Commit graph

52 commits

Author SHA1 Message Date
spz
3cfbbfbd64 apply fixes from upstream for
XSA-125 Long latency MMIO mapping operations are not preemptible
XSA-126 Unmediated PCI command register access in qemu
2015-04-19 13:13:20 +00:00
spz
804ff4180b xsa123-4.3-4.2.patch from upstream:
x86emul: fully ignore segment override for register-only operations

For ModRM encoded instructions with register operands we must not
overwrite ea.mem.seg (if a - bogus in that case - segment override was
present) as it aliases with ea.reg.

This is CVE-2015-2151 / XSA-123.
2015-03-10 20:27:16 +00:00
spz
d8ad3303b7 Add patches for XSA-121 and XSA-122 from upstream. 2015-03-05 16:37:16 +00:00
bouyer
fbe0e0cef5 Remove patch-CVE-2014-7188, it's already in patch-CVE-2013-4355_1 2014-12-21 17:34:24 +00:00
joerg
19a830bc0d Ignore use of always non-null pointers as truth value. 2014-12-11 22:15:30 +00:00
bouyer
f432013602 backport patches from Xen advisory:
CVE-2014-7188/XSA-108:
x86/HVM: properly bound x2APIC MSR range, fixing:
A buggy or malicious HVM guest can crash the host or read data
relating to other guests or the hypervisor itself.

CVE-2014-8594/XSA-109:
x86: don't allow page table updates on non-PV page tables in do_mmu_update(),
fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.

CVE-2014-8595/XSA-110:
x86emul: enforce privilege level restrictions when loading CS, fixing:
Malicious HVM guest user mode code may be able to elevate its
privileges to guest supervisor mode, or to crash the guest.

CVE-2014-8866/XSA-111:
x86: limit checks in hypercall_xlat_continuation() to actual arguments, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-8867/XSA-112:
x86/HVM: confine internally handled MMIO to solitary regions, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-9030/XSA-113:
x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE, fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.
2014-11-27 15:36:01 +00:00
drochner
0fb0f38b27 fix out-of-bounds memory read access in x2APIC emulation (HVM only)
(CVE-2014-7188)
bump PKGREV
2014-10-01 17:18:22 +00:00
bouyer
85165d8b92 Add patch for:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
  LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
  of software interrupts

bump PKGREVISION
2014-09-26 10:45:00 +00:00
drochner
c9bd20284b add patch from upstream to fix possible data leak (CVE-2014-4021)
bump PKGREV
2014-06-18 13:47:08 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
drochner
29dc394e47 fix possible creation of invalid P2M entries, leading to xen crash
The vulnerability is only exposed to service domains for HVM guests
which have privilege over the guest.  In a usual configuration that
means only device model emulators (qemu-dm).
bump PKGREV
2014-05-05 13:39:10 +00:00
drochner
e567eae78d add patch from upstream (XSA-89) to fix:
Processing of the HVMOP_set_mem_access HVM control operations does not
check the size of its input and can tie up a physical CPU for extended
periods of time.
bump PKGREV
2014-03-28 16:07:08 +00:00
joerg
db20bcc6e9 Ignore tautologic pointer checks. 2014-03-06 15:45:45 +00:00
drochner
3f751c45de from upstream: fix the fix for CVE-2013-6885
makes the workaround for AMD CPU erratum 793 work not only on
64-bit hypervisors but also for 32bit
bump PKGREV
(compile tested only)
2014-02-20 17:37:25 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
drochner
9f91d34f88 add patch from upstream to add missing privilege check
from the advisory:
Malicious or misbehaving unprivileged guests can cause the host or other
guests to malfunction. This can result in host-wide denial of service.
Privilege escalation, while seeming to be unlikely, cannot be excluded.
Only PV guests can take advantage of this vulnerability.
(CVE-2014-1666)
bump PKGREV
2014-01-24 17:07:35 +00:00
drochner
a752e83252 add patch from upstream to fix
"Guest triggerable AMD CPU erratum may cause host hang"
bump PKGREV
2013-12-04 10:35:01 +00:00
drochner
18b5b20e5f add patches from upstream to fix two security problems:
-another lock inversion
-privilege escalation (not exploitable in standard setups)
bump PKGREV
2013-11-29 19:29:58 +00:00
drochner
9c7f6f7cdf add patch from upstream to fix lock order inversion possibly leading
to deadlock (CVE-2013-4494)
bump PKGREV
2013-11-23 14:04:59 +00:00
drochner
c87ad47ffb add patch from upstream to fix information leak through outs instruction
emulation (CVE-2013-4368)
bump PKGREV
2013-10-22 19:41:58 +00:00
drochner
1ba4b2310d add patches from upstream to fix security problems:
-Information leak on AVX and/or LWP capable CPUs (CVE-2013-1442 / XSA-62)
-Information leaks through I/O instruction emulation
 (CVE-2013-4355 / XSA-63)
-Information leak through fbld instruction emulation
 (CVE-2013-4361 / XSA-66)
bump PKGREV
2013-10-01 14:54:44 +00:00
joerg
15a874e7b9 Make -Wunused-function non-fatal for clang. 2013-09-27 11:35:07 +00:00
drochner
a0905f63c4 update to 4.1.6.1
This release fixes the following critical vulnerabilities:
CVE-2013-1918 / XSA-45: Several long latency operations are not
 preemptible
CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw
 for bridges
CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs
CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception
 recovery on XRSTOR
CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception
 recovery on XSETBV
CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple
 vulnerabilities in libelf PV kernel handling
CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings
 affecting xend
CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive
 console related xenstore keys
CVE-2013-1432 / XSA-58: Page reference counting error due to
 XSA-45/CVE-2013-1918 fixes
XSA-61: libxl partially sets up HVM passthrough even with disabled iommu
This release contains many bug fixes and improvements. The highlights are:
addressing a regression from the fix for XSA-21
addressing a regression from the fix for XSA-46
bug fixes to low level system state handling, including certain
 hardware errata workarounds

(CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before)
2013-09-11 18:00:33 +00:00
joerg
8fb971391a Fix header guard. 2013-07-13 19:43:21 +00:00
gdt
71c33cddb9 Explain xen version differences.
There are 5 versions of xen in pkgsrc, which is confusing.  Explain in
DESCR which version is in which package (xenkernel3 contains 3.1), and
which versions support PCI passthrough (only 3.1).  Explain which
versions support non-PAE (3.1) and PAE (3.3, 4.1, 4.2), because the
HOWTO is out of date and it's easy to end up with a non-working system
on a 3.1 to 3.3 update.  Cuation that 2.0 is beyond crufty.

This is a DESCR-only change (with PKGREVISION++ of course).

(ok during freeze agc@)
2013-06-19 14:03:41 +00:00
riastradh
5dddf990fc Partially back out change to PYTHON_FOR_BUILD_ONLY.
This broke packages that needed a target Python at build-time.
Instead, change it from defined/undefined to yes/no/tool.  Most cases
of defined used `yes' anyway; fix the few stragglers do that instead.
New case `tool' is for TOOL_DEPENDS rather than buildlink3.
2013-05-10 20:07:33 +00:00
drochner
1e646464a4 update to 4.1.5
This integrates fixes for all vulnerabilities which were patched
in pkgsrc before.
Among many bug fixes and improvements (around 50 since Xen 4.1.4):
 * ACPI APEI/ERST finally working on production systems
 * Bug fixes for other low level system state handling
 * Support for xz compressed Dom0 and DomU kernels
2013-05-03 16:48:37 +00:00
bouyer
d8b95de64b Add patches from Xen security advisory:
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00005.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00006.html

bump PKGREVISION
2013-04-19 14:02:45 +00:00
joerg
8f28de81a1 Allow building Xen infrastructure with Clang. Fix various bugs in
xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang
default warnings. Bump revisions for those.
2013-04-11 19:57:51 +00:00
rodent
6b46c62d2e Edited DESCR in the case of:
File too long (should be no more than 24 lines).
 Line too long (should be no more than 80 characters).
 Trailing empty lines.
 Trailing white-space.
Trucated the long files as best as possible while preserving the most info
contained in them.
2013-04-07 20:49:31 +00:00
rodent
44c94b38c6 'EXTRACT_SUFX is ".tar.gz" by default, so this definition may be
redundant.' - It was. Removed.
2013-04-06 13:01:26 +00:00
drochner
e04bd3afcc oops, a patch was in the wrong sub-pkg
bump PKGREV
2013-01-20 15:21:54 +00:00
drochner
fa0afb823c update to 4.1.4
changes:
-fixes for many vulnerabilities (were mostly patched in pkgsrc)
-bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:
 -A fix for a long standing time management issue
 -Bug fixes for S3 (suspend to RAM) handling
 -Bug fixes for other low level system state handling

pkgsrc note:
fixes for CVE-2012-5634 (interrupt issue on IOMMU systems)
and CVE-2012-6075 (oversized packets from e1000 driver)
are already included
2013-01-17 19:37:54 +00:00
drochner
49bb8fdd76 add another batch of security patches from upstream
bump PKGREV
2012-12-05 19:16:26 +00:00
drochner
b651b8e497 add patches from Xen SA 20..24 to fix various security problems
(CVE-2012-4535..4539)
bump PKGREV
2012-11-14 13:42:41 +00:00
asau
54c5cd959e Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 19:50:50 +00:00
dholland
ca048324de Fix COMMENT, noted by Mayuresh on pkgsrc-users. 2012-09-16 19:46:02 +00:00
drochner
f4c08d6fc4 update to 4.1.3
also add security patches from upstream (for CVE-2012-3497, no patches
are available yet)

changes:
-fixes for vulnerabilities were integrated
-many bug fixes and improvements, Highlights are:
 -Updates for the latest Intel/AMD CPU revisions
 -Bug fixes for IOMMU handling (device passthrough to HVM guests)

approved by maintainer
2012-09-12 11:04:17 +00:00
drochner
50b3fedd58 add patch from upstream to fix a possible DOS by HVM guests on teardown
(CVE-2012-3433)
bump PKGREV
2012-08-10 09:59:47 +00:00
asau
cfc040d419 Slightly simplify build process. 2012-08-01 12:28:18 +00:00
asau
5e2b87bbdf Use default WRKSRC. 2012-08-01 12:22:28 +00:00
drochner
0f96d180e7 add patch from upstream to fix bug in MMIO emulation which can cause
guest crashes by unprivileged users, only for HVM guests, and if
MMIO is granted to the user process (CVE-2012-3432)
bump PKGREV
2012-07-27 18:50:34 +00:00
bouyer
deabd44c27 Move patches to the right place. Bump PKGREVISION 2012-06-19 20:17:06 +00:00
bouyer
37d2e56472 pull up patches from upstream, fixing XSA7, XSA8 and XSA9.
PKGREVISION++
2012-06-12 15:59:04 +00:00
jym
7d4811e631 Add a MESSAGE so that we can point to the right location for Xen kernels. 2011-11-20 03:12:44 +00:00
cegger
1027369895 Update to Xen 4.1.2
Fixes/features include:
 * New XL toolstack
 * kexec/kdump
 * Remus
 * Device passthrough to HVM guests
 * Interrupt handling
 * Support for Supervisor Mode Execution Protection (SMEP)
2011-10-21 18:26:58 +00:00
bouyer
eebd533e00 This builds fine on netbsd-5, so relax ONLY_FOR_PLATFORM 2011-10-16 20:32:44 +00:00
abs
07a67b46ed Fix build with gcc 4.5.3 under NetBSD 2011-08-14 20:42:40 +00:00
cegger
6a0079666e Apply build fix about redefining va_list.
Failure has been reported to get fixed upstream.
2011-06-16 13:02:50 +00:00
cegger
302844c581 Xen 4.1.1 (maintenance release)
*   Security fixes including CVE-2011-1583 CVE-2011-1898
 *   Enhancements to guest introspection (VM single stepping support for very fine-grained access control)
 *   Many stability improvements, such as: PV-on-HVM stability fixes (fixing some IRQ issues), XSAVE cpu feature support for PV guests (allows safe use of latest multimedia instructions), RAS fixes for high availability, fixes for offlining bad pages and changes to libxc, mainly of benefit to libvirt
 *   Compatibility fixes for newer Linux guests, newer compilers, some old guest savefiles, newer Python, grub2, some hardware/BIOS bugs.
2011-06-16 10:28:47 +00:00