summaryrefslogtreecommitdiff
path: root/sysutils/xentools42/patches
diff options
context:
space:
mode:
authorprlw1 <prlw1@pkgsrc.org>2014-02-22 01:28:23 +0000
committerprlw1 <prlw1@pkgsrc.org>2014-02-22 01:28:23 +0000
commit22a7ad979bd1023718efa0bde7697109954b8d17 (patch)
treea0d78fa9692ed25aa371094420034b3b61559409 /sysutils/xentools42/patches
parent809191ba3216ad7de78ebdff380d20c60e1499ba (diff)
downloadpkgsrc-22a7ad979bd1023718efa0bde7697109954b8d17.tar.gz
Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a This fixes the following critical vulnerabilities: - CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with PCI passthrough - CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs - CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation - CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation - CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation - CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting info - CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub - CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press ure - CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak - CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies - CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t able locks - CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo ck - CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution - CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu ests - CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code - CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed - CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang - CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri ng IRQ setup - CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls - CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall - CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes - CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege d guests - CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre ssure Apart from those there are many further bug fixes and improvements.
Diffstat (limited to 'sysutils/xentools42/patches')
-rw-r--r--sysutils/xentools42/patches/patch-libxc_xc_dom_h13
1 files changed, 0 insertions, 13 deletions
diff --git a/sysutils/xentools42/patches/patch-libxc_xc_dom_h b/sysutils/xentools42/patches/patch-libxc_xc_dom_h
deleted file mode 100644
index 07ef6235494..00000000000
--- a/sysutils/xentools42/patches/patch-libxc_xc_dom_h
+++ /dev/null
@@ -1,13 +0,0 @@
-$NetBSD: patch-libxc_xc_dom_h,v 1.1 2013/12/08 19:17:56 riz Exp $
-
---- libxc/xc_dom.h.orig 2013-11-29 18:20:47.000000000 +0000
-+++ libxc/xc_dom.h 2013-11-29 18:22:14.000000000 +0000
-@@ -303,7 +303,7 @@ static inline void *xc_dom_vaddr_to_ptr(
- if ( ptr == NULL )
- return ptr;
- *safe_region_out = (safe_region_count << XC_DOM_PAGE_SHIFT(dom)) - offset;
-- return ptr;
-+ return ptr + offset;
- }
-
- static inline int xc_dom_feature_translated(struct xc_dom_image *dom)