pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/sysutils/xenkernel42 xsa123-4.3-4.2.patch from upstream:
details: https://anonhg.NetBSD.org/pkgsrc/rev/ba18f5dd46c3
branches: trunk
changeset: 648073:ba18f5dd46c3
user: spz <spz%pkgsrc.org@localhost>
date: Tue Mar 10 19:50:15 2015 +0000
description:
xsa123-4.3-4.2.patch from upstream:
x86emul: fully ignore segment override for register-only operations
For ModRM encoded instructions with register operands we must not
overwrite ea.mem.seg (if a - bogus in that case - segment override was
present) as it aliases with ea.reg.
This is CVE-2015-2151 / XSA-123.
diffstat:
sysutils/xenkernel42/Makefile | 4 ++--
sysutils/xenkernel42/distinfo | 3 ++-
sysutils/xenkernel42/patches/patch-CVE-2015-2151 | 23 +++++++++++++++++++++++
3 files changed, 27 insertions(+), 3 deletions(-)
diffs (59 lines):
diff -r c3975ea2fbf6 -r ba18f5dd46c3 sysutils/xenkernel42/Makefile
--- a/sysutils/xenkernel42/Makefile Tue Mar 10 16:56:08 2015 +0000
+++ b/sysutils/xenkernel42/Makefile Tue Mar 10 19:50:15 2015 +0000
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.12 2015/03/05 13:44:57 spz Exp $
+# $NetBSD: Makefile,v 1.13 2015/03/10 19:50:15 spz Exp $
VERSION= 4.2.5
DISTNAME= xen-${VERSION}
PKGNAME= xenkernel42-${VERSION}
-PKGREVISION= 4
+PKGREVISION= 5
CATEGORIES= sysutils
MASTER_SITES= http://bits.xensource.com/oss-xen/release/${VERSION}/
diff -r c3975ea2fbf6 -r ba18f5dd46c3 sysutils/xenkernel42/distinfo
--- a/sysutils/xenkernel42/distinfo Tue Mar 10 16:56:08 2015 +0000
+++ b/sysutils/xenkernel42/distinfo Tue Mar 10 19:50:15 2015 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.10 2015/03/05 13:44:57 spz Exp $
+$NetBSD: distinfo,v 1.11 2015/03/10 19:50:15 spz Exp $
SHA1 (xen-4.2.5.tar.gz) = f42741e4ec174495ace70c4b17a6b9b0e60e798a
RMD160 (xen-4.2.5.tar.gz) = 7d4f7f1b32ee541d341a756b1f8da02816438d19
@@ -10,6 +10,7 @@
SHA1 (patch-CVE-2014-9030) = f4646ab2b0d01ad2a3bf47839fe0ffd35479b4a6
SHA1 (patch-CVE-2015-2044) = bcb7152da8d37902540cbfbdfd7309536cffa61e
SHA1 (patch-CVE-2015-2045) = f70839fabd4ef9086c8fb808e4f3448a8e844c98
+SHA1 (patch-CVE-2015-2151) = df05750b86331b88102b41f065c314c38c6bc396
SHA1 (patch-Config.mk) = a43ed1b3304d6383dc093acd128a7f373d0ca266
SHA1 (patch-xen_Makefile) = e0d1b74518b9675ddc64295d1523ded9a8757c0a
SHA1 (patch-xen_arch_x86_Rules.mk) = 6b9b4bfa28924f7d3f6c793a389f1a7ac9d228e2
diff -r c3975ea2fbf6 -r ba18f5dd46c3 sysutils/xenkernel42/patches/patch-CVE-2015-2151
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/sysutils/xenkernel42/patches/patch-CVE-2015-2151 Tue Mar 10 19:50:15 2015 +0000
@@ -0,0 +1,23 @@
+$NetBSD: patch-CVE-2015-2151,v 1.1 2015/03/10 19:50:16 spz Exp $
+
+xsa123-4.3-4.2.patch from upstream:
+
+x86emul: fully ignore segment override for register-only operations
+
+For ModRM encoded instructions with register operands we must not
+overwrite ea.mem.seg (if a - bogus in that case - segment override was
+present) as it aliases with ea.reg.
+
+This is CVE-2015-2151 / XSA-123.
+
+--- xen/arch/x86/x86_emulate/x86_emulate.c.orig 2015-03-10 19:18:09.000000000 +0000
++++ xen/arch/x86/x86_emulate/x86_emulate.c
+@@ -1640,7 +1640,7 @@ x86_emulate(
+ }
+ }
+
+- if ( override_seg != -1 )
++ if ( override_seg != -1 && ea.type == OP_MEM )
+ ea.mem.seg = override_seg;
+
+ /* Decode and fetch the source operand: register, memory or immediate. */
Home |
Main Index |
Thread Index |
Old Index