aboutsummaryrefslogtreecommitdiffstats
path: root/main/xen/APKBUILD
Commit message (Collapse)AuthorAgeFilesLines
* main/xen: security fixesNatanael Copa2016-12-221-1/+17
| | | | | | | | XSA-204 CVE-2016-10013 x86: Mishandling of SYSCALL singlestep during emulation XSA-203 CVE-2016-10025 x86: missing NULL pointer check in VMFUNC emulation XSA-202 CVE-2016-10024 x86 PV guests may be able to mask interrupts fixes #6570
* main/xen: actually build with patches from previous commitLeonardo Arena2016-12-201-2/+22
|
* main/xen: security fixes. Fixes #6540Leonardo Arena2016-12-201-1/+7
| | | | | | | | CVE-2016-9932 CVE-2016-9815 CVE-2016-9816 CVE-2016-9817 CVE-2016-9818
* main/xen: fix various security issuesNatanael Copa2016-11-251-1/+53
| | | | | | | | | | | | | | | | | | | | | | | | | | | | - XSA-198 CVE-2016-9379 CVE-2016-9380 delimiter injection vulnerabilities in pygrub - XSA-197 CVE-2016-9381 qemu incautious about shared ring processing - XSA-196 CVE-2016-9377 CVE-2016-9378 x86 software interrupt injection mis-handled - XSA-195 CVE-2016-9383 x86 64-bit bit test instruction emulation broken - XSA-194 CVE-2016-9384 guest 32-bit ELF symbol table load leaking host data - XSA-193 CVE-2016-9385 x86 segment base write emulation lacking canonical address checks - XSA-192 CVE-2016-9382 x86 task switch to VM86 mode mis-handled - XSA-191 CVE-2016-9386 x86 null segments not always treated as unusable fixes #6495
* main/xen: upgrade to 4.7.1Natanael Copa2016-11-151-46/+5
|
* [various] rename dependency python-dev to python2-devJakub Jirutka2016-10-261-1/+1
|
* main/xen: security fix for CVE-2016-7777Natanael Copa2016-10-191-1/+7
|
* main/xen: Fixes for missing transaction in xenstore_client.c.Linus Swälas2016-10-191-1/+6
| | | | | | Recent kernel updates makes xenstore-read return ESRCH due to not having a transaction in progress when talking to xenbus, this makes sure that a transaction is always in place.
* main/xen: rebuild against libresslNatanael Copa2016-10-101-2/+2
|
* main/xen: fix build on armhfJakub Jirutka2016-10-061-1/+7
|
* main/xen: disable on armhf for nowCarlo Landmeter2016-10-061-1/+1
| | | | | | | | | | | | | | | gcc: error: unrecognized argument in option '-mcpu=generic' gcc: note: valid arguments to '-mcpu=' are: arm1020e arm1020t arm1022e arm1026ej-s arm10e arm10tdmi arm1136j-s arm1136jf-s arm1156t2-s arm1156t2f-s arm1176jz-s arm1176jzf-s arm2 arm250 arm3 arm6 arm60 arm600 arm610 arm620 arm7 arm70 arm700 arm700i arm710 arm7100 arm710c arm710t arm720 arm720t arm740t arm7500 arm7500fe arm7d arm7di arm7dm arm7dmi arm7m arm7tdmi arm7tdmi-s arm8 arm810 arm9 arm920 arm920t arm922t arm926ej-s arm940t arm946e-s arm966e-s arm968e-s arm9e arm9tdmi cortex-a12 cortex-a15 cortex-a15.cortex-a7 cortex-a17 cortex-a17.cortex-a7 cortex-a32 cortex-a35 cortex-a5 cortex-a53 cortex-a57 cortex-a57.cortex-a53 cortex-a7 cortex-a72 cortex-a72.cortex-a53 cortex-a8 cortex-a9 cortex-m0 cortex-m0.small-multiply cortex-m0plus cortex-m0plus.small-multiply cortex-m1 cortex-m1.small-multiply cortex-m3 cortex-m4 cortex-m7 cortex-r4 cortex-r4f cortex-r5 cortex-r7 cortex-r8 ep9312 exynos-m1 fa526 fa606te fa626 fa626te fa726te fmp626 generic-armv7-a iwmmxt iwmmxt2 marvell-pj4 mpcore mpcorenovfp native qdf24xx strongarm strongarm110 strongarm1100 strongarm1110 xgene1 xscale gcc: error: unrecognized argument in option '-mcpu=generic' gcc: note: valid arguments to '-mcpu=' are: arm1020e arm1020t arm1022e arm1026ej-s arm10e arm10tdmi arm1136j-s arm1136jf-s arm1156t2-s arm1156t2f-s arm1176jz-s arm1176jzf-s arm2 arm250 arm3 arm6 arm60 arm600 arm610 arm620 arm7 arm70 arm700 arm700i arm710 arm7100 arm710c arm710t arm720 arm720t arm740t arm7500 arm7500fe arm7d arm7di arm7dm arm7dmi arm7m arm7tdmi arm7tdmi-s arm8 arm810 arm9 arm920 arm920t arm922t arm926ej-s arm940t arm946e-s arm966e-s arm968e-s arm9e arm9tdmi cortex-a12 cortex-a15 cortex-a15.cortex-a7 cortex-a17 cortex-a17.cortex-a7 cortex-a32 cortex-a35 cortex-a5 cortex-a53 cortex-a57 cortex-a57.cortex-a53 cortex-a7 cortex-a72 cortex-a72.cortex-a53 cortex-a8 cortex-a9 cortex-m0 cortex-m0.small-multiply cortex-m0plus cortex-m0plus.small-multiply cortex-m1 cortex-m1.small-multiply cortex-m3 cortex-m4 cortex-m7 cortex-r4 cortex-r4f cortex-r5 cortex-r7 cortex-r8 ep9312 exynos-m1 fa526 fa606te fa626 fa626te fa726te fmp626 generic-armv7-a iwmmxt iwmmxt2 marvell-pj4 mpcore mpcorenovfp native qdf24xx strongarm strongarm110 strongarm1100 strongarm1110 xgene1 xscale gcc: error: unrecognized command line option '-mgeneral-regs-only' gcc: error: unrecognized command line option '-mgeneral-regs-only' make[3]: *** [Makefile:103: asm-offsets.s] Error 1 make[3]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen/arch/arm' make[2]: *** [Makefile:133: /home/buildozer/aports/main/xen/src/xen-4.7.0/xen/xen] Error 2 make[2]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen' make[1]: *** [Makefile:45: install] Error 2 make[1]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen'
* main/xen: dont build -dbg on armhfNatanael Copa2016-10-031-1/+5
|
* main/xen: enable -dbgNatanael Copa2016-10-031-2/+2
| | | | apparently xenstore-read segfaults
* main/xen: sec fixes (CVE-2016-7092, CVE-2016-7093, CVE-2016-7094)Natanael Copa2016-09-141-1/+25
| | | | | | | | | fixes: XSA-185 (CVE-2016-7092) XSA-186 (CVE-2016-7093) XSA-187 (CVE-2016-7094) fixes #6151
* main/xen: upgrade to 4.7.0 and add secfixesNatanael Copa2016-08-151-15/+97
| | | | | | | fixes for: - CVE-2016-6258 - CVE-2016-6259 - CVE-2016-5403
* Revert "main/xen: security fixes (CVE-2016-6258, CVE-2016-6259, CVE-2016-5403)"Leonardo Arena2016-08-151-17/+0
| | | | This reverts commit 4138843cb6988b29e88e93a4eb1a87fd2e75cace.
* main/xen: security fixes (CVE-2016-6258, CVE-2016-6259, CVE-2016-5403)Natanael Copa2016-08-151-0/+17
| | | | | | fixes #6016 (cherry picked from commit d0a7fcca4e82f4ff531083fa762975ee6b0ec9f4)
* main/xen: enable build for armNatanael Copa2016-06-231-8/+27
|
* main/xen: security upgrade to 4.6.3Natanael Copa2016-06-231-42/+5
| | | | | | | | | | | | | | | | | | | | | | | XSA-181 CVE-2016-5242 arm: Host crash caused by VMID exhaustion XSA-180 CVE-2014-3672 Unrestricted qemu logging XSA-179 CVE-2016-3710 CVE-2016-3712 QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks XSA-178 CVE-2016-4963 Unsanitised driver domain input in libxl device handling XSA-176 CVE-2016-4480 x86 software guest page walk PS bit handling flaw XSA-175 CVE-2016-4962 Unsanitised guest input in libxl device handling code XSA-174 CVE-2016-3961 hugetlbfs use may crash PV Linux guests
* main/xen: fix xorg segfaul in linux hvmNatanael Copa2016-06-061-1/+5
| | | | ref #5679
* main/xen: security fixes (CVE-2016-3158, CVE-2016-3159, CVE-2016-3960). ↵Leonardo Arena2016-05-091-1/+9
| | | | Fixes #5489
* main/xen: upgrade to 4.6.1Natanael Copa2016-02-291-63/+19
|
* main/xen: security fix multiple vulnerabilties. Fixes #5159Leonardo Arena2016-02-241-1/+45
| | | | | | | | | | | | (CVE-2016-2270, XSA-154) (CVE-2015-8550, XSA-155) (CVE-2015-8339, CVE-2015-8340, XSA-159) (CVE-2015-8341, XSA-160) (CVE-2015-8555, XSA-165) (CVE-2016-1570, XSA-167) (CVE-2016-1571, XSA 168) (CVE-2015-8615, XSA-169) (CVE-2016-2271, XSA-170)
* main/xen: rebuild against fixed ncurses widechar onlyNatanael Copa2015-12-181-1/+1
|
* main/xen: rebuild against ncurses wide charNatanael Copa2015-12-171-1/+1
|
* main/xen: security fixes (CVE-2015-5307, CVE-2015-8104)Leonardo Arena2015-11-101-1/+5
|
* main/xen: fix install location of init-xenstore-domainNatanael Copa2015-10-291-4/+4
|
* main/xen: upgrade to 4.6.0 and fix sec issuesNatanael Copa2015-10-291-65/+64
|
* main/xen: rebuild against ncurses-6.0Natanael Copa2015-10-161-1/+1
|
* main/xen: security fixes (CVE-2015-3259,CVE-2015-5154)Natanael Copa2015-07-311-1/+25
| | | | ref #4493
* main/xen: enable libnl3Natanael Copa2015-07-011-2/+2
|
* main/xen: fix build with gcc5 and cleanupNatanael Copa2015-07-011-2/+57
|
* main/xen: security upgrade to 4.5.1Natanael Copa2015-07-011-61/+13
|
* main/xen: fix xendomains init.d script with screenNatanael Copa2015-07-011-4/+4
| | | | ref #4394
* main/xen: upgrade to 4.5Natanael Copa2015-05-151-42/+72
|
* main/*: replace all sbin/runscript with sbin/openrc-runNatanael Copa2015-04-281-13/+13
|
* main/xen: upgrade to 4.4.2Natanael Copa2015-04-211-42/+9
|
* main/*: remove libiconv-dev from makedependsNatanael Copa2015-04-091-1/+1
|
* main/xen: fix for xsa118Natanael Copa2015-03-131-1/+5
| | | | ref #3894
* main/xen: various sec fixes (xsa109 - xsa116)Natanael Copa2015-01-231-2/+30
| | | | | | | | | | | | | | | | | | | | | | | | | ref #3704 XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest teardown XSA-114 CVE-2014-9065 CVE-2014-9066 p2m lock starvation XSA-113 CVE-2014-9030 Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor XSA-111 CVE-2014-8866 Excessive checking in compatibility mode hypercall argument translation XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation of far branches XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU update hypercalls
* main/xen: add tmux supportNatanael Copa2014-11-241-8/+8
| | | | remove screen from deps. use no console as default
* main/xen: fix race in xendomains init.d scriptNatanael Copa2014-11-241-4/+4
| | | | | the gnu screen would show files in SCREENDIR before its ready to accept connections. so starting domains failed
* main/xen: write domain 0's domid to xenstoreNatanael Copa2014-11-031-4/+4
| | | | | | Since xen 4.4 we need set domid for dom0. see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
* main/xen: remove perl dependencyNatanael Copa2014-10-091-2/+15
| | | | use a tiny C program to do the file/fd compare instead of perl
* main/xen: split out python bits into py-xenNatanael Copa2014-10-091-2/+29
| | | | so we dont need pull in python as dependency
* main/xen: fix filename clash with qemu and cleanupNatanael Copa2014-10-091-16/+7
|
* main/xen: upgrade to 4.4.1 and remove xendNatanael Copa2014-10-091-72/+16
| | | | fixes #3228
* main/xen: upgrade to 4.3.3 and fix CVE-2014-7188Natanael Copa2014-10-021-6/+9
| | | | | | | | | | | | | | The following critical vulnerabilities have been fixed: - CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible - CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be created - CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection - CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests Also add patch for xsa108: - CVE-2014-7188: Improper MSR range used for x2APIC emulation. ref #3412
* main/xen: integrate XSA-97 patchWilliam Pitcock2014-09-141-0/+2
|
* main/xen: security fix for XSA-97 (CVE-2014-5146,CVE-2014-5149)Natanael Copa2014-08-251-1/+5
| | | | ref #3290