summaryrefslogtreecommitdiff
path: root/sysutils/xentools42/distinfo
diff options
context:
space:
mode:
authorprlw1 <prlw1@pkgsrc.org>2013-09-12 23:37:18 +0000
committerprlw1 <prlw1@pkgsrc.org>2013-09-12 23:37:18 +0000
commitef9dbf5996db2365d0f5352f7025b6a13a304803 (patch)
tree58e0711b1808b82a39745e6e2a0e6935bcebda2e /sysutils/xentools42/distinfo
parent29afa1f03961f938da11a6599ee5fa077c71de0b (diff)
downloadpkgsrc-ef9dbf5996db2365d0f5352f7025b6a13a304803.tar.gz
Update xen to 4.2.3
- Add warning if /kern/xen/privcmd is not readable Fixes the following critical vulnerabilities: * CVE-2013-1918 / XSA-45: Several long latency operations are not preemptible * CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw for bridges * CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs * CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception recovery on XRSTOR * CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception recovery on XSETBV * CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple vulnerabilities in libelf PV kernel handling * CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings affecting xend * CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive console related xenstore keys * CVE-2013-1432 / XSA-58: Page reference counting error due to XSA-45/CVE-2013-1918 fixes * XSA-61: libxl partially sets up HVM passthrough even with disabled iommu The following minor vulnerability is also being addressed: * CVE-2013-2007 / XSA-51 qemu guest agent (qga) insecure file permissions Among many bug fixes and improvements: * addressing a regression from the fix for XSA-46 * bug fixes to low level system state handling, including certain hardware errata workarounds
Diffstat (limited to 'sysutils/xentools42/distinfo')
-rw-r--r--sysutils/xentools42/distinfo8
1 files changed, 4 insertions, 4 deletions
diff --git a/sysutils/xentools42/distinfo b/sysutils/xentools42/distinfo
index 0c6ea42e9d9..72f8631d99b 100644
--- a/sysutils/xentools42/distinfo
+++ b/sysutils/xentools42/distinfo
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.6 2013/06/17 13:54:02 wiz Exp $
+$NetBSD: distinfo,v 1.7 2013/09/12 23:37:18 prlw1 Exp $
SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485
RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547
Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes
-SHA1 (xen-4.2.2.tar.gz) = b48cc7f375e9a5d65ff2d680f1b512dbea5a3b7c
-RMD160 (xen-4.2.2.tar.gz) = 925cb2abdd080254a5457d1b304f811036261ab6
-Size (xen-4.2.2.tar.gz) = 15602746 bytes
+SHA1 (xen-4.2.3.tar.gz) = 7c72e1aa870cc938afdc50bd9f2d879118aa8b99
+RMD160 (xen-4.2.3.tar.gz) = da0fbb7bbc0796bd83c223f7d21015ce0d4c8553
+Size (xen-4.2.3.tar.gz) = 15613235 bytes
SHA1 (patch-.._.._ipxe_src_Makefile.housekeeping) = 5ec8020a9705b2f64096c2942473a8de4db578bb
SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808
SHA1 (patch-.._.._ipxe_src_arch_i386_scripts_i386.lds) = 4c0cbb7f535be43e1b6f53c284340a8bafc37c0b