head 1.2; access; symbols pkgsrc-2016Q4:1.1.0.12 pkgsrc-2016Q4-base:1.1 pkgsrc-2016Q3:1.1.0.10 pkgsrc-2016Q3-base:1.1 pkgsrc-2016Q2:1.1.0.8 pkgsrc-2016Q2-base:1.1 pkgsrc-2016Q1:1.1.0.6 pkgsrc-2016Q1-base:1.1 pkgsrc-2015Q4:1.1.0.4 pkgsrc-2015Q4-base:1.1 pkgsrc-2015Q3:1.1.0.2; locks; strict; comment @# @; 1.2 date 2016.12.29.19.13.02; author wiz; state dead; branches; next 1.1; commitid kFYPk8EnajcmFUzz; 1.1 date 2015.10.29.20.29.56; author bouyer; state Exp; branches 1.1.2.1; next ; commitid PiMumYjtNfJgO2Hy; 1.1.2.1 date 2015.10.29.20.29.56; author bsiegert; state dead; branches; next 1.1.2.2; commitid 665AHWvA1hO4rOHy; 1.1.2.2 date 2015.11.04.19.55.44; author bsiegert; state Exp; branches; next ; commitid 665AHWvA1hO4rOHy; desc @@ 1.2 log @Remove xenkernel and tools versions 3, 33, and 41. As discussed on pkgsrc-users. @ text @$NetBSD: patch-CVE-2015-7969,v 1.1 2015/10/29 20:29:56 bouyer Exp $ Patch for CVE-2015-7869 aka XSA-149 + XSA-151 based on http://xenbits.xenproject.org/xsa/xsa149.patch http://xenbits.xenproject.org/xsa/xsa151.patch --- xen/common/domain.c.orig 2013-09-10 08:42:18.000000000 +0200 +++ xen/common/domain.c 2015-10-29 20:44:06.000000000 +0100 @@@@ -671,6 +671,7 @@@@ xfree(d->pirq_to_evtchn); xsm_free_security_domain(d); + xfree(d->vcpu); free_domain_struct(d); send_guest_global_virq(dom0, VIRQ_DOM_EXC); --- xen/common/xenoprof.c.orig +++ xen/common/xenoprof.c @@@@ -239,6 +239,7 @@@@ static int alloc_xenoprof_struct( d->xenoprof->rawbuf = alloc_xenheap_pages(get_order_from_pages(npages), 0); if ( d->xenoprof->rawbuf == NULL ) { + xfree(d->xenoprof->vcpu); xfree(d->xenoprof); d->xenoprof = NULL; return -ENOMEM; @@@@ -286,6 +287,7 @@@@ void free_xenoprof_pages(struct domain * free_xenheap_pages(x->rawbuf, order); } + xfree(x->vcpu); xfree(x); d->xenoprof = NULL; } @ 1.1 log @Add patches, derived from Xen security advisory, fixing: CVE-2015-7835 aka XSA-148 CVE-2015-7869 aka XSA-149 + XSA-151 CVE-2015-7971 aka XSA-152 Bump PKGREVISION @ text @d1 1 a1 1 $NetBSD: patch-CVE-2015-2752,v 1.1 2015/04/19 13:13:20 spz Exp $ @ 1.1.2.1 log @file patch-CVE-2015-7969 was added on branch pkgsrc-2015Q3 on 2015-11-04 19:55:44 +0000 @ text @d1 35 @ 1.1.2.2 log @Pullup ticket #4848 - requested by bouyer sysutils/xenkernel41: security fix Revisions pulled up: - sysutils/xenkernel41/Makefile 1.46 - sysutils/xenkernel41/distinfo 1.38 - sysutils/xenkernel41/patches/patch-CVE-2015-7835 1.1 - sysutils/xenkernel41/patches/patch-CVE-2015-7969 1.1 - sysutils/xenkernel41/patches/patch-CVE-2015-7971 1.1 --- Module Name: pkgsrc Committed By: bouyer Date: Thu Oct 29 20:29:56 UTC 2015 Modified Files: pkgsrc/sysutils/xenkernel41: Makefile distinfo Added Files: pkgsrc/sysutils/xenkernel41/patches: patch-CVE-2015-7835 patch-CVE-2015-7969 patch-CVE-2015-7971 Log Message: Add patches, derived from Xen security advisory, fixing: CVE-2015-7835 aka XSA-148 CVE-2015-7869 aka XSA-149 + XSA-151 CVE-2015-7971 aka XSA-152 Bump PKGREVISION @ text @a0 35 $NetBSD$ Patch for CVE-2015-7869 aka XSA-149 + XSA-151 based on http://xenbits.xenproject.org/xsa/xsa149.patch http://xenbits.xenproject.org/xsa/xsa151.patch --- xen/common/domain.c.orig 2013-09-10 08:42:18.000000000 +0200 +++ xen/common/domain.c 2015-10-29 20:44:06.000000000 +0100 @@@@ -671,6 +671,7 @@@@ xfree(d->pirq_to_evtchn); xsm_free_security_domain(d); + xfree(d->vcpu); free_domain_struct(d); send_guest_global_virq(dom0, VIRQ_DOM_EXC); --- xen/common/xenoprof.c.orig +++ xen/common/xenoprof.c @@@@ -239,6 +239,7 @@@@ static int alloc_xenoprof_struct( d->xenoprof->rawbuf = alloc_xenheap_pages(get_order_from_pages(npages), 0); if ( d->xenoprof->rawbuf == NULL ) { + xfree(d->xenoprof->vcpu); xfree(d->xenoprof); d->xenoprof = NULL; return -ENOMEM; @@@@ -286,6 +287,7 @@@@ void free_xenoprof_pages(struct domain * free_xenheap_pages(x->rawbuf, order); } + xfree(x->vcpu); xfree(x); d->xenoprof = NULL; } @