summaryrefslogtreecommitdiff
path: root/sysutils/xenkernel41
diff options
context:
space:
mode:
authordrochner <drochner@pkgsrc.org>2014-01-24 17:07:35 +0000
committerdrochner <drochner@pkgsrc.org>2014-01-24 17:07:35 +0000
commitf74ce96bea92245e8c2fd575d448b1d3f98dc1bd (patch)
tree45e429c4dddca159380342ac73bbaafac85498c2 /sysutils/xenkernel41
parente1b4e3e6127dad12f0659f071ec58fa39ee890be (diff)
downloadpkgsrc-f74ce96bea92245e8c2fd575d448b1d3f98dc1bd.tar.gz
add patch from upstream to add missing privilege check
from the advisory: Malicious or misbehaving unprivileged guests can cause the host or other guests to malfunction. This can result in host-wide denial of service. Privilege escalation, while seeming to be unlikely, cannot be excluded. Only PV guests can take advantage of this vulnerability. (CVE-2014-1666) bump PKGREV
Diffstat (limited to 'sysutils/xenkernel41')
-rw-r--r--sysutils/xenkernel41/Makefile4
-rw-r--r--sysutils/xenkernel41/distinfo3
-rw-r--r--sysutils/xenkernel41/patches/patch-CVE-2014-166617
3 files changed, 21 insertions, 3 deletions
diff --git a/sysutils/xenkernel41/Makefile b/sysutils/xenkernel41/Makefile
index b8475351e8f..848ea1660b8 100644
--- a/sysutils/xenkernel41/Makefile
+++ b/sysutils/xenkernel41/Makefile
@@ -1,10 +1,10 @@
-# $NetBSD: Makefile,v 1.30 2013/12/04 10:35:01 drochner Exp $
+# $NetBSD: Makefile,v 1.31 2014/01/24 17:07:35 drochner Exp $
#
VERSION= 4.1.6.1
DISTNAME= xen-${VERSION}
PKGNAME= xenkernel41-${VERSION}
-PKGREVISION= 5
+PKGREVISION= 6
CATEGORIES= sysutils
MASTER_SITES= http://bits.xensource.com/oss-xen/release/${VERSION}/
diff --git a/sysutils/xenkernel41/distinfo b/sysutils/xenkernel41/distinfo
index 1286133b2c1..6bf3ee6311a 100644
--- a/sysutils/xenkernel41/distinfo
+++ b/sysutils/xenkernel41/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.24 2013/12/04 10:35:01 drochner Exp $
+$NetBSD: distinfo,v 1.25 2014/01/24 17:07:35 drochner Exp $
SHA1 (xen-4.1.6.1.tar.gz) = e5f15feb0821578817a65ede16110c6eac01abd0
RMD160 (xen-4.1.6.1.tar.gz) = bff11421fc44a26f2cc3156713267abcb36d7a19
@@ -14,6 +14,7 @@ SHA1 (patch-CVE-2013-4494) = d74dfc898d1128f3c205bd178c8cf663935711e3
SHA1 (patch-CVE-2013-4553) = 6708dcef1737b119a3fcf2e3414c22c115cbacc1
SHA1 (patch-CVE-2013-6885_1) = 6fc88c8c98393e90dd895c160108ff2ee17cee2e
SHA1 (patch-CVE-2013-6885_2) = be3c99ba3e349492d45cd4f2fce0acc26ac1a96d
+SHA1 (patch-CVE-2014-1666) = acf27080799d4aae6a03b556caadb01081d5314e
SHA1 (patch-Config.mk) = a43ed1b3304d6383dc093acd128a7f373d0ca266
SHA1 (patch-xen_Makefile) = d1c7e4860221f93d90818f45a77748882486f92b
SHA1 (patch-xen_arch_x86_Rules.mk) = 6b9b4bfa28924f7d3f6c793a389f1a7ac9d228e2
diff --git a/sysutils/xenkernel41/patches/patch-CVE-2014-1666 b/sysutils/xenkernel41/patches/patch-CVE-2014-1666
new file mode 100644
index 00000000000..5606447d4cf
--- /dev/null
+++ b/sysutils/xenkernel41/patches/patch-CVE-2014-1666
@@ -0,0 +1,17 @@
+$NetBSD: patch-CVE-2014-1666,v 1.1 2014/01/24 17:07:36 drochner Exp $
+
+http://lists.xenproject.org/archives/html/xen-devel/2014-01/msg02075.html
+
+--- xen/arch/x86/physdev.c.orig 2014-01-24 16:04:18.000000000 +0000
++++ xen/arch/x86/physdev.c 2014-01-24 16:05:09.000000000 +0000
+@@ -554,7 +554,9 @@ ret_t do_physdev_op(int cmd, XEN_GUEST_H
+ case PHYSDEVOP_release_msix: {
+ struct physdev_pci_device dev;
+
+- if ( copy_from_guest(&dev, arg, 1) )
++ if ( !IS_PRIV(v->domain) )
++ ret = -EPERM;
++ else if ( copy_from_guest(&dev, arg, 1) )
+ ret = -EFAULT;
+ else if ( dev.seg )
+ ret = -EOPNOTSUPP;