Subject: CVS commit: pkgsrc/sysutils/xenkernel41
From: Manuel Bouyer
Date: 2014-11-27 16:36:02
Message id: 20141127153602.221C898@cvs.netbsd.org

Log Message:
backport patches from Xen advisory:
CVE-2014-7188/XSA-108:
x86/HVM: properly bound x2APIC MSR range, fixing:
A buggy or malicious HVM guest can crash the host or read data
relating to other guests or the hypervisor itself.

CVE-2014-8594/XSA-109:
x86: don't allow page table updates on non-PV page tables in do_mmu_update(),
fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.

CVE-2014-8595/XSA-110:
x86emul: enforce privilege level restrictions when loading CS, fixing:
Malicious HVM guest user mode code may be able to elevate its
privileges to guest supervisor mode, or to crash the guest.

CVE-2014-8866/XSA-111:
x86: limit checks in hypercall_xlat_continuation() to actual arguments, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-8867/XSA-112:
x86/HVM: confine internally handled MMIO to solitary regions, fixing:
A buggy or malicious HVM guest can crash the host.

CVE-2014-9030/XSA-113:
x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE, fixing:
Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 can mount a denial of service attack which, if
successful, can affect the whole system.

Files:
RevisionActionfile
1.41modifypkgsrc/sysutils/xenkernel41/Makefile
1.32modifypkgsrc/sysutils/xenkernel41/distinfo
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-7188
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-8594
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-8595
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-8866
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-8867
1.1addpkgsrc/sysutils/xenkernel41/patches/patch-CVE-2014-9030