Commit graph

40 commits

Author SHA1 Message Date
maya
f34a8c24a3 PKGREVISION bump for anything using python without a PYPKGPREFIX.
This is a semi-manual PKGREVISION bump.
2019-04-25 07:32:34 +00:00
maya
45787ad608 sysutils/xen*: invert python version logic, only 2.7 is ok.
Mostly so we don't match python37 on xen 4.11, but also because python3
is a moving target and this saves us having to add the next version.
2018-07-24 17:29:08 +00:00
adam
a31bce9748 extend PYTHON_VERSIONS_ for Python 3.7 2018-07-03 05:03:01 +00:00
jperkin
4942f4e537 xen*: Use SSP_SUPPORTED=no instead of PKGSRC_USE_SSP=no. 2018-01-15 09:47:54 +00:00
maya
18d0394264 Don't force enable ssp on xenkernel packages. fixes build 2017-07-24 08:53:45 +00:00
bouyer
a3b41ba940 Change http://bits.xensource.com/oss-xen/release/ to
https://downloads.xenproject.org/release/xen/, as new releases won't
be uploaded to bits.xensource.com
2017-04-13 13:08:33 +00:00
joerg
6f74d7588f Ignore a couple more warnings when building with clang. 2017-02-14 21:36:15 +00:00
wiz
7f84153239 Add python-3.6 to incompatible versions. 2017-01-01 14:43:22 +00:00
bouyer
c0960565ee Apply patch backported from upstream, fixing XSA-202
Bump PKGREVISION
2016-12-21 15:35:44 +00:00
bouyer
ddfd3579ca Apply upstream patch for XSA-199, XSA-200 and XSA-204.
Bump PKGREVISIONs
2016-12-20 10:22:28 +00:00
bouyer
76261625f6 Backport upstream patches, fixing today's XSA 191, 192, 195, 197, 198.
Bump PKGREVISIONs
2016-11-22 20:53:40 +00:00
maya
8440c3d9dd xenkernel42: apply upstream's build fix for GCC5
Requested by Andreas Gustafsson in PR pkg/51382
2016-09-12 13:22:39 +00:00
bouyer
e89dd86774 Backport upstream patches for security issues:
XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests
XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]
bump PKGREVISION
2016-09-08 15:41:01 +00:00
bouyer
6c7c5a8103 Apply security patch from XSA-182. Bump PKGREVISION
xen 4.2 is not vulnerable to XSA-183.
2016-07-26 15:38:00 +00:00
wiz
ad0031c15e Remove python33: adapt all packages that refer to it. 2016-07-09 13:03:30 +00:00
bouyer
cbfec52636 pply patches from Xen repository, fixing:
CVE-2015-5307 and CVE-2015-8104 aka XSA-156
CVE-2015-8339 and CVE-2015-8340 aka XSA-159
CVE-2015-8555 aka XSA-165
XSA-166
CVE-2015-8550 aka XSA-155
CVE-2015-8554 aka XSA-164
Bump pkgrevision
2016-01-07 17:53:58 +00:00
adam
7f3b4730ad Extend PYTHON_VERSIONS_INCOMPATIBLE to 35 2015-12-05 21:25:27 +00:00
agc
17886c78da Add SHA512 digests for distfiles for sysutils category
Problems found with existing digests:
	Package memconf distfile memconf-2.16/memconf.gz
	b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
	95748686a5ad8144232f4d4abc9bf052721a196f [calculated]

Problems found locating distfiles:
	Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
	Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
	Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
	Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
	Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:32:05 +00:00
bouyer
229ba9d8c0 Add patches, derived from Xen security advisory, fixing:
CVE-2015-7835 aka XSA-148
CVE-2015-7869 aka XSA-149 + XSA-151
CVE-2015-7971 aka XSA-152
Bump PKGREVISION
2015-10-29 21:59:16 +00:00
joerg
2a425e36dc Avoid undefined behavior when left-shifting negative values. 2015-09-14 13:36:29 +00:00
spz
fcf436606c Apply patches for XSA-128 to XSA-140 from upstream
do a patch refresh in xentools42

rather than split the patches for pass-through.c over 5 files, delete
xentools42/patches/patch-CVE-2015-2756 and assemble all in
xentools42/patches/patch-qemu-xen-traditional_hw_pass-through.c
2015-08-23 16:17:12 +00:00
khorben
e20ca94c86 Apply fixes from upstream for XSA-133
XXX pull-ups
2015-06-05 18:18:41 +00:00
spz
3cfbbfbd64 apply fixes from upstream for
XSA-125 Long latency MMIO mapping operations are not preemptible
XSA-126 Unmediated PCI command register access in qemu
2015-04-19 13:13:20 +00:00
joerg
3e96b0a3d1 Fix build with Clang. 2015-03-18 15:05:51 +00:00
spz
f76be2dd83 xsa123-4.3-4.2.patch from upstream:
x86emul: fully ignore segment override for register-only operations

For ModRM encoded instructions with register operands we must not
overwrite ea.mem.seg (if a - bogus in that case - segment override was
present) as it aliases with ea.reg.

This is CVE-2015-2151 / XSA-123.
2015-03-10 19:50:15 +00:00
spz
5dcb0fc09f Add patches for XSA-121 and XSA-122 from upstream. 2015-03-05 13:44:57 +00:00
spz
0b57466895 ... now with the actual patch 2014-12-30 08:15:01 +00:00
spz
9cd06414a0 fixing XSA-114 from upstream patch 2014-12-30 08:14:15 +00:00
bouyer
63d34e3300 Apply patch from Xen advisory:
CVE-2014-8594/XSA-109:
x86: don't allow page table updates on non-PV page tables in do_mmu_update(),
fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.

CVE-2014-8595/XSA-110:
x86emul: enforce privilege level restrictions when loading CS, fixing:
Malicious HVM guest user mode code may be able to elevate its
privileges to guest supervisor mode, or to crash the guest.


CVE-2014-8866/XSA-111:
x86: limit checks in hypercall_xlat_continuation() to actual arguments, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-8867/XSA-112:
x86/HVM: confine internally handled MMIO to solitary regions, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-9030/XSA-113:
x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE, fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.
2014-11-27 15:20:31 +00:00
bouyer
ec39495bca Add patch from upstream, fixing CVE-2014-7188 / XSA-108:
Improper MSR range used for x2APIC emulation
Bump PKGREVISION
2014-10-01 17:34:54 +00:00
bouyer
a4e5e15a83 Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
  created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests

pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
  LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
  of software interrupts
2014-09-26 10:39:31 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
prlw1
07c93a98dd Update xenkernel42 to 4.2.4
This fixes the following critical vulnerabilities:

- CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with PCI passthrough
- CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
- CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
- CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
- CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
- CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting info
- CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
- CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory pressure
- CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
- CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
- CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant table locks
- CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlock
- CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
- CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM guests
- CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
- CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
- CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
- CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption during IRQ setup
- CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
- CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
- CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
- CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
- CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pressure

Apart from those there are many further bug fixes and improvements.
2014-02-22 01:22:49 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
joerg
3d4dd76d69 Catch up with Clang ToT when it comes to various warnings and
unsupported options.
2013-11-07 00:47:39 +00:00
prlw1
ae8a049aec Update xen to 4.2.3
- Add warning if /kern/xen/privcmd is not readable

Fixes the following critical vulnerabilities:
 * CVE-2013-1918 / XSA-45:
    Several long latency operations are not preemptible
 * CVE-2013-1952 / XSA-49:
    VT-d interrupt remapping source validation flaw for bridges
 * CVE-2013-2076 / XSA-52:
    Information leak on XSAVE/XRSTOR capable AMD CPUs
 * CVE-2013-2077 / XSA-53:
    Hypervisor crash due to missing exception recovery on XRSTOR
 * CVE-2013-2078 / XSA-54:
    Hypervisor crash due to missing exception recovery on XSETBV
 * CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55:
    Multiple vulnerabilities in libelf PV kernel handling
 * CVE-2013-2072 / XSA-56:
    Buffer overflow in xencontrol Python bindings affecting xend
 * CVE-2013-2211 / XSA-57:
    libxl allows guest write access to sensitive console related xenstore keys
 * CVE-2013-1432 / XSA-58:
    Page reference counting error due to XSA-45/CVE-2013-1918 fixes
 * XSA-61:
    libxl partially sets up HVM passthrough even with disabled iommu

The following minor vulnerability is also being addressed:
 * CVE-2013-2007 / XSA-51
    qemu guest agent (qga) insecure file permissions

Among many bug fixes and improvements:
 * addressing a regression from the fix for XSA-46
 * bug fixes to low level system state handling, including certain
    hardware errata workarounds
2013-09-12 23:37:18 +00:00
joerg
8fb971391a Fix header guard. 2013-07-13 19:43:21 +00:00
gdt
71c33cddb9 Explain xen version differences.
There are 5 versions of xen in pkgsrc, which is confusing.  Explain in
DESCR which version is in which package (xenkernel3 contains 3.1), and
which versions support PCI passthrough (only 3.1).  Explain which
versions support non-PAE (3.1) and PAE (3.3, 4.1, 4.2), because the
HOWTO is out of date and it's easy to end up with a non-working system
on a 3.1 to 3.3 update.  Cuation that 2.0 is beyond crufty.

This is a DESCR-only change (with PKGREVISION++ of course).

(ok during freeze agc@)
2013-06-19 14:03:41 +00:00
joerg
2fcb33b1f7 Merge Clang fixes from xenkernel41. 2013-06-13 21:49:59 +00:00
jnemeth
098762889a Initial import of Xen 4.2. This is kernel part.
---- 4.2.2

Xen 4.2.2 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.1 upgrade to Xen 4.2.2.

    This release fixes the following critical vulnerabilities:
        CVE-2012-5634 / XSA-33: VT-d interrupt remapping source
            validation flaw
        CVE-2013-0151 / XSA-34: nested virtualization on 32-bit
            exposes host crash
        CVE-2013-0152 / XSA-35: Nested HVM exposes host to being
            driven out of memory by guest
        CVE-2013-0153 / XSA-36: interrupt remap entries shared and
            old ones not cleared on AMD IOMMUs
        CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect
            ASSERT (debug build only)
        CVE-2013-0215 / XSA-38: oxenstored incorrect handling of
            certain Xenbus ring states
        CVE-2012-6075 / XSA-41: qemu (e1000 device driver): Buffer
            overflow when processing large packets
        CVE-2013-1917 / XSA-44: Xen PV DoS vulnerability with SYSENTER
        CVE-2013-1919 / XSA-46: Several access permission issues with
            IRQs for unprivileged guests
        CVE-2013-1920 / XSA-47: Potential use of freed memory in event
            channel operations
        CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
            format specification
    This release contains many bug fixes and improvements (around
    100 since Xen 4.2.1). The highlights are:
        ACPI APEI/ERST finally working on production systems
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization

----- 4.2.1

Xen 4.2.1 is a maintenance release in the 4.2 series and contains:
We recommend that all users of Xen 4.2.0 upgrade to Xen 4.2.1.

    The release fixes the following critical vulnerabilities:
        CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability
        CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability
        CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability
        CVE-2012-4539 / XSA-24: Grant table hypercall infinite
            loop DoS vulnerability
        CVE-2012-4544, CVE-2012-2625 / XSA-25: Xen domain builder
            Out-of-memory due to malicious kernel/ramdisk
        CVE-2012-5510 / XSA-26: Grant table version switch list
            corruption vulnerability
        CVE-2012-5511 / XSA-27: Several HVM operations do not
            validate the range of their inputs
        CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory
        CVE-2012-5514 / XSA-30: Broken error handling in
            guest_physmap_mark_populate_on_demand()
        CVE-2012-5515 / XSA-31: Several memory hypercall operations
            allow invalid extent order values
        CVE-2012-5525 / XSA-32: several hypercalls do not validate input GFNs
    Among many bug fixes and improvements (around 100 since Xen 4.2.0):
        A fix for a long standing time management issue
        Bug fixes for S3 (suspend to RAM) handling
        Bug fixes for other low level system state handling
        Bug fixes and improvements to the libxl tool stack
        Bug fixes to nested virtualization


----- 4.2.0

The Xen 4.2 release contains a number of important new features
and updates including:

The release incorporates many new features and improvements to
existing features. There are improvements across the board including
to Security, Scalability, Performance and Documentation.

    XL is now the default toolstack: Significant effort has gone
in to the XL tool toolstack in this release and it is now feature
complete and robust enough that we have made it the default. This
toolstack can now replace xend in the majority of deployments, see
XL vs Xend Feature Comparison. As well as improving XL the underlying
libxl library has been significantly improved and supports the
majority of the most common toolstack features. In addition the
API has been declared stable which should make it even easier for
external toolstack such as libvirt and XCP's xapi to make full use
of this functionality in the future.

    Large Systems: Following on from the improvements made in 4.1
Xen now supports even larger systems, with up to 4095 host CPUs
and up to 512 guest CPUs. In addition toolstack feature like the
ability to automatically create a CPUPOOL per NUMA node and more
intelligent placement of guest VCPUs on NUMA nodes have further
improved the Xen experience on large systems.  Other new features,
such as multiple PCI segment support have also made a positive
impact on such systems.

    Improved security: The XSM/Flask subsystem has seen several
enhancements, including improved support for disaggregated systems
and a rewritten example policy which is clearer and simpler to
modify to suit local requirements.

    Documentation: The Xen documentation has been much improved,
both the in-tree documentation and the wiki. This is in no small
part down to the success of the Xen Document Days so thanks to all
who have taken part.
2013-05-15 05:32:12 +00:00