Next | Query returned 66 messages, browsing 31 to 40 | Previous

History of commit frequency

CVS Commit History:


   2013-12-04 11:35:01 by Matthias Drochner | Files touched by this commit (4)
Log message:
add patch from upstream to fix
"Guest triggerable AMD CPU erratum may cause host hang"
bump PKGREV
   2013-11-29 20:29:58 by Matthias Drochner | Files touched by this commit (4)
Log message:
add patches from upstream to fix two security problems:
-another lock inversion
-privilege escalation (not exploitable in standard setups)
bump PKGREV
   2013-11-23 15:04:59 by Matthias Drochner | Files touched by this commit (3)
Log message:
add patch from upstream to fix lock order inversion possibly leading
to deadlock (CVE-2013-4494)
bump PKGREV
   2013-10-22 21:41:58 by Matthias Drochner | Files touched by this commit (3)
Log message:
add patch from upstream to fix information leak through outs instruction
emulation (CVE-2013-4368)
bump PKGREV
   2013-10-01 16:54:44 by Matthias Drochner | Files touched by this commit (8)
Log message:
add patches from upstream to fix security problems:
-Information leak on AVX and/or LWP capable CPUs (CVE-2013-1442 / XSA-62)
-Information leaks through I/O instruction emulation
 (CVE-2013-4355 / XSA-63)
-Information leak through fbld instruction emulation
 (CVE-2013-4361 / XSA-66)
bump PKGREV
   2013-09-27 13:35:07 by Joerg Sonnenberger | Files touched by this commit (6)
Log message:
Make -Wunused-function non-fatal for clang.
   2013-09-11 20:00:33 by Matthias Drochner | Files touched by this commit (22) | Package removed
Log message:
update to 4.1.6.1
This release fixes the following critical vulnerabilities:
CVE-2013-1918 / XSA-45: Several long latency operations are not
 preemptible
CVE-2013-1952 / XSA-49: VT-d interrupt remapping source validation flaw
 for bridges
CVE-2013-2076 / XSA-52: Information leak on XSAVE/XRSTOR capable AMD CPUs
CVE-2013-2077 / XSA-53: Hypervisor crash due to missing exception
 recovery on XRSTOR
CVE-2013-2078 / XSA-54: Hypervisor crash due to missing exception
 recovery on XSETBV
CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA-55: Multiple
 vulnerabilities in libelf PV kernel handling
CVE-2013-2072 / XSA-56: Buffer overflow in xencontrol Python bindings
 affecting xend
CVE-2013-2211 / XSA-57: libxl allows guest write access to sensitive
 console related xenstore keys
CVE-2013-1432 / XSA-58: Page reference counting error due to
 XSA-45/CVE-2013-1918 fixes
XSA-61: libxl partially sets up HVM passthrough even with disabled iommu
This release contains many bug fixes and improvements. The highlights are:
addressing a regression from the fix for XSA-21
addressing a regression from the fix for XSA-46
bug fixes to low level system state handling, including certain
 hardware errata workarounds

(CVE-2013-1918 and CVE-2013-1952 were patched in pkgsrc before)
   2013-07-13 21:43:22 by Joerg Sonnenberger | Files touched by this commit (10)
Log message:
Fix header guard.
   2013-06-19 16:03:41 by Greg Troxel | Files touched by this commit (10) | Package updated
Log message:
Explain xen version differences.

There are 5 versions of xen in pkgsrc, which is confusing.  Explain in
DESCR which version is in which package (xenkernel3 contains 3.1), and
which versions support PCI passthrough (only 3.1).  Explain which
versions support non-PAE (3.1) and PAE (3.3, 4.1, 4.2), because the
HOWTO is out of date and it's easy to end up with a non-working system
on a 3.1 to 3.3 update.  Cuation that 2.0 is beyond crufty.

This is a DESCR-only change (with PKGREVISION++ of course).

(ok during freeze agc@)
   2013-05-10 22:07:34 by Taylor R Campbell | Files touched by this commit (5)
Log message:
Partially back out change to PYTHON_FOR_BUILD_ONLY.

This broke packages that needed a target Python at build-time.
Instead, change it from defined/undefined to yes/no/tool.  Most cases
of defined used `yes' anyway; fix the few stragglers do that instead.
New case `tool' is for TOOL_DEPENDS rather than buildlink3.

Next | Query returned 66 messages, browsing 31 to 40 | Previous