Commit graph

56 commits

Author SHA1 Message Date
bouyer
cbfec52636 pply patches from Xen repository, fixing:
CVE-2015-5307 and CVE-2015-8104 aka XSA-156
CVE-2015-8339 and CVE-2015-8340 aka XSA-159
CVE-2015-8555 aka XSA-165
XSA-166
CVE-2015-8550 aka XSA-155
CVE-2015-8554 aka XSA-164
Bump pkgrevision
2016-01-07 17:53:58 +00:00
adam
7f3b4730ad Extend PYTHON_VERSIONS_INCOMPATIBLE to 35 2015-12-05 21:25:27 +00:00
agc
17886c78da Add SHA512 digests for distfiles for sysutils category
Problems found with existing digests:
	Package memconf distfile memconf-2.16/memconf.gz
	b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
	95748686a5ad8144232f4d4abc9bf052721a196f [calculated]

Problems found locating distfiles:
	Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
	Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
	Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
	Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
	Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:32:05 +00:00
jnemeth
0c03bdf7f3 Tweak test for SHM. Build fix, so no PKGREVISION bump. 2015-10-22 05:05:22 +00:00
joerg
71c3d4d1b6 Bump revision for the libxl fix. 2015-10-19 16:40:57 +00:00
joerg
c60638c70b Don't depend on the compiler to optimize ffsll away, explicitly use the
builtin. Fix obvious logic error in libxl. Disable the use of global
register variables for clang. Lesser evil, HVM users should use newer
xentools or GCC.
2015-10-19 16:40:41 +00:00
jnemeth
29d7de2f99 This failed to build during bulk builds due to /var/shm missing.
Instead of looking for /var/shm, check to see if the version of
NetBSD is new enough to have SHM.
2015-10-03 00:56:02 +00:00
spz
fcf436606c Apply patches for XSA-128 to XSA-140 from upstream
do a patch refresh in xentools42

rather than split the patches for pass-through.c over 5 files, delete
xentools42/patches/patch-CVE-2015-2756 and assemble all in
xentools42/patches/patch-qemu-xen-traditional_hw_pass-through.c
2015-08-23 16:17:12 +00:00
wiz
c7383780db Bump all packages that depend on curses.bui* or terminfo.bui* since they
might incur ncurses dependencies on some platforms, and ncurses just bumped
its shlib.
Some packages were bumped twice now, sorry for that.
2015-08-18 07:31:00 +00:00
wiz
0eb141f110 Bump PKGREVISION for ncurses shlib bump. 2015-08-17 17:11:19 +00:00
jaapb
7ea12ebae7 Recursive revbump associated with lang/ocaml update. 2015-08-07 11:20:32 +00:00
jaapb
61266c4fa1 Recursive revbump associated with update of lang/ocaml to 4.02.2 2015-06-30 11:51:41 +00:00
wiz
2e65d464e8 Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
2015-06-12 10:50:58 +00:00
bouyer
ce70ad40f1 For disks larger than 128GB, the LBA capacity reported by IDE disks
should be limited to 128GB, the real size being reported in
LBA48 capacity.
Should fix disk corrution reported by Reinoud Zandijk.
Bump PKGREVISION
2015-06-11 17:42:43 +00:00
khorben
426766eec3 Apply fixes from upstream for XSA-133
XXX pull-ups
2015-06-05 18:41:18 +00:00
spz
3cfbbfbd64 apply fixes from upstream for
XSA-125 Long latency MMIO mapping operations are not preemptible
XSA-126 Unmediated PCI command register access in qemu
2015-04-19 13:13:20 +00:00
spz
ce195f0fed xsa119-4.2.patch from upstream:
From b6e327fde6c365086594e2b46edf435aa1671b1a Mon Sep 17 00:00:00 2001
From: Ian Campbell <ian.campbell@citrix.com>
Date: Fri, 20 Feb 2015 14:41:09 +0000
Subject: [PATCH] tools: libxl: Explicitly disable graphics backends on qemu
 cmdline

By default qemu will try to create some sort of backend for the
emulated VGA device, either SDL or VNC.

However when the user specifies sdl=0 and vnc=0 in their configuration
libxl was not explicitly disabling either backend, which could lead to
one unexpectedly running.

If either sdl=1 or vnc=1 is configured then both before and after this
change only the backends which are explicitly enabled are configured,
i.e. this issue only occurs when all backends are supposed to have
been disabled.

This affects qemu-xen and qemu-xen-traditional differently.

If qemu-xen was compiled with SDL support then this would result in an
SDL window being opened if $DISPLAY is valid, or a failure to start
the guest if not. Passing "-display none" to qemu before any further
-sdl options disables this default behaviour and ensures that SDL is
only started if the libxl configuration demands it.

If qemu-xen was compiled without SDL support then qemu would instead
start a VNC server listening on ::1 (IPv6 localhost) or 127.0.0.1
(IPv4 localhost) with IPv6 preferred if available. Explicitly pass
"-vnc none" when vnc is not enabled in the libxl configuration to
remove this possibility.

qemu-xen-traditional would never start a vnc backend unless asked.
However by default it will start an SDL backend, the way to disable
this is to pass a -vnc option. In other words passing "-vnc none" will
disable both vnc and sdl by default. sdl can then be reenabled if
configured by subsequent use of the -sdl option.

Tested with both qemu-xen and qemu-xen-traditional built with SDL
support and:
        xl cr # defaults
        xl cr sdl=0 vnc=0
        xl cr sdl=1 vnc=0
        xl cr sdl=0 vnc=1
        xl cr sdl=0 vnc=0 vga=\"none\"
        xl cr sdl=0 vnc=0 nographic=1
with both valid and invalid $DISPLAY.

This is XSA-119.
2015-03-13 09:43:41 +00:00
joerg
68a3dfbde6 Fix rpath-link use. 2015-01-29 21:31:39 +00:00
jaapb
714f854d4d Revbump associated with update of lang/ocaml. 2015-01-20 14:24:34 +00:00
msaitoh
0b979d2aa3 Fix compile error on amd64-current. 2014-12-08 05:06:52 +00:00
jaapb
1e2c6eff15 Revbump for ocaml 4.02.0.
(Some packages omitted because they will be updated to new versions)
2014-10-09 19:14:03 +00:00
bouyer
a4e5e15a83 Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
  created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests

pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
  LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
  of software interrupts
2014-09-26 10:39:31 +00:00
bouyer
581ce3284b Apply a fix similar to
http://mail-index.netbsd.org/pkgsrc-changes/2014/08/28/msg110551.html:
Don't redefine MAP_ANONYMOUS is already defined. Fixes build on netbsd-7

pointed out by Mustafa Dogan in private mail
2014-09-17 20:32:36 +00:00
schnoebe
1beea8e34f Add buildlink3.mk so libvirt can link against xentools 4.2 2014-07-26 20:27:47 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
gdt
79f3b8de6a Use -f in ${CP} to place files into the source tree.
This resolves failures when rerunning make after a build failure when
one's source tree is mode 444.
2014-05-14 12:43:39 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
prlw1
4a4c082b66 Fix build with gcc 4.8. 2014-03-29 09:05:51 +00:00
jperkin
45bc40abb4 Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
2014-03-11 14:04:57 +00:00
jperkin
374dfca2a5 Fix dependency pattern. 2014-03-03 16:42:00 +00:00
wiz
f14c525815 Add dependency on py-lxml, used by xenapi_create.py.
Dependency reported missing by Kamil Rytarowski <n54@gmx.com> on
pkgsrc-users.

Bump PKGREVISION.
2014-03-02 13:53:18 +00:00
prlw1
39e89a5b6d Update xentools42 to 4.2.4
Removed patch-libxc_xc_dom_h: commited as cb08944a

This fixes the following critical vulnerabilities:

- CVE-2013-2212 / XSA-60 Excessive time to disable caching with HVM guests with
PCI passthrough
- CVE-2013-1442 / XSA-62 Information leak on AVX and/or LWP capable CPUs
- CVE-2013-4355 / XSA-63 Information leaks through I/O instruction emulation
- CVE-2013-4361 / XSA-66 Information leak through fbld instruction emulation
- CVE-2013-4368 / XSA-67 Information leak through outs instruction emulation
- CVE-2013-4369 / XSA-68 possible null dereference when parsing vif ratelimiting
 info
- CVE-2013-4370 / XSA-69 misplaced free in ocaml xc_vcpu_getaffinity stub
- CVE-2013-4371 / XSA-70 use-after-free in libxl_list_cpupool under memory press
ure
- CVE-2013-4375 / XSA-71 qemu disk backend (qdisk) resource leak
- CVE-2013-4416 / XSA-72 ocaml xenstored mishandles oversized message replies
- CVE-2013-4494 / XSA-73 Lock order reversal between page allocation and grant t
able locks
- CVE-2013-4553 / XSA-74 Lock order reversal between page_alloc_lock and mm_rwlo
ck
- CVE-2013-4551 / XSA-75 Host crash due to guest VMX instruction execution
- CVE-2013-4554 / XSA-76 Hypercalls exposed to privilege rings 1 and 2 of HVM gu
ests
- CVE-2013-6375 / XSA-78 Insufficient TLB flushing in VT-d (iommu) code
- CVE-2013-6400 / XSA-80 IOMMU TLB flushing may be inadvertently suppressed
- CVE-2013-6885 / XSA-82 Guest triggerable AMD CPU erratum may cause host hang
- CVE-2014-1642 / XSA-83 Out-of-memory condition yielding memory corruption duri
ng IRQ setup
- CVE-2014-1891 / XSA-84 integer overflow in several XSM/Flask hypercalls
- CVE-2014-1895 / XSA-85 Off-by-one error in FLASK_AVC_CACHESTAT hypercall
- CVE-2014-1896 / XSA-86 libvchan failure handling malicious ring indexes
- CVE-2014-1666 / XSA-87 PHYSDEVOP_{prepare,release}_msix exposed to unprivilege
d guests
- CVE-2014-1950 / XSA-88 use-after-free in xc_cpupool_getinfo() under memory pre
ssure

Apart from those there are many further bug fixes and improvements.
2014-02-22 01:28:23 +00:00
wiz
a1f0ff3f67 No need to have two variables for the same logic.
Replace PYTHON_PATCH_SCRIPTS with REPLACE_PYTHON.
2014-01-25 10:45:15 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
prlw1
cd14e22ceb Use native shm_open on newer NetBSD/current. As per joerg@'s fix for
xentools41.
2014-01-07 12:59:35 +00:00
riz
d6c75ae159 add patch from upstream to fix a regression which made that the symbol
table of NetBSD domU kernels was not loaded correctly, see
http://mail-index.netbsd.org/port-xen/2013/11/29/msg008157.html
for details
bump PKGREV
2013-12-08 19:17:56 +00:00
jnemeth
ea60818c85 The xendomains rc.d script should only depend on xencommons. 2013-12-02 20:38:12 +00:00
joerg
3d4dd76d69 Catch up with Clang ToT when it comes to various warnings and
unsupported options.
2013-11-07 00:47:39 +00:00
joerg
91b8232876 Fix header guard. 2013-11-07 00:46:39 +00:00
jaapb
15a89b35db Revision bump associated with the update of lang/ocaml to version 4.01. 2013-11-01 11:30:21 +00:00
prlw1
ae8a049aec Update xen to 4.2.3
- Add warning if /kern/xen/privcmd is not readable

Fixes the following critical vulnerabilities:
 * CVE-2013-1918 / XSA-45:
    Several long latency operations are not preemptible
 * CVE-2013-1952 / XSA-49:
    VT-d interrupt remapping source validation flaw for bridges
 * CVE-2013-2076 / XSA-52:
    Information leak on XSAVE/XRSTOR capable AMD CPUs
 * CVE-2013-2077 / XSA-53:
    Hypervisor crash due to missing exception recovery on XRSTOR
 * CVE-2013-2078 / XSA-54:
    Hypervisor crash due to missing exception recovery on XSETBV
 * CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55:
    Multiple vulnerabilities in libelf PV kernel handling
 * CVE-2013-2072 / XSA-56:
    Buffer overflow in xencontrol Python bindings affecting xend
 * CVE-2013-2211 / XSA-57:
    libxl allows guest write access to sensitive console related xenstore keys
 * CVE-2013-1432 / XSA-58:
    Page reference counting error due to XSA-45/CVE-2013-1918 fixes
 * XSA-61:
    libxl partially sets up HVM passthrough even with disabled iommu

The following minor vulnerability is also being addressed:
 * CVE-2013-2007 / XSA-51
    qemu guest agent (qga) insecure file permissions

Among many bug fixes and improvements:
 * addressing a regression from the fix for XSA-46
 * bug fixes to low level system state handling, including certain
    hardware errata workarounds
2013-09-12 23:37:18 +00:00
jklos
958958b1f2 Revert PLIST. Problem is caused by PKG_DEVELOPER. 2013-07-08 17:49:32 +00:00
jklos
b7772cc6bf Added files missing from PLIST. 2013-07-08 07:53:11 +00:00
wiz
8c85ca2647 Fix paths for some perl scripts. 2013-06-17 13:55:38 +00:00
wiz
89872abd89 Fix remaining issue with perl-5.18's pod2man. 2013-06-17 13:54:02 +00:00
wiz
c4f2fe8435 Fix some fallout with perl-5.18's pod2man.
qemu.pod is still broken, but it's generated with texinfo somehow.
2013-06-17 13:47:20 +00:00
wiz
b4dd710e80 Replace py-curses/buildlink3.mk with DEPENDS.
There are no buildlink3-relevant files here, just a loadable module.
2013-06-04 07:38:49 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
prlw1
519f284b7b Build fixes 2013-05-27 22:26:27 +00:00
bouyer
13af998808 Build and install HVM-related files. Good enough to boot the NetBSD 6.1
i386 CD and do a network install.
Bump PKGREVISION
2013-05-26 20:27:43 +00:00