aboutsummaryrefslogtreecommitdiffstats
path: root/main/xen/APKBUILD
Commit message (Collapse)AuthorAgeFilesLines
* main/xen: security fixes. Fixes #6155Leonardo Arena2016-10-141-5/+25
| | | | | | CVE-2016-7092, XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests CVE-2016-7094, XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[] CVE-2016-7154, XSA-188: use after free in FIFO event channel code
* main/xen: security upgrade to 4.4.4. Fixes #6020Leonardo Arena2016-08-121-81/+23
| | | | (CVE-2016-5242, CVE-2016-5403)
* main/xen: security fixes. Fixes #5778Leonardo Arena2016-06-241-1/+104
| | | | | | | | | | | CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code http://xenbits.xen.org/xsa/advisory-175.html CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw http://xenbits.xen.org/xsa/advisory-176.html CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling http://xenbits.xen.org/xsa/advisory-178.html
* main/xen: security fixes (CVE-2016-3158, CVE-2016-3159, CVE-2016-3960). ↵Leonardo Arena2016-05-091-1/+9
| | | | Fixes #5492
* main/xen: security fixes. Fixes #5162 (partially)Leonardo Arena2016-02-251-1/+25
| | | | | | | | | | (CVE-2016-2270, XSA-154) (CVE-2015-8339, CVE-2015-8340, XSA-159) (CVE-2015-8341, XSA-160) (CVE-2015-8555, XSA-165) (CVE-2016-1570, XSA-167) (CVE-2016-1571, XSA 168) (CVE-2016-2271, XSA-170)
* main/xen: security fixes (CVE-2015-5307, CVE-2015-8104)Leonardo Arena2015-11-101-1/+5
|
* main/xen: security fixes (xsa 134-136)Natanael Copa2015-06-301-1/+25
| | | | | | | | | xsa134 CVE-2015-4163 GNTTABOP_swap_grant_ref operation misbehavior xsa135 CVE-2015-3209 Heap overflow in QEMU PCNET controller, allowing guest->host escape xsa136 CVE-2015-4164 vulnerability in the iret hypercall handler
* main/xen: fix xendomains init.d script with screenNatanael Copa2015-06-301-4/+4
| | | | fixes #4394
* main/xen: security fix for CVE-2015-3456 (xsa 133)Natanael Copa2015-05-141-1/+9
| | | | fixes #4177
* main/xen: upgrade to 4.4.2 and add various sec fixesNatanael Copa2015-04-211-41/+25
| | | | | | fixes #4080 fixes #4085 fixes #4090
* main/xen: security fix for xsa118 (CVE-2015-1563)Natanael Copa2015-03-131-1/+5
| | | | fixes #3894
* main/xen: various sec fixes (xsa109 - xsa116)Natanael Copa2015-01-231-2/+30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | ref #3704 fixes #3708 XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest teardown XSA-114 CVE-2014-9065 CVE-2014-9066 p2m lock starvation XSA-113 CVE-2014-9030 Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor XSA-111 CVE-2014-8866 Excessive checking in compatibility mode hypercall argument translation XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation of far branches XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU update hypercalls (cherry picked from commit 621b3e6ae3cef5a89353cb0868372c2b94ffa454)
* main/xen: add tmux supportNatanael Copa2014-11-241-8/+8
| | | | remove screen from deps. use no console as default
* main/xen: fix race in xendomains init.d scriptNatanael Copa2014-11-241-4/+4
| | | | | the gnu screen would show files in SCREENDIR before its ready to accept connections. so starting domains failed
* main/xen: write domain 0's domid to xenstoreNatanael Copa2014-11-031-4/+4
| | | | | | Since xen 4.4 we need set domid for dom0. see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
* main/xen: remove perl dependencyNatanael Copa2014-10-091-2/+15
| | | | use a tiny C program to do the file/fd compare instead of perl
* main/xen: split out python bits into py-xenNatanael Copa2014-10-091-2/+29
| | | | so we dont need pull in python as dependency
* main/xen: fix filename clash with qemu and cleanupNatanael Copa2014-10-091-16/+7
|
* main/xen: upgrade to 4.4.1 and remove xendNatanael Copa2014-10-091-72/+16
| | | | fixes #3228
* main/xen: upgrade to 4.3.3 and fix CVE-2014-7188Natanael Copa2014-10-021-6/+9
| | | | | | | | | | | | | | The following critical vulnerabilities have been fixed: - CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible - CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be created - CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection - CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests Also add patch for xsa108: - CVE-2014-7188: Improper MSR range used for x2APIC emulation. ref #3412
* main/xen: integrate XSA-97 patchWilliam Pitcock2014-09-141-0/+2
|
* main/xen: security fix for XSA-97 (CVE-2014-5146,CVE-2014-5149)Natanael Copa2014-08-251-1/+5
| | | | ref #3290
* main/xen: fix hvmloaderNatanael Copa2014-08-251-1/+17
| | | | | | | | | hvmloader is 32 bit but pulled in 64bit stdint from musl headers. we solve this by providing our own stdint_local.h elf.h pulls in stdint.h too so we ship our own elf_local.h too ref #3308
* main/xen: make sure /var/run/xen existsNatanael Copa2014-06-111-7/+7
| | | | | | | | | - start xendomains after localmount so localmount does not mount over our /var - add checkpath to xendomains, just in case ref #2837
* main/xen: revision bump (to resign)William Pitcock2014-04-251-1/+1
|
* main/xen: upgrade to 4.3.2William Pitcock2014-04-091-14/+7
|
* main/xen: fix uclibc regression in musl-support patchWilliam Pitcock2014-03-251-3/+3
|
* main/xen: update makedepends for autoreconfWilliam Pitcock2014-03-241-1/+1
|
* main/xen: pkgrel bumpWilliam Pitcock2014-03-241-1/+1
|
* main/xen: build_tools clean on muslWilliam Pitcock2014-03-241-3/+3
|
* main/xen: further work on muslWilliam Pitcock2014-03-241-0/+8
|
* main/xen: some work on muslWilliam Pitcock2014-03-241-1/+5
|
* xen: use posix syntax for findNatanael Copa2014-01-061-2/+3
| | | | seems like busybox 1.22 needs it
* main/xen: add makedepends on findutilsWilliam Pitcock2014-01-031-1/+1
|
* main/xen: fix checksumsWilliam Pitcock2014-01-031-3/+3
|
* Revert "Revert "main/xen: implement experimental support for running the ↵William Pitcock2014-01-031-7/+12
| | | | | | xenstore as a stubdomain"" This reverts commit 4c825a2884ff2910d84d948141f320bd3fad3b6c.
* Revert "main/xen: implement experimental support for running the xenstore as ↵Natanael Copa2014-01-031-12/+7
| | | | | | | | a stubdomain" fails to build and blocks build server This reverts commit 157e38bfbb80daadeea3df319acaa6a098a7c280.
* main/xen: implement experimental support for running the xenstore as a ↵William Pitcock2013-12-311-7/+12
| | | | stubdomain
* main/xen: security fix for XSA-75Natanael Copa2013-11-121-1/+5
| | | | ref #2298
* main/xen: upgrade to 4.3.1Natanael Copa2013-11-061-42/+6
|
* main/xen: apply relevant XSA patches (XSA-62 through XSA-71)William Pitcock2013-11-011-1/+33
|
* main/xen: add XSA-73 patchWilliam Pitcock2013-11-011-1/+6
|
* main/xen: ipxe build fixNatanael Copa2013-10-211-2/+6
| | | | | fixes issue similar to this: https://bugs.gentoo.org/show_bug.cgi?id=487254
* main/xen: add general robustness patch for qemu's vncWilliam Pitcock2013-09-291-1/+5
|
* main/xen: implement hotplug script adding vTRILL support for situations ↵William Pitcock2013-09-271-1/+6
| | | | where dom0 is an RBridge
* main/xen: pkgrel bumpWilliam Pitcock2013-09-271-1/+1
|
* main/xen: more robust websockets vencrypt-bypass hackWilliam Pitcock2013-09-271-3/+3
|
* main/xen: add hack to force auth type to use plaintext on tls websocket for ↵William Pitcock2013-09-241-1/+5
| | | | noVNC
* main/xen: xen is no longer supported on x86-32, just x86-64William Pitcock2013-09-081-1/+1
|
* main/xen: qemu-coroutine-gthread.patch rebaseWilliam Pitcock2013-09-081-3/+3
|