diff options
author | tron <tron> | 2014-09-28 13:28:58 +0000 |
---|---|---|
committer | tron <tron> | 2014-09-28 13:28:58 +0000 |
commit | 4a32f2b97b6d8d4d0b201611222085da024cb05a (patch) | |
tree | 49cb2a0d0ccfbebd5945c5f58c7cc37d9d0554e5 /sysutils/xentools42/distinfo | |
parent | 512a20c5c1b98f36fbe5193d7b25b820cfcfedc8 (diff) | |
download | pkgsrc-4a32f2b97b6d8d4d0b201611222085da024cb05a.tar.gz |
Pullup ticket #4506 - requested by bouyer
sysutils/xenkernel42: security patch
Revisions pulled up:
- sysutils/xenkernel42/Makefile 1.8
- sysutils/xenkernel42/distinfo 1.6
- sysutils/xenkernel42/patches/patch-xen_arch_x86_mm_shadow_common.c 1.1
- sysutils/xenkernel42/patches/patch-xen_arch_x86_x86_emulate_x86_emulate.c 1.1
- sysutils/xentools42/Makefile 1.23
- sysutils/xentools42/distinfo 1.12
---
Module Name: pkgsrc
Committed By: bouyer
Date: Fri Sep 26 10:39:32 UTC 2014
Modified Files:
pkgsrc/sysutils/xenkernel42: Makefile distinfo
pkgsrc/sysutils/xentools42: distinfo
Added Files:
pkgsrc/sysutils/xenkernel42/patches:
patch-xen_arch_x86_mm_shadow_common.c
patch-xen_arch_x86_x86_emulate_x86_emulate.c
Log Message:
Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
of software interrupts
---
Module Name: pkgsrc
Committed By: bouyer
Date: Fri Sep 26 10:40:45 UTC 2014
Modified Files:
pkgsrc/sysutils/xentools42: Makefile
Log Message:
Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
of software interrupts
Diffstat (limited to 'sysutils/xentools42/distinfo')
-rw-r--r-- | sysutils/xentools42/distinfo | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/sysutils/xentools42/distinfo b/sysutils/xentools42/distinfo index 2d3d7dcc444..80378d5be77 100644 --- a/sysutils/xentools42/distinfo +++ b/sysutils/xentools42/distinfo @@ -1,11 +1,11 @@ -$NetBSD: distinfo,v 1.10 2014/02/22 01:28:23 prlw1 Exp $ +$NetBSD: distinfo,v 1.10.4.1 2014/09/28 13:28:58 tron Exp $ SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485 RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547 Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes -SHA1 (xen-4.2.4.tar.gz) = ab661bf0f64a18155f971343a9c07b7e7d1410f1 -RMD160 (xen-4.2.4.tar.gz) = b2210d3ff6a9fdf9cae1a5a38b829667dfd6fd2f -Size (xen-4.2.4.tar.gz) = 15663999 bytes +SHA1 (xen-4.2.5.tar.gz) = f42741e4ec174495ace70c4b17a6b9b0e60e798a +RMD160 (xen-4.2.5.tar.gz) = 7d4f7f1b32ee541d341a756b1f8da02816438d19 +Size (xen-4.2.5.tar.gz) = 15671925 bytes SHA1 (patch-.._.._ipxe_src_Makefile.housekeeping) = 5ec8020a9705b2f64096c2942473a8de4db578bb SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808 SHA1 (patch-.._.._ipxe_src_arch_i386_scripts_i386.lds) = 4c0cbb7f535be43e1b6f53c284340a8bafc37c0b |