pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/sysutils/xenkernel41 add patch from upstream to add mi...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/a32efeed6f07
branches:  trunk
changeset: 629621:a32efeed6f07
user:      drochner <drochner%pkgsrc.org@localhost>
date:      Fri Jan 24 17:07:35 2014 +0000

description:
add patch from upstream to add missing privilege check
from the advisory:
Malicious or misbehaving unprivileged guests can cause the host or other
guests to malfunction. This can result in host-wide denial of service.
Privilege escalation, while seeming to be unlikely, cannot be excluded.
Only PV guests can take advantage of this vulnerability.
(CVE-2014-1666)
bump PKGREV

diffstat:

 sysutils/xenkernel41/Makefile                    |   4 ++--
 sysutils/xenkernel41/distinfo                    |   3 ++-
 sysutils/xenkernel41/patches/patch-CVE-2014-1666 |  17 +++++++++++++++++
 3 files changed, 21 insertions(+), 3 deletions(-)

diffs (54 lines):

diff -r 449d6a400477 -r a32efeed6f07 sysutils/xenkernel41/Makefile
--- a/sysutils/xenkernel41/Makefile     Fri Jan 24 16:37:19 2014 +0000
+++ b/sysutils/xenkernel41/Makefile     Fri Jan 24 17:07:35 2014 +0000
@@ -1,10 +1,10 @@
-# $NetBSD: Makefile,v 1.30 2013/12/04 10:35:01 drochner Exp $
+# $NetBSD: Makefile,v 1.31 2014/01/24 17:07:35 drochner Exp $
 #
 
 VERSION=       4.1.6.1
 DISTNAME=      xen-${VERSION}
 PKGNAME=       xenkernel41-${VERSION}
-PKGREVISION=   5
+PKGREVISION=   6
 CATEGORIES=    sysutils
 MASTER_SITES=  http://bits.xensource.com/oss-xen/release/${VERSION}/
 
diff -r 449d6a400477 -r a32efeed6f07 sysutils/xenkernel41/distinfo
--- a/sysutils/xenkernel41/distinfo     Fri Jan 24 16:37:19 2014 +0000
+++ b/sysutils/xenkernel41/distinfo     Fri Jan 24 17:07:35 2014 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.24 2013/12/04 10:35:01 drochner Exp $
+$NetBSD: distinfo,v 1.25 2014/01/24 17:07:35 drochner Exp $
 
 SHA1 (xen-4.1.6.1.tar.gz) = e5f15feb0821578817a65ede16110c6eac01abd0
 RMD160 (xen-4.1.6.1.tar.gz) = bff11421fc44a26f2cc3156713267abcb36d7a19
@@ -14,6 +14,7 @@
 SHA1 (patch-CVE-2013-4553) = 6708dcef1737b119a3fcf2e3414c22c115cbacc1
 SHA1 (patch-CVE-2013-6885_1) = 6fc88c8c98393e90dd895c160108ff2ee17cee2e
 SHA1 (patch-CVE-2013-6885_2) = be3c99ba3e349492d45cd4f2fce0acc26ac1a96d
+SHA1 (patch-CVE-2014-1666) = acf27080799d4aae6a03b556caadb01081d5314e
 SHA1 (patch-Config.mk) = a43ed1b3304d6383dc093acd128a7f373d0ca266
 SHA1 (patch-xen_Makefile) = d1c7e4860221f93d90818f45a77748882486f92b
 SHA1 (patch-xen_arch_x86_Rules.mk) = 6b9b4bfa28924f7d3f6c793a389f1a7ac9d228e2
diff -r 449d6a400477 -r a32efeed6f07 sysutils/xenkernel41/patches/patch-CVE-2014-1666
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/sysutils/xenkernel41/patches/patch-CVE-2014-1666  Fri Jan 24 17:07:35 2014 +0000
@@ -0,0 +1,17 @@
+$NetBSD: patch-CVE-2014-1666,v 1.1 2014/01/24 17:07:36 drochner Exp $
+
+http://lists.xenproject.org/archives/html/xen-devel/2014-01/msg02075.html
+
+--- xen/arch/x86/physdev.c.orig        2014-01-24 16:04:18.000000000 +0000
++++ xen/arch/x86/physdev.c     2014-01-24 16:05:09.000000000 +0000
+@@ -554,7 +554,9 @@ ret_t do_physdev_op(int cmd, XEN_GUEST_H
+     case PHYSDEVOP_release_msix: {
+         struct physdev_pci_device dev;
+ 
+-        if ( copy_from_guest(&dev, arg, 1) )
++        if ( !IS_PRIV(v->domain) )
++          ret = -EPERM;
++        else if ( copy_from_guest(&dev, arg, 1) )
+             ret = -EFAULT;
+         else if ( dev.seg )
+             ret = -EOPNOTSUPP;



Home | Main Index | Thread Index | Old Index