diff options
author | Roger Pau Monne <roger.pau@citrix.com> | 2012-12-18 10:51:49 +0100 |
---|---|---|
committer | Natanael Copa <ncopa@alpinelinux.org> | 2012-12-18 12:11:44 +0000 |
commit | 119185999980a6a6a78506a6b49e1a70ab55ad03 (patch) | |
tree | cf8c397666ddd903448e7491aba33f959663ac81 /main/xen/APKBUILD | |
parent | e9b405d8ff38fc48ee475df80fd47fc7461ec7b1 (diff) | |
download | aports-119185999980a6a6a78506a6b49e1a70ab55ad03.tar.bz2 aports-119185999980a6a6a78506a6b49e1a70ab55ad03.tar.xz |
xen: update to 4.2.1
Excerpt from release notes:
This fixes the following critical vulnerabilities:
* CVE-2012-4535 / XSA-20:
Timer overflow DoS vulnerability
* CVE-2012-4537 / XSA-22:
Memory mapping failure DoS vulnerability
* CVE-2012-4538 / XSA-23:
Unhooking empty PAE entries DoS vulnerability
* CVE-2012-4539 / XSA-24:
Grant table hypercall infinite loop DoS vulnerability
* CVE-2012-4544,CVE-2012-2625 / XSA-25:
Xen domain builder Out-of-memory due to malicious kernel/ramdisk
* CVE-2012-5510 / XSA-26:
Grant table version switch list corruption vulnerability
* CVE-2012-5511 / XSA-27:
several HVM operations do not validate the range of their inputs
* CVE-2012-5513 / XSA-29:
XENMEM_exchange may overwrite hypervisor memory
* CVE-2012-5514 / XSA-30:
Broken error handling in guest_physmap_mark_populate_on_demand()
* CVE-2012-5515 / XSA-31:
Several memory hypercall operations allow invalid extent order
values
* CVE-2012-5525 / XSA-32:
several hypercalls do not validate input GFNs
We recommend all users of the 4.2.0 code base to update to this
point release.
Among many bug fixes and improvements (around 100 since Xen 4.2.0):
* A fix for a long standing time management issue
* Bug fixes for S3 (suspend to RAM) handling
* Bug fixes for other low level system state handling
* Bug fixes and improvements to the libxl tool stack
* Bug fixes to nested virtualization
Diffstat (limited to 'main/xen/APKBUILD')
-rw-r--r-- | main/xen/APKBUILD | 30 |
1 files changed, 3 insertions, 27 deletions
diff --git a/main/xen/APKBUILD b/main/xen/APKBUILD index e9503e8ab..36c11c7c3 100644 --- a/main/xen/APKBUILD +++ b/main/xen/APKBUILD @@ -2,8 +2,8 @@ # Contributor: Roger Pau Monne <roger.pau@entel.upc.edu> # Maintainer: William Pitcock <nenolod@dereferenced.org> pkgname=xen -pkgver=4.2.0 -pkgrel=7 +pkgver=4.2.1 +pkgrel=0 pkgdesc="Xen hypervisor" url="http://www.xen.org/" arch="x86 x86_64" @@ -17,19 +17,7 @@ subpackages="$pkgname-doc $pkgname-dev $pkgname-libs $pkgname-hypervisor $pkgnam source="http://bits.xensource.com/oss-xen/release/$pkgver/$pkgname-$pkgver.tar.gz qemu_uclibc_configure.patch librt.patch - make_stubdoms.patch qemu-xen_paths.patch - xsa20.patch - xsa22-4.2-unstable.patch - xsa23-4.2-unstable.patch - xsa24.patch - xsa25-4.2.patch - xsa26-4.2.patch - xsa27-4.2.patch - xsa29-4.2-unstable.patch - xsa30-4.2.patch - xsa31-4.2-unstable.patch - xsa32-4.2.patch xenstored.initd xenstored.confd @@ -139,22 +127,10 @@ xend() { -exec mv '{}' "$subpkgdir"/"$sitepackages"/xen \; } -md5sums="f4f217969afc38f09251039966d91a87 xen-4.2.0.tar.gz +md5sums="0d48cbe1767b82aba12517898d4e0408 xen-4.2.1.tar.gz 506e7ab6f9482dc95f230978d340bcd9 qemu_uclibc_configure.patch 2dc5ddf47c53ea168729975046c3c1f9 librt.patch -41ad48fdc269749776fa6aa04f6778c2 make_stubdoms.patch 1ccde6b36a6f9542a16d998204dc9a22 qemu-xen_paths.patch -fb7e76f00c2a4e63b408cb67df7d1a7b xsa20.patch -5a67dfac5e6f5a0836aeaefa1804c09f xsa22-4.2-unstable.patch -9151e7c648b12f518826ad0f0a67da42 xsa23-4.2-unstable.patch -9bd8b30094f8eb2408846c1b6ed0cad6 xsa24.patch -9fc7097ed2e5e756c4ae91145c143433 xsa25-4.2.patch -281ad5fefa8856a5b431a7830be6c370 xsa26-4.2.patch -d8cb820b85f86caa58ce1cc215aac069 xsa27-4.2.patch -405531d7e434be9bc663c601d4dc67a4 xsa29-4.2-unstable.patch -23f5ca5789f5358b8d2f8ce998db5ed6 xsa30-4.2.patch -78fa8ac0ac907dd3ae7ef02bea623bb5 xsa31-4.2-unstable.patch -2bd8f676273e644910e6a907372dfa31 xsa32-4.2.patch 95d8af17bf844d41a015ff32aae51ba1 xenstored.initd b017ccdd5e1c27bbf1513e3569d4ff07 xenstored.confd ed262f15fb880badb53575539468646c xenconsoled.initd |