summaryrefslogtreecommitdiff
path: root/sysutils/xenkernel41/distinfo
AgeCommit message (Collapse)AuthorFilesLines
2016-09-08Backport upstream patches for security issues:bouyer1-1/+4
XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[] bump PKGREVISION
2016-07-26Apply security patch from XSA-182. Bump PKGREVISIONbouyer1-1/+2
xen 4.2 is not vulnerable to XSA-183.
2016-03-01Newer binutils requires cmpw access to %r11 to explicitly qualify thejoerg1-1/+2
16bit part as %r11w.
2016-01-07Apply patches from Xen repository, fixing:bouyer1-1/+3
CVE-2015-8339 and CVE-2015-8340 aka XSA-159 XSA-166 CVE-2015-8550 aka XSA-155 CVE-2015-8554 aka XSA-164 Bump pkgrevision
2015-12-29Fix missing/broken rcsids.dholland1-3/+3
2015-11-04Add SHA512 digests for distfiles for sysutils categoryagc1-1/+2
Problems found with existing digests: Package memconf distfile memconf-2.16/memconf.gz b6f4b736cac388dddc5070670351cf7262aba048 [recorded] 95748686a5ad8144232f4d4abc9bf052721a196f [calculated] Problems found locating distfiles: Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9 Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2015-10-29Add patches, derived from Xen security advisory, fixing:bouyer1-1/+4
CVE-2015-7835 aka XSA-148 CVE-2015-7869 aka XSA-149 + XSA-151 CVE-2015-7971 aka XSA-152 Bump PKGREVISION
2015-09-14Avoid undefined behavior when left-shifting negative values.joerg1-1/+2
2015-04-19apply fixes from upstream forspz1-1/+3
XSA-125 Long latency MMIO mapping operations are not preemptible XSA-126 Unmediated PCI command register access in qemu
2015-03-10xsa123-4.3-4.2.patch from upstream:spz1-1/+2
x86emul: fully ignore segment override for register-only operations For ModRM encoded instructions with register operands we must not overwrite ea.mem.seg (if a - bogus in that case - segment override was present) as it aliases with ea.reg. This is CVE-2015-2151 / XSA-123.
2015-03-05Add patches for XSA-121 and XSA-122 from upstream.spz1-1/+3
2014-12-21Remove patch-CVE-2014-7188, it's already in patch-CVE-2013-4355_1bouyer1-2/+1
2014-11-27backport patches from Xen advisory:bouyer1-1/+7
CVE-2014-7188/XSA-108: x86/HVM: properly bound x2APIC MSR range, fixing: A buggy or malicious HVM guest can crash the host or read data relating to other guests or the hypervisor itself. CVE-2014-8594/XSA-109: x86: don't allow page table updates on non-PV page tables in do_mmu_update(), fixing: Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 can mount a denial of service attack which, if successful, can affect the whole system. CVE-2014-8595/XSA-110: x86emul: enforce privilege level restrictions when loading CS, fixing: Malicious HVM guest user mode code may be able to elevate its privileges to guest supervisor mode, or to crash the guest. CVE-2014-8866/XSA-111: x86: limit checks in hypercall_xlat_continuation() to actual arguments, fixing: A buggy or malicious HVM guest can crash the host. CVE-2014-8867/XSA-112: x86/HVM: confine internally handled MMIO to solitary regions, fixing: A buggy or malicious HVM guest can crash the host. CVE-2014-9030/XSA-113: x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE, fixing: Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 can mount a denial of service attack which, if successful, can affect the whole system.
2014-10-01fix out-of-bounds memory read access in x2APIC emulation (HVM only)drochner1-2/+2
(CVE-2014-7188) bump PKGREV
2014-09-26Add patch for:bouyer1-1/+4
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation of software interrupts bump PKGREVISION
2014-06-18add patch from upstream to fix possible data leak (CVE-2014-4021)drochner1-1/+2
bump PKGREV
2014-05-05fix possible creation of invalid P2M entries, leading to xen crashdrochner1-2/+3
The vulnerability is only exposed to service domains for HVM guests which have privilege over the guest. In a usual configuration that means only device model emulators (qemu-dm). bump PKGREV
2014-03-28add patch from upstream (XSA-89) to fix:drochner1-2/+2
Processing of the HVMOP_set_mem_access HVM control operations does not check the size of its input and can tie up a physical CPU for extended periods of time. bump PKGREV
2014-02-20from upstream: fix the fix for CVE-2013-6885drochner1-2/+2
makes the workaround for AMD CPU erratum 793 work not only on 64-bit hypervisors but also for 32bit bump PKGREV (compile tested only)
2014-01-24add patch from upstream to add missing privilege checkdrochner1-1/+2
from the advisory: Malicious or misbehaving unprivileged guests can cause the host or other guests to malfunction. This can result in host-wide denial of service. Privilege escalation, while seeming to be unlikely, cannot be excluded. Only PV guests can take advantage of this vulnerability. (CVE-2014-1666) bump PKGREV
2013-12-04add patch from upstream to fixdrochner1-1/+3
"Guest triggerable AMD CPU erratum may cause host hang" bump PKGREV
2013-11-29add patches from upstream to fix two security problems:drochner1-2/+3
-another lock inversion -privilege escalation (not exploitable in standard setups) bump PKGREV
2013-11-23add patch from upstream to fix lock order inversion possibly leadingdrochner1-1/+2
to deadlock (CVE-2013-4494) bump PKGREV
2013-10-22add patch from upstream to fix information leak through outs instructiondrochner1-1/+2
emulation (CVE-2013-4368) bump PKGREV
2013-10-01add patches from upstream to fix security problems:drochner1-1/+7
-Information leak on AVX and/or LWP capable CPUs (CVE-2013-1442 / XSA-62) -Information leaks through I/O instruction emulation (CVE-2013-4355 / XSA-63) -Information leak through fbld instruction emulation (CVE-2013-4361 / XSA-66) bump PKGREV
2013-09-11update to 4.1.6.1drochner1-20/+5
This release fixes the following critical vulnerabilities: CVE-2013-1918 / XSA-45: Several long latency operations are not preemptible CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw for bridges CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception recovery on XRSTOR CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception recovery on XSETBV CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple vulnerabilities in libelf PV kernel handling CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings affecting xend CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive console related xenstore keys CVE-2013-1432 / XSA-58: Page reference counting error due to XSA-45/CVE-2013-1918 fixes XSA-61: libxl partially sets up HVM passthrough even with disabled iommu This release contains many bug fixes and improvements. The highlights are: addressing a regression from the fix for XSA-21 addressing a regression from the fix for XSA-46 bug fixes to low level system state handling, including certain hardware errata workarounds (CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before)
2013-07-13Fix header guard.joerg1-1/+2
2013-05-03update to 4.1.5drochner1-12/+18
This integrates fixes for all vulnerabilities which were patched in pkgsrc before. Among many bug fixes and improvements (around 50 since Xen 4.1.4): * ACPI APEI/ERST finally working on production systems * Bug fixes for other low level system state handling * Support for xz compressed Dom0 and DomU kernels
2013-04-19Add patches from Xen security advisory:bouyer1-1/+7
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html http://lists.xen.org/archives/html/xen-announce/2013-04/msg00005.html http://lists.xen.org/archives/html/xen-announce/2013-04/msg00006.html bump PKGREVISION
2013-04-11Allow building Xen infrastructure with Clang. Fix various bugs injoerg1-1/+6
xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang default warnings. Bump revisions for those.
2013-01-20oops, a patch was in the wrong sub-pkgdrochner1-2/+1
bump PKGREV
2013-01-17update to 4.1.4drochner1-17/+7
changes: -fixes for many vulnerabilities (were mostly patched in pkgsrc) -bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are: -A fix for a long standing time management issue -Bug fixes for S3 (suspend to RAM) handling -Bug fixes for other low level system state handling pkgsrc note: fixes for CVE-2012-5634 (interrupt issue on IOMMU systems) and CVE-2012-6075 (oversized packets from e1000 driver) are already included
2012-12-05add another batch of security patches from upstreamdrochner1-2/+8
bump PKGREV
2012-11-14add patches from Xen SA 20..24 to fix various security problemsdrochner1-3/+7
(CVE-2012-4535..4539) bump PKGREV
2012-09-12update to 4.1.3drochner1-8/+7
also add security patches from upstream (for CVE-2012-3497, no patches are available yet) changes: -fixes for vulnerabilities were integrated -many bug fixes and improvements, Highlights are: -Updates for the latest Intel/AMD CPU revisions -Bug fixes for IOMMU handling (device passthrough to HVM guests) approved by maintainer
2012-08-10add patch from upstream to fix a possible DOS by HVM guests on teardowndrochner1-1/+2
(CVE-2012-3433) bump PKGREV
2012-07-27add patch from upstream to fix bug in MMIO emulation which can causedrochner1-1/+2
guest crashes by unprivileged users, only for HVM guests, and if MMIO is granted to the user process (CVE-2012-3432) bump PKGREV
2012-06-12pull up patches from upstream, fixing XSA7, XSA8 and XSA9.bouyer1-1/+3
PKGREVISION++
2011-10-21Update to Xen 4.1.2cegger1-4/+4
Fixes/features include: * New XL toolstack * kexec/kdump * Remus * Device passthrough to HVM guests * Interrupt handling * Support for Supervisor Mode Execution Protection (SMEP)
2011-08-14Fix build with gcc 4.5.3 under NetBSDabs1-1/+2
2011-06-16Apply build fix about redefining va_list.cegger1-1/+2
Failure has been reported to get fixed upstream.
2011-06-16Xen 4.1.1 (maintenance release)cegger1-7/+4
* Security fixes including CVE-2011-1583 CVE-2011-1898 * Enhancements to guest introspection (VM single stepping support for very fine-grained access control) * Many stability improvements, such as: PV-on-HVM stability fixes (fixing some IRQ issues), XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions), RAS fixes for high availability, fixes for offlining bad pages and changes to libxc, mainly of benefit to libvirt * Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs.
2011-05-07xenkernel41 didn't build on current/amd64.tnn1-1/+3
It uses -nostdinc and tries to use #include <stdarg.h> through a local copy of stdarg.h, which can't work. Fixed this by putting the relevant builtin stdarg definitions for NetBSD in the local copy.
2011-04-06Xen is a virtual machine monitor which supports running multiplecegger1-0/+6
guests operating systems on a single machine. Guest OSes (also called "domains" ) require a modified kernel which supports Xen hypercalls in replacement to access to the physical hardware. At boot, the xen kernel is loaded along with the guest kernel for the first domain (called domain0). domain0 has privileges to access the physical hardware (PCI and ISA devices), administrate other domains and provide virtual devices (disks and network) to other domains. This package contains the Xen4 kernel itself. Release notes: The Xen team is pleased to announce the release of Xen 4.1. The result of nearly 12 months of development, new features include: * A re-architected and improved XL toolstack replacing XM/XEND * Prototype credit2 scheduler designed for latency-sensitive workloads and very large systems. * CPU Pools for advanced partitioning. * Support for large systems (>255 processors) * Support for x86 Advanced Vector eXtension (AVX). * New Memory Access API enabling integration of 3rd party security solutions into Xen virtualized environments. * Many IOMMU fixes (both Intel VT-d IOMMU and AMD IOMMU). * Many toolstack and buildsystem fixes for Linux and NetBSD hosts. * Thirdparty libs: libvirt driver for libxl has been merged to upstream libvirt. * HVM guest PXE boot enhancements, replacing gPXE with iPXE. * Even better stability through our new automated regression tests. Detailed release notes, including a more extensive feature list: http://wiki.xen.org/xenwiki/Xen4.1 To download tarballs: http://xen.org/products/xen_source.html Or the Mercurial source repository (tag 'RELEASE-4.1.0'): http://xenbits.xen.org/xen-unstable.hg And the announcement on the Xen blog: http://blog.xen.org/index.php/2011/03/25/xen-4-1-releases/ Thanks to the many people who have contributed to this release! Regards, The Xen Team