83fa1cc7e782fd5b8db91cec6a3.tar.gz |
update to 4.1.6.1
This release fixes the following critical vulnerabilities:
CVE-2013-1918 / XSA-45: Several long latency operations are not
preemptible
CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw
for bridges
CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs
CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception
recovery on XRSTOR
CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception
recovery on XSETBV
CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple
vulnerabilities in libelf PV kernel handling
CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings
affecting xend
CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive
console related xenstore keys
CVE-2013-1432 / XSA-58: Page reference counting error due to
XSA-45/CVE-2013-1918 fixes
XSA-61: libxl partially sets up HVM passthrough even with disabled iommu
This release contains many bug fixes and improvements. The highlights are:
addressing a regression from the fix for XSA-21
addressing a regression from the fix for XSA-46
bug fixes to low level system state handling, including certain
hardware errata workarounds
(CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before)
Diffstat (limited to 'sysutils/xenkernel41/patches/patch-CVE-2013-1918_10')
-rw-r--r-- | sysutils/xenkernel41/patches/patch-CVE-2013-1918_10 | 21 |
1 files changed, 0 insertions, 21 deletions
diff --git a/sysutils/xenkernel41/patches/patch-CVE-2013-1918_10 b/sysutils/xenkernel41/patches/patch-CVE-2013-1918_10 deleted file mode 100644 index 19b55bf7a0f..00000000000 --- a/sysutils/xenkernel41/patches/patch-CVE-2013-1918_10 +++ /dev/null @@ -1,21 +0,0 @@ -$NetBSD: patch-CVE-2013-1918_10,v 1.1 2013/05/03 16:48:37 drochner Exp $ - ---- xen/arch/x86/traps.c.orig 2013-04-23 16:44:20.000000000 +0000 -+++ xen/arch/x86/traps.c -@@ -2317,8 +2317,15 @@ static int emulate_privileged_op(struct - rc = new_guest_cr3(gmfn_to_mfn(v->domain, compat_cr3_to_pfn(*reg))); - #endif - domain_unlock(v->domain); -- if ( rc == 0 ) /* not okay */ -+ switch ( rc ) -+ { -+ case 0: -+ break; -+ case -EAGAIN: /* retry after preemption */ -+ goto skip; -+ default: /* not okay */ - goto fail; -+ } - break; - - case 4: /* Write CR4 */ |