Commit graph

62 commits

Author SHA1 Message Date
bouyer
e89dd86774 Backport upstream patches for security issues:
XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests
XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]
bump PKGREVISION
2016-09-08 15:41:01 +00:00
bouyer
f36502060d Apply security patch from XSA-182. Bump PKGREVISION
xen 4.2 is not vulnerable to XSA-183.
2016-07-26 15:59:20 +00:00
wiz
ad0031c15e Remove python33: adapt all packages that refer to it. 2016-07-09 13:03:30 +00:00
joerg
0bae23d03b Newer binutils requires cmpw access to %r11 to explicitly qualify the
16bit part as %r11w.
2016-03-01 20:09:03 +00:00
bouyer
50810d133a Apply patches from Xen repository, fixing:
CVE-2015-8339 and CVE-2015-8340 aka XSA-159
XSA-166
CVE-2015-8550 aka XSA-155
CVE-2015-8554 aka XSA-164
Bump pkgrevision
2016-01-07 17:55:55 +00:00
dholland
f13d6671da Fix missing/broken rcsids. 2015-12-29 04:04:26 +00:00
adam
7f3b4730ad Extend PYTHON_VERSIONS_INCOMPATIBLE to 35 2015-12-05 21:25:27 +00:00
agc
17886c78da Add SHA512 digests for distfiles for sysutils category
Problems found with existing digests:
	Package memconf distfile memconf-2.16/memconf.gz
	b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
	95748686a5ad8144232f4d4abc9bf052721a196f [calculated]

Problems found locating distfiles:
	Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
	Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
	Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
	Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
	Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:32:05 +00:00
bouyer
278592122d Add patches, derived from Xen security advisory, fixing:
CVE-2015-7835 aka XSA-148
CVE-2015-7869 aka XSA-149 + XSA-151
CVE-2015-7971 aka XSA-152
Bump PKGREVISION
2015-10-29 20:29:56 +00:00
joerg
2a425e36dc Avoid undefined behavior when left-shifting negative values. 2015-09-14 13:36:29 +00:00
spz
3cfbbfbd64 apply fixes from upstream for
XSA-125 Long latency MMIO mapping operations are not preemptible
XSA-126 Unmediated PCI command register access in qemu
2015-04-19 13:13:20 +00:00
spz
804ff4180b xsa123-4.3-4.2.patch from upstream:
x86emul: fully ignore segment override for register-only operations

For ModRM encoded instructions with register operands we must not
overwrite ea.mem.seg (if a - bogus in that case - segment override was
present) as it aliases with ea.reg.

This is CVE-2015-2151 / XSA-123.
2015-03-10 20:27:16 +00:00
spz
d8ad3303b7 Add patches for XSA-121 and XSA-122 from upstream. 2015-03-05 16:37:16 +00:00
bouyer
fbe0e0cef5 Remove patch-CVE-2014-7188, it's already in patch-CVE-2013-4355_1 2014-12-21 17:34:24 +00:00
joerg
19a830bc0d Ignore use of always non-null pointers as truth value. 2014-12-11 22:15:30 +00:00
bouyer
f432013602 backport patches from Xen advisory:
CVE-2014-7188/XSA-108:
x86/HVM: properly bound x2APIC MSR range, fixing:
A buggy or malicious HVM guest can crash the host or read data
relating to other guests or the hypervisor itself.

CVE-2014-8594/XSA-109:
x86: don't allow page table updates on non-PV page tables in do_mmu_update(),
fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.

CVE-2014-8595/XSA-110:
x86emul: enforce privilege level restrictions when loading CS, fixing:
Malicious HVM guest user mode code may be able to elevate its
privileges to guest supervisor mode, or to crash the guest.

CVE-2014-8866/XSA-111:
x86: limit checks in hypercall_xlat_continuation() to actual arguments, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-8867/XSA-112:
x86/HVM: confine internally handled MMIO to solitary regions, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-9030/XSA-113:
x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE, fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.
2014-11-27 15:36:01 +00:00
drochner
0fb0f38b27 fix out-of-bounds memory read access in x2APIC emulation (HVM only)
(CVE-2014-7188)
bump PKGREV
2014-10-01 17:18:22 +00:00
bouyer
85165d8b92 Add patch for:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
  LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
  of software interrupts

bump PKGREVISION
2014-09-26 10:45:00 +00:00
drochner
c9bd20284b add patch from upstream to fix possible data leak (CVE-2014-4021)
bump PKGREV
2014-06-18 13:47:08 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
drochner
29dc394e47 fix possible creation of invalid P2M entries, leading to xen crash
The vulnerability is only exposed to service domains for HVM guests
which have privilege over the guest.  In a usual configuration that
means only device model emulators (qemu-dm).
bump PKGREV
2014-05-05 13:39:10 +00:00
drochner
e567eae78d add patch from upstream (XSA-89) to fix:
Processing of the HVMOP_set_mem_access HVM control operations does not
check the size of its input and can tie up a physical CPU for extended
periods of time.
bump PKGREV
2014-03-28 16:07:08 +00:00
joerg
db20bcc6e9 Ignore tautologic pointer checks. 2014-03-06 15:45:45 +00:00
drochner
3f751c45de from upstream: fix the fix for CVE-2013-6885
makes the workaround for AMD CPU erratum 793 work not only on
64-bit hypervisors but also for 32bit
bump PKGREV
(compile tested only)
2014-02-20 17:37:25 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
drochner
9f91d34f88 add patch from upstream to add missing privilege check
from the advisory:
Malicious or misbehaving unprivileged guests can cause the host or other
guests to malfunction. This can result in host-wide denial of service.
Privilege escalation, while seeming to be unlikely, cannot be excluded.
Only PV guests can take advantage of this vulnerability.
(CVE-2014-1666)
bump PKGREV
2014-01-24 17:07:35 +00:00
drochner
a752e83252 add patch from upstream to fix
"Guest triggerable AMD CPU erratum may cause host hang"
bump PKGREV
2013-12-04 10:35:01 +00:00
drochner
18b5b20e5f add patches from upstream to fix two security problems:
-another lock inversion
-privilege escalation (not exploitable in standard setups)
bump PKGREV
2013-11-29 19:29:58 +00:00
drochner
9c7f6f7cdf add patch from upstream to fix lock order inversion possibly leading
to deadlock (CVE-2013-4494)
bump PKGREV
2013-11-23 14:04:59 +00:00
drochner
c87ad47ffb add patch from upstream to fix information leak through outs instruction
emulation (CVE-2013-4368)
bump PKGREV
2013-10-22 19:41:58 +00:00
drochner
1ba4b2310d add patches from upstream to fix security problems:
-Information leak on AVX and/or LWP capable CPUs (CVE-2013-1442 / XSA-62)
-Information leaks through I/O instruction emulation
 (CVE-2013-4355 / XSA-63)
-Information leak through fbld instruction emulation
 (CVE-2013-4361 / XSA-66)
bump PKGREV
2013-10-01 14:54:44 +00:00
joerg
15a874e7b9 Make -Wunused-function non-fatal for clang. 2013-09-27 11:35:07 +00:00
drochner
a0905f63c4 update to 4.1.6.1
This release fixes the following critical vulnerabilities:
CVE-2013-1918 / XSA-45: Several long latency operations are not
 preemptible
CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw
 for bridges
CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs
CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception
 recovery on XRSTOR
CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception
 recovery on XSETBV
CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple
 vulnerabilities in libelf PV kernel handling
CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings
 affecting xend
CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive
 console related xenstore keys
CVE-2013-1432 / XSA-58: Page reference counting error due to
 XSA-45/CVE-2013-1918 fixes
XSA-61: libxl partially sets up HVM passthrough even with disabled iommu
This release contains many bug fixes and improvements. The highlights are:
addressing a regression from the fix for XSA-21
addressing a regression from the fix for XSA-46
bug fixes to low level system state handling, including certain
 hardware errata workarounds

(CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before)
2013-09-11 18:00:33 +00:00
joerg
8fb971391a Fix header guard. 2013-07-13 19:43:21 +00:00
gdt
71c33cddb9 Explain xen version differences.
There are 5 versions of xen in pkgsrc, which is confusing.  Explain in
DESCR which version is in which package (xenkernel3 contains 3.1), and
which versions support PCI passthrough (only 3.1).  Explain which
versions support non-PAE (3.1) and PAE (3.3, 4.1, 4.2), because the
HOWTO is out of date and it's easy to end up with a non-working system
on a 3.1 to 3.3 update.  Cuation that 2.0 is beyond crufty.

This is a DESCR-only change (with PKGREVISION++ of course).

(ok during freeze agc@)
2013-06-19 14:03:41 +00:00
riastradh
5dddf990fc Partially back out change to PYTHON_FOR_BUILD_ONLY.
This broke packages that needed a target Python at build-time.
Instead, change it from defined/undefined to yes/no/tool.  Most cases
of defined used `yes' anyway; fix the few stragglers do that instead.
New case `tool' is for TOOL_DEPENDS rather than buildlink3.
2013-05-10 20:07:33 +00:00
drochner
1e646464a4 update to 4.1.5
This integrates fixes for all vulnerabilities which were patched
in pkgsrc before.
Among many bug fixes and improvements (around 50 since Xen 4.1.4):
 * ACPI APEI/ERST finally working on production systems
 * Bug fixes for other low level system state handling
 * Support for xz compressed Dom0 and DomU kernels
2013-05-03 16:48:37 +00:00
bouyer
d8b95de64b Add patches from Xen security advisory:
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00005.html
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00006.html

bump PKGREVISION
2013-04-19 14:02:45 +00:00
joerg
8f28de81a1 Allow building Xen infrastructure with Clang. Fix various bugs in
xenkernel3, xenkernel41, xentools3 and xentools41 exposed by Clang
default warnings. Bump revisions for those.
2013-04-11 19:57:51 +00:00
rodent
6b46c62d2e Edited DESCR in the case of:
File too long (should be no more than 24 lines).
 Line too long (should be no more than 80 characters).
 Trailing empty lines.
 Trailing white-space.
Trucated the long files as best as possible while preserving the most info
contained in them.
2013-04-07 20:49:31 +00:00
rodent
44c94b38c6 'EXTRACT_SUFX is ".tar.gz" by default, so this definition may be
redundant.' - It was. Removed.
2013-04-06 13:01:26 +00:00
drochner
e04bd3afcc oops, a patch was in the wrong sub-pkg
bump PKGREV
2013-01-20 15:21:54 +00:00
drochner
fa0afb823c update to 4.1.4
changes:
-fixes for many vulnerabilities (were mostly patched in pkgsrc)
-bug fixes and improvements (almost 100 since Xen 4.1.3). Highlights are:
 -A fix for a long standing time management issue
 -Bug fixes for S3 (suspend to RAM) handling
 -Bug fixes for other low level system state handling

pkgsrc note:
fixes for CVE-2012-5634 (interrupt issue on IOMMU systems)
and CVE-2012-6075 (oversized packets from e1000 driver)
are already included
2013-01-17 19:37:54 +00:00
drochner
49bb8fdd76 add another batch of security patches from upstream
bump PKGREV
2012-12-05 19:16:26 +00:00
drochner
b651b8e497 add patches from Xen SA 20..24 to fix various security problems
(CVE-2012-4535..4539)
bump PKGREV
2012-11-14 13:42:41 +00:00
asau
54c5cd959e Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 19:50:50 +00:00
dholland
ca048324de Fix COMMENT, noted by Mayuresh on pkgsrc-users. 2012-09-16 19:46:02 +00:00
drochner
f4c08d6fc4 update to 4.1.3
also add security patches from upstream (for CVE-2012-3497, no patches
are available yet)

changes:
-fixes for vulnerabilities were integrated
-many bug fixes and improvements, Highlights are:
 -Updates for the latest Intel/AMD CPU revisions
 -Bug fixes for IOMMU handling (device passthrough to HVM guests)

approved by maintainer
2012-09-12 11:04:17 +00:00
drochner
50b3fedd58 add patch from upstream to fix a possible DOS by HVM guests on teardown
(CVE-2012-3433)
bump PKGREV
2012-08-10 09:59:47 +00:00
asau
cfc040d419 Slightly simplify build process. 2012-08-01 12:28:18 +00:00