diff options
author | prlw1 <prlw1@pkgsrc.org> | 2013-09-12 23:37:18 +0000 |
---|---|---|
committer | prlw1 <prlw1@pkgsrc.org> | 2013-09-12 23:37:18 +0000 |
commit | ef9dbf5996db2365d0f5352f7025b6a13a304803 (patch) | |
tree | 58e0711b1808b82a39745e6e2a0e6935bcebda2e /sysutils/xentools42/distinfo | |
parent | 29afa1f03961f938da11a6599ee5fa077c71de0b (diff) | |
download | pkgsrc-ef9dbf5996db2365d0f5352f7025b6a13a304803.tar.gz |
Update xen to 4.2.3
- Add warning if /kern/xen/privcmd is not readable
Fixes the following critical vulnerabilities:
* CVE-2013-1918 / XSA-45:
Several long latency operations are not preemptible
* CVE-2013-1952 / XSA-49:
VT-d interrupt remapping source validation flaw for bridges
* CVE-2013-2076 / XSA-52:
Information leak on XSAVE/XRSTOR capable AMD CPUs
* CVE-2013-2077 / XSA-53:
Hypervisor crash due to missing exception recovery on XRSTOR
* CVE-2013-2078 / XSA-54:
Hypervisor crash due to missing exception recovery on XSETBV
* CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55:
Multiple vulnerabilities in libelf PV kernel handling
* CVE-2013-2072 / XSA-56:
Buffer overflow in xencontrol Python bindings affecting xend
* CVE-2013-2211 / XSA-57:
libxl allows guest write access to sensitive console related xenstore keys
* CVE-2013-1432 / XSA-58:
Page reference counting error due to XSA-45/CVE-2013-1918 fixes
* XSA-61:
libxl partially sets up HVM passthrough even with disabled iommu
The following minor vulnerability is also being addressed:
* CVE-2013-2007 / XSA-51
qemu guest agent (qga) insecure file permissions
Among many bug fixes and improvements:
* addressing a regression from the fix for XSA-46
* bug fixes to low level system state handling, including certain
hardware errata workarounds
Diffstat (limited to 'sysutils/xentools42/distinfo')
-rw-r--r-- | sysutils/xentools42/distinfo | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/sysutils/xentools42/distinfo b/sysutils/xentools42/distinfo index 0c6ea42e9d9..72f8631d99b 100644 --- a/sysutils/xentools42/distinfo +++ b/sysutils/xentools42/distinfo @@ -1,11 +1,11 @@ -$NetBSD: distinfo,v 1.6 2013/06/17 13:54:02 wiz Exp $ +$NetBSD: distinfo,v 1.7 2013/09/12 23:37:18 prlw1 Exp $ SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485 RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547 Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes -SHA1 (xen-4.2.2.tar.gz) = b48cc7f375e9a5d65ff2d680f1b512dbea5a3b7c -RMD160 (xen-4.2.2.tar.gz) = 925cb2abdd080254a5457d1b304f811036261ab6 -Size (xen-4.2.2.tar.gz) = 15602746 bytes +SHA1 (xen-4.2.3.tar.gz) = 7c72e1aa870cc938afdc50bd9f2d879118aa8b99 +RMD160 (xen-4.2.3.tar.gz) = da0fbb7bbc0796bd83c223f7d21015ce0d4c8553 +Size (xen-4.2.3.tar.gz) = 15613235 bytes SHA1 (patch-.._.._ipxe_src_Makefile.housekeeping) = 5ec8020a9705b2f64096c2942473a8de4db578bb SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808 SHA1 (patch-.._.._ipxe_src_arch_i386_scripts_i386.lds) = 4c0cbb7f535be43e1b6f53c284340a8bafc37c0b |