--- - branch: MAIN date: Fri Feb 3 17:00:25 UTC 2012 files: - new: '1.29' old: '1.28' path: pkgsrc/sysutils/xentools33/Makefile pathrev: pkgsrc/sysutils/xentools33/Makefile@1.29 type: modified - new: '1.27' old: '1.26' path: pkgsrc/sysutils/xentools33/distinfo pathrev: pkgsrc/sysutils/xentools33/distinfo@1.27 type: modified - new: '1.1' old: '0' path: pkgsrc/sysutils/xentools33/patches/patch-qemu-e1000-CVSE-2012-0029 pathrev: pkgsrc/sysutils/xentools33/patches/patch-qemu-e1000-CVSE-2012-0029@1.1 type: added - new: '1.15' old: '1.14' path: pkgsrc/sysutils/xentools41/Makefile pathrev: pkgsrc/sysutils/xentools41/Makefile@1.15 type: modified - new: '1.17' old: '1.16' path: pkgsrc/sysutils/xentools41/distinfo pathrev: pkgsrc/sysutils/xentools41/distinfo@1.17 type: modified - new: '1.1' old: '0' path: pkgsrc/sysutils/xentools41/patches/patch-qemu-e1000-CVSE-2012-0029 pathrev: pkgsrc/sysutils/xentools41/patches/patch-qemu-e1000-CVSE-2012-0029@1.1 type: added id: 20120203T170025Z.0787fdc5eafc18a31a97b65461d9ad54bcd48cef log: | Pull up fix from Xen repository, fixing CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation allows the guest to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. Bump PKGREVISION module: pkgsrc subject: 'CVS commit: pkgsrc/sysutils' unixtime: '1328288425' user: bouyer