Path to this page:
./
sysutils/xenkernel42,
Xen 4.2.x Kernel
Branch: pkgsrc-2014Q2,
Version: 4.2.4,
Package name: xenkernel42-4.2.4,
Maintainer: pkgsrc-usersXen is a virtual machine monitor which supports running multiple
guests operating systems on a single machine. Guest OSes (also
called "domains") require a modified kernel which supports Xen
hypercalls in replacement to access to the physical hardware. At
boot, the xen kernel is loaded along with the guest kernel for the
first domain (called domain0). domain0 has privileges to access
the physical hardware (PCI and ISA devices), administrate other
domains and provide virtual devices (disks and network) to other
domains.
This package contains the 4.2 Xen4 kernel itself. PCI passthrough is
not supported. PAE is mandatory; on i386 one must use XEN3PAE_DOM[0U].
Required to build:[
lang/python27]
Master sites:
SHA1: ab661bf0f64a18155f971343a9c07b7e7d1410f1
RMD160: b2210d3ff6a9fdf9cae1a5a38b829667dfd6fd2f
Filesize: 15296.874 KB
Version history: (Expand)
- (2014-07-02) Package added to pkgsrc.se, version xenkernel42-4.2.4 (created)
CVS history: (Expand)
2014-09-28 15:28:58 by Matthias Scheler | Files touched by this commit (6) |
Log message:
Pullup ticket #4506 - requested by bouyer
sysutils/xenkernel42: security patch
Revisions pulled up:
- sysutils/xenkernel42/Makefile 1.8
- sysutils/xenkernel42/distinfo 1.6
- sysutils/xenkernel42/patches/patch-xen_arch_x86_mm_shadow_common.c 1.1
- sysutils/xenkernel42/patches/patch-xen_arch_x86_x86_emulate_x86_emulate.c 1.1
- sysutils/xentools42/Makefile 1.23
- sysutils/xentools42/distinfo 1.12
---
Module Name: pkgsrc
Committed By: bouyer
Date: Fri Sep 26 10:39:32 UTC 2014
Modified Files:
pkgsrc/sysutils/xenkernel42: Makefile distinfo
pkgsrc/sysutils/xentools42: distinfo
Added Files:
pkgsrc/sysutils/xenkernel42/patches:
patch-xen_arch_x86_mm_shadow_common.c
patch-xen_arch_x86_x86_emulate_x86_emulate.c
Log message:
Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
of software interrupts
---
Module Name: pkgsrc
Committed By: bouyer
Date: Fri Sep 26 10:40:45 UTC 2014
Modified Files:
pkgsrc/sysutils/xentools42: Makefile
Log message:
Update xentools42 and xenkernel42 to Xen 4.2.5, fixing:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
pkgsrc also includes patches from the Xen Security Advisory:
XSA-104 (CVE-2014-7154) - Race condition in HVMOP_track_dirty_vram
XSA-105 (CVE-2014-7155) - Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
XSA-106 (CVE-2014-7156) - Missing privilege level checks in x86 emulation
of software interrupts
|