summaryrefslogtreecommitdiff
path: root/sysutils
diff options
context:
space:
mode:
authorprlw1 <prlw1>2014-02-22 01:28:23 +0000
committerprlw1 <prlw1>2014-02-22 01:28:23 +0000
commitc46fb4c9f191be7795a2d3eca6adc650d9cf0ed4 (patch)
treea0d78fa9692ed25aa371094420034b3b61559409 /sysutils
parent24fe0998a518b0a981d7d18f2d070be5e50a7b87 (diff)
downloadpkgsrc-c46fb4c9f191be7795a2d3eca6adc650d9cf0ed4.tar.gz
Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a This fixes the following critical vulnerabilities: - CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with PCI passthrough - CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs - CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation - CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation - CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation - CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting info - CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub - CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press ure - CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak - CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies - CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t able locks - CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo ck - CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution - CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu ests - CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code - CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed - CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang - CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri ng IRQ setup - CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls - CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall - CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes - CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege d guests - CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre ssure Apart from those there are many further bug fixes and improvements.
Diffstat (limited to 'sysutils')
-rw-r--r--sysutils/xentools42/Makefile5
-rw-r--r--sysutils/xentools42/distinfo9
-rw-r--r--sysutils/xentools42/patches/patch-libxc_xc_dom_h13
3 files changed, 6 insertions, 21 deletions
diff --git a/sysutils/xentools42/Makefile b/sysutils/xentools42/Makefile
index ee7b6e70e96..fc6f70f018b 100644
--- a/sysutils/xentools42/Makefile
+++ b/sysutils/xentools42/Makefile
@@ -1,11 +1,10 @@
-# $NetBSD: Makefile,v 1.15 2014/01/25 10:45:21 wiz Exp $
+# $NetBSD: Makefile,v 1.16 2014/02/22 01:28:23 prlw1 Exp $
-VERSION= 4.2.3
+VERSION= 4.2.4
VERSION_IPXE= 1.0.0
DISTNAME= xen-${VERSION}
PKGNAME= xentools42-${VERSION}
-PKGREVISION= 3
CATEGORIES= sysutils
MASTER_SITES= http://bits.xensource.com/oss-xen/release/${VERSION}/
diff --git a/sysutils/xentools42/distinfo b/sysutils/xentools42/distinfo
index fad5e34d950..2d3d7dcc444 100644
--- a/sysutils/xentools42/distinfo
+++ b/sysutils/xentools42/distinfo
@@ -1,11 +1,11 @@
-$NetBSD: distinfo,v 1.9 2013/12/08 19:17:56 riz Exp $
+$NetBSD: distinfo,v 1.10 2014/02/22 01:28:23 prlw1 Exp $
SHA1 (ipxe-git-v1.0.0.tar.gz) = da052c8de5f3485fe0253c19cf52ed6d72528485
RMD160 (ipxe-git-v1.0.0.tar.gz) = dcd9b6eaafa1ce05c1ebf2a15f2f73ad7a8c5547
Size (ipxe-git-v1.0.0.tar.gz) = 1996881 bytes
-SHA1 (xen-4.2.3.tar.gz) = 7c72e1aa870cc938afdc50bd9f2d879118aa8b99
-RMD160 (xen-4.2.3.tar.gz) = da0fbb7bbc0796bd83c223f7d21015ce0d4c8553
-Size (xen-4.2.3.tar.gz) = 15613235 bytes
+SHA1 (xen-4.2.4.tar.gz) = ab661bf0f64a18155f971343a9c07b7e7d1410f1
+RMD160 (xen-4.2.4.tar.gz) = b2210d3ff6a9fdf9cae1a5a38b829667dfd6fd2f
+Size (xen-4.2.4.tar.gz) = 15663999 bytes
SHA1 (patch-.._.._ipxe_src_Makefile.housekeeping) = 5ec8020a9705b2f64096c2942473a8de4db578bb
SHA1 (patch-.._.._ipxe_src_arch_i386_include_librm.h) = 4549ac641b112321b4731a918d85219c3fce6808
SHA1 (patch-.._.._ipxe_src_arch_i386_scripts_i386.lds) = 4c0cbb7f535be43e1b6f53c284340a8bafc37c0b
@@ -41,7 +41,6 @@ SHA1 (patch-include_xen-sys_NetBSD_gntdev.h) = 25c99a428fda6dee709888ddbcfdcfef5
SHA1 (patch-libfsimage_common_Makefile) = c3cc5335a1d6b066307c5f03fe72f513a9eb2bdb
SHA1 (patch-libfsimage_ufs_ufs.h) = dc59f33cf3abd08a8cdee5977ca4168613327513
SHA1 (patch-libxc_xc__netbsd.c) = c94a2f7b38bfc1479401acf1bb124251bb4e3fcf
-SHA1 (patch-libxc_xc_dom_h) = b89785a97208454eb3f2e1e43ba4674ad0828aa6
SHA1 (patch-libxl_libxl__create.c) = a212b3760f1bb796c6f126e5c795154f4e8030e2
SHA1 (patch-libxl_libxl__internal.h) = f8ff92400f7ba7858cc1963b11c1e8ee23d4e51f
SHA1 (patch-ocaml_common.make) = c59d32301198d65691ab23529dd791de5ac40199
diff --git a/sysutils/xentools42/patches/patch-libxc_xc_dom_h b/sysutils/xentools42/patches/patch-libxc_xc_dom_h
deleted file mode 100644
index 07ef6235494..00000000000
--- a/sysutils/xentools42/patches/patch-libxc_xc_dom_h
+++ /dev/null
@@ -1,13 +0,0 @@
-$NetBSD: patch-libxc_xc_dom_h,v 1.1 2013/12/08 19:17:56 riz Exp $
-
---- libxc/xc_dom.h.orig 2013-11-29 18:20:47.000000000 +0000
-+++ libxc/xc_dom.h 2013-11-29 18:22:14.000000000 +0000
-@@ -303,7 +303,7 @@ static inline void *xc_dom_vaddr_to_ptr(
- if ( ptr == NULL )
- return ptr;
- *safe_region_out = (safe_region_count << XC_DOM_PAGE_SHIFT(dom)) - offset;
-- return ptr;
-+ return ptr + offset;
- }
-
- static inline int xc_dom_feature_translated(struct xc_dom_image *dom)