[xen] update to 4.1.1
myoung
myoung at fedoraproject.org
Wed Jun 15 19:20:38 UTC 2011
commit 0f0215d02617f4ccffc7737fb9816d4d008b085f
Author: Michael Young <m.a.young at durham.ac.uk>
Date: Wed Jun 15 20:18:36 2011 +0100
update to 4.1.1
.gitignore | 2 +-
sources | 2 +-
xen.spec | 12 ++++++++----
3 files changed, 10 insertions(+), 6 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index bf16d8d..9c9b5a6 100644
--- a/.gitignore
+++ b/.gitignore
@@ -6,4 +6,4 @@ lwip-1.3.0.tar.gz
pciutils-2.2.9.tar.bz2
zlib-1.2.3.tar.gz
/ipxe-git-v1.0.0.tar.gz
-/xen-4.1.0.tar.gz
+/xen-4.1.1.tar.gz
diff --git a/sources b/sources
index ec85889..2a1afce 100644
--- a/sources
+++ b/sources
@@ -4,4 +4,4 @@ bf8f1f9e3ca83d732c00a79a6ef29bc4 newlib-1.16.0.tar.gz
cec05e7785497c5e19da2f114b934ffd pciutils-2.2.9.tar.bz2
debc62758716a169df9f62e6ab2bc634 zlib-1.2.3.tar.gz
fb7df96781d337899066d82059346885 ipxe-git-v1.0.0.tar.gz
-db3e1542b7719f375593b2b32b01a177 xen-4.1.0.tar.gz
+fab4bf74d73444ff9b43bced2e4fc5a2 xen-4.1.1.tar.gz
diff --git a/xen.spec b/xen.spec
index 455c57e..d44234a 100644
--- a/xen.spec
+++ b/xen.spec
@@ -5,8 +5,8 @@
Summary: Xen is a virtual machine monitor
Name: xen
-Version: 4.1.0
-Release: 2%{?dist}
+Version: 4.1.1
+Release: 1%{?dist}
Group: Development/Libraries
License: GPLv2+ and LGPLv2+ and BSD
URL: http://xen.org/
@@ -42,7 +42,6 @@ Patch20: localgcc451fix.patch
Patch23: grub-ext4-support.patch
Patch26: localgcc46fix.patch
Patch28: pygrubfix.patch
-Patch29: cve-2011-1583-4.1.patch
Patch100: xen-configure-xend.patch
@@ -168,7 +167,6 @@ to build the xen packages.
%patch20 -p1
%patch26 -p1
%patch28 -p1
-%patch29 -p1
%patch100 -p1
@@ -534,6 +532,12 @@ rm -rf %{buildroot}
%doc licensedir/*
%changelog
+* Wed Jun 15 2011 Michael Young <m.a.young at durham.ac.uk> - 4.1.1-1
+- update to 4.1.1
+ includes various bugfixes and fix for [CVE-2011-1898] guest with pci
+ passthrough can gain privileged access to base domain
+- remove upstream cve-2011-1583-4.1.patch
+
* Mon May 09 2011 Michael Young <m.a.young at durham.ac.uk> - 4.1.0-2
- Overflows in kernel decompression can allow root on xen PV guest to gain
privileged access to base domain, or access to xen configuration info.
More information about the scm-commits
mailing list