--- - branch: pkgsrc-2014Q2 date: Sun Sep 28 13:28:58 UTC 2014 files: - new: 1.7.2.1 old: '1.7' path: pkgsrc/sysutils/xenkernel42/Makefile pathrev: pkgsrc/sysutils/xenkernel42/Makefile@1.7.2.1 type: modified - new: 1.5.4.1 old: '1.5' path: pkgsrc/sysutils/xenkernel42/distinfo pathrev: pkgsrc/sysutils/xenkernel42/distinfo@1.5.4.1 type: modified - new: 1.1.2.2 old: '0' path: pkgsrc/sysutils/xenkernel42/patches/patch-xen_arch_x86_mm_shadow_common.c pathrev: pkgsrc/sysutils/xenkernel42/patches/patch-xen_arch_x86_mm_shadow_common.c@1.1.2.2 type: added - new: 1.1.2.2 old: '0' path: pkgsrc/sysutils/xenkernel42/patches/patch-xen_arch_x86_x86_emulate_x86_emulate.c pathrev: pkgsrc/sysutils/xenkernel42/patches/patch-xen_arch_x86_x86_emulate_x86_emulate.c@1.1.2.2 type: added - new: 1.22.2.1 old: '1.22' path: pkgsrc/sysutils/xentools42/Makefile pathrev: pkgsrc/sysutils/xentools42/Makefile@1.22.2.1 type: modified - new: 1.10.4.1 old: '1.10' path: pkgsrc/sysutils/xentools42/distinfo pathrev: pkgsrc/sysutils/xentools42/distinfo@1.10.4.1 type: modified id: 20140928T132858Z.b959f51147fc588d34226babd39f0b1c8c834343 log: "Pullup ticket #4506 - requested by bouyer\nsysutils/xenkernel42: security patch\n\nRevisions pulled up:\n- sysutils/xenkernel42/Makefile 1.8\n- sysutils/xenkernel42/distinfo 1.6\n- sysutils/xenkernel42/patches/patch-xen_arch_x86_mm_shadow_common.c 1.1\n- sysutils/xenkernel42/patches/patch-xen_arch_x86_x86_emulate_x86_emulate.c 1.1\n- sysutils/xentools42/Makefile 1.23\n- sysutils/xentools42/distinfo \ 1.12\n\n---\n Module Name:\tpkgsrc\n Committed By:\tbouyer\n Date:\t\tFri Sep 26 10:39:32 UTC 2014\n\n Modified Files:\n \ \tpkgsrc/sysutils/xenkernel42: Makefile distinfo\n \tpkgsrc/sysutils/xentools42: distinfo\n Added Files:\n \tpkgsrc/sysutils/xenkernel42/patches:\n \t patch-xen_arch_x86_mm_shadow_common.c\n \ \t patch-xen_arch_x86_x86_emulate_x86_emulate.c\n\n Log Message:\n Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:\n CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible\n CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be\n created\n CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection\n CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests\n\n pkgsrc also includes patches from the Xen Security Advisory:\n \ XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram\n XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,\n LIDT, and LMSW emulation\n XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation\n of software interrupts\n\n---\n Module Name:\tpkgsrc\n \ Committed By:\tbouyer\n Date:\t\tFri Sep 26 10:40:45 UTC 2014\n\n Modified Files:\n \tpkgsrc/sysutils/xentools42: Makefile\n\n Log Message:\n Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:\n CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible\n CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be\n created\n CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection\n CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests\n\n pkgsrc also includes patches from the Xen Security Advisory:\n \ XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram\n XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,\n LIDT, and LMSW emulation\n XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation\n of software interrupts\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2014Q2] pkgsrc/sysutils' unixtime: '1411910938' user: tron