head 1.2; access; symbols pkgsrc-2020Q2:1.1.0.38 pkgsrc-2020Q2-base:1.1 pkgsrc-2020Q1:1.1.0.18 pkgsrc-2020Q1-base:1.1 pkgsrc-2019Q4:1.1.0.40 pkgsrc-2019Q4-base:1.1 pkgsrc-2019Q3:1.1.0.36 pkgsrc-2019Q3-base:1.1 pkgsrc-2019Q2:1.1.0.34 pkgsrc-2019Q2-base:1.1 pkgsrc-2019Q1:1.1.0.32 pkgsrc-2019Q1-base:1.1 pkgsrc-2018Q4:1.1.0.30 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.28 pkgsrc-2018Q3-base:1.1 pkgsrc-2018Q2:1.1.0.26 pkgsrc-2018Q2-base:1.1 pkgsrc-2018Q1:1.1.0.24 pkgsrc-2018Q1-base:1.1 pkgsrc-2017Q4:1.1.0.22 pkgsrc-2017Q4-base:1.1 pkgsrc-2017Q3:1.1.0.20 pkgsrc-2017Q3-base:1.1 pkgsrc-2017Q2:1.1.0.16 pkgsrc-2017Q2-base:1.1 pkgsrc-2017Q1:1.1.0.14 pkgsrc-2017Q1-base:1.1 pkgsrc-2016Q4:1.1.0.12 pkgsrc-2016Q4-base:1.1 pkgsrc-2016Q3:1.1.0.10 pkgsrc-2016Q3-base:1.1 pkgsrc-2016Q2:1.1.0.8 pkgsrc-2016Q2-base:1.1 pkgsrc-2016Q1:1.1.0.6 pkgsrc-2016Q1-base:1.1 pkgsrc-2015Q4:1.1.0.4 pkgsrc-2015Q4-base:1.1 pkgsrc-2015Q3:1.1.0.2 pkgsrc-2015Q3-base:1.1; locks; strict; comment @# @; 1.2 date 2020.08.19.10.39.23; author bouyer; state dead; branches; next 1.1; commitid DGAMglRf0Jde6FkC; 1.1 date 2015.08.23.16.17.12; author spz; state Exp; branches; next ; commitid wb2SmuzLFycvzpyy; desc @@ 1.2 log @Remove xenkernel and xentools packages older than 4.11. They're not maintained anymore upstream, and don't build on supported NetBSD releases. @ text @$NetBSD: patch-CVE-2015-3340,v 1.1 2015/08/23 16:17:12 spz Exp $ patch for CVE-2015-3340 aka XSA-132 from http://xenbits.xen.org/xsa/xsa132-4.2.patch --- xen/arch/x86/domctl.c.orig 2014-09-02 06:22:57.000000000 +0000 +++ xen/arch/x86/domctl.c @@@@ -1193,7 +1198,7 @@@@ long arch_do_domctl( case XEN_DOMCTL_gettscinfo: { struct domain *d; - xen_guest_tsc_info_t info; + xen_guest_tsc_info_t info = { 0 }; ret = -ESRCH; d = rcu_lock_domain_by_id(domctl->domain); $NetBSD: patch-CVE-2015-3340,v 1.1 2015/08/23 16:17:12 spz Exp $ --- xen/common/sysctl.c.orig 2014-09-02 06:22:57.000000000 +0000 +++ xen/common/sysctl.c @@@@ -95,7 +95,7 @@@@ long do_sysctl(XEN_GUEST_HANDLE(xen_sysc case XEN_SYSCTL_getdomaininfolist: { struct domain *d; - struct xen_domctl_getdomaininfo info; + struct xen_domctl_getdomaininfo info = { 0 }; u32 num_domains = 0; rcu_read_lock(&domlist_read_lock); @ 1.1 log @Apply patches for XSA-128 to XSA-140 from upstream do a patch refresh in xentools42 rather than split the patches for pass-through.c over 5 files, delete xentools42/patches/patch-CVE-2015-2756 and assemble all in xentools42/patches/patch-qemu-xen-traditional_hw_pass-through.c @ text @d1 1 a1 1 $NetBSD$ d17 1 a17 1 $NetBSD$ @