| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The 4.2.5 release fixes:
CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be
created
CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
In addition we add patches for:
CVE-2014-7154 / XSA-104 Race condition in HVMOP_track_dirty_vram
CVE-2014-7155 / XSA-105 Missing privilege level checks in x86 HLT, LGDT,
LIDT, and LMSW emulation
CVE-2014-7156 / XSA-106 Missing privilege level checks in x86 emulation of
software interrupts
CVE-2014-7188 / XSA-108 Improper MSR range used for x2APIC emulation
fixes #3458
Conflicts:
main/xen/APKBUILD
|
|
|
|
| |
fixes #3292
|
|
|
|
| |
fixes #2424
|
|
|
|
| |
fixes #2324
|
|
|
|
| |
fixes #2031
|
|
|
|
|
|
|
|
|
|
| |
ref #2123
fixes #2124
(cherry picked from commit 448e4822bbf8a2b4aa8b8f8d8153a2a0b4e0efda)
Conflicts:
main/xen/APKBUILD
|
|
|
|
|
| |
ref #2117
fixes #2118
|
|
|
|
|
|
|
|
| |
fixes #2109
(cherry picked from commit f78e9dea47b7c130cb417d9826c984d8664f01ec)
Conflicts:
main/xen/APKBUILD
|
|
|
|
|
|
|
|
|
|
| |
ref #2044
ref #2049
ref #2054
fixes #2045
fixes #2050
fixes #2055
(cherry picked from commit f6e99451d47fbe7cdb852f48dd11006808db52ae)
|
|
|
|
| |
(cherry picked from commit 6267268090d5c23664a5b13dfe02eb3594d5e5db)
|
|
|
|
| |
(cherry picked from commit 6e8d8f7559a5bcde7f49af5c9944fa642ad77fa2)
|
|
|
|
| |
(cherry picked from commit 36bfee190e2e5cafe5bf04546f291831d72073a7)
|
|
|
|
| |
(cherry picked from commit c664d6766c3aef2a323bf49feb1bb2f542f60800)
|
|
|
|
| |
(cherry picked from commit 5b97248f06efe1114dc3545585b3b92eb1cf4490)
|
|
|
|
| |
(cherry picked from commit d3978bf9dc42f00c8d05d8eac255f93ef154b503)
|
|
|
|
| |
(cherry picked from commit f43d4be65d60aff92ecb0352209c4037ccc38d33)
|
|
|
|
|
| |
ref #1900
fixes #1901
|
|
|
|
|
|
|
|
|
| |
Currently it will not start domU at all unless perl is there.
There are only few lines of perl that probably easily could be ported to
C or Lua or something, but until that happens we need perl :-(
fixes #1524
|
|
|
|
|
| |
- we need create the parent dirs for SCREENDIR
- sync the need/after deps with gentoo
|
|
|
|
| |
fixes #1850
|
|
|
|
|
|
|
|
|
|
|
| |
(CVE-2013-1917,CVE-2013-1919,CVE-2013-1920,CVE-2013-1922)
CVE-2013-1917 / XSA-44
CVE-2013-1919 / XSA-46
CVE-2013-1920 / XSA-47
CVE-2013-1922 / XSA-48
Signed-off-by: Natanael Copa <ncopa@alpinelinux.org>
|
| |
|
|
|
|
|
| |
Security fixes for nested virtualization. This only apply to Xen
4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
|
|
|
|
|
|
|
| |
Some patches where not included in the original XSA, this are the
remaining ones (so far).
To be applied to edge and 2.5
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #1529
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Excerpt from release notes:
This fixes the following critical vulnerabilities:
* CVE-2012-4535 / XSA-20:
Timer overflow DoS vulnerability
* CVE-2012-4537 / XSA-22:
Memory mapping failure DoS vulnerability
* CVE-2012-4538 / XSA-23:
Unhooking empty PAE entries DoS vulnerability
* CVE-2012-4539 / XSA-24:
Grant table hypercall infinite loop DoS vulnerability
* CVE-2012-4544,CVE-2012-2625 / XSA-25:
Xen domain builder Out-of-memory due to malicious kernel/ramdisk
* CVE-2012-5510 / XSA-26:
Grant table version switch list corruption vulnerability
* CVE-2012-5511 / XSA-27:
several HVM operations do not validate the range of their inputs
* CVE-2012-5513 / XSA-29:
XENMEM_exchange may overwrite hypervisor memory
* CVE-2012-5514 / XSA-30:
Broken error handling in guest_physmap_mark_populate_on_demand()
* CVE-2012-5515 / XSA-31:
Several memory hypercall operations allow invalid extent order
values
* CVE-2012-5525 / XSA-32:
several hypercalls do not validate input GFNs
We recommend all users of the 4.2.0 code base to update to this
point release.
Among many bug fixes and improvements (around 100 since Xen 4.2.0):
* A fix for a long standing time management issue
* Bug fixes for S3 (suspend to RAM) handling
* Bug fixes for other low level system state handling
* Bug fixes and improvements to the libxl tool stack
* Bug fixes to nested virtualization
|
|
|
|
|
|
|
|
|
|
|
| |
This covers:
XSA-26 (CVE-2012-5510)
XSA-27 (CVE-2012-5511)
XSA-29 (CVE-2012-5513)
XSA-30 (CVE-2012-5514)
XSA-31 (CVE-2012-5515)
XSA-32 (CVE-2012-5525)
|
|
|
|
| |
screen is needed by xendomains init script. Also bump pkgrel.
|
| |
|
|
|
|
|
|
| |
xenstore should not be restarted. If it is restarted watches are lost,
and several key components like kernel backend drivers will cease to
work.
|
| |
|
|
|
|
| |
Signed-off-by: Roger Pau Monne <roger.pau@citrix.com>
|
|
|
|
|
|
|
|
|
|
| |
This covers:
XSA-20
XSA-22
XSA-23
XSA-24
Signed-off-by: Roger Pau Monne <roger.pau@citrix.com>
|
|
|
|
|
|
|
| |
Qemu when launched with -nographic and -monitor screws the console
badly. Use nohup to prevent that.
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
On 02/11/12 12:05, Leonardo Arena wrote:
> On Fri, 2012-11-02 at 11:49 +0100, Roger Pau Monne wrote:
>> Xen init scripts doesn't need to depend on 'net'
>> ---
>> Please update APK checksum
>> ---
>> main/xen/xend.initd | 2 +-
>> main/xen/xenstored.initd | 1 -
>> 2 files changed, 1 insertions(+), 2 deletions(-)
>>
>> diff --git a/main/xen/xend.initd b/main/xen/xend.initd
>> index 1c667e8..bd5550b 100644
>> --- a/main/xen/xend.initd
>> +++ b/main/xen/xend.initd
>> @@ -4,7 +4,7 @@
>> # $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xend.initd-r2,v 1.2 2011/09/10 17:22:46 alexxy Exp $
>>
>> depend() {
>> - need net xenconsoled xenstored
>> + need xenconsoled xenstored
>> after firewall
>> before xendomains sshd
>> }
>> diff --git a/main/xen/xenstored.initd b/main/xen/xenstored.initd
>> index f2c22cc..6187c02 100644
>> --- a/main/xen/xenstored.initd
>> +++ b/main/xen/xenstored.initd
>> @@ -4,7 +4,6 @@
>> # $Header: /var/cvsroot/gentoo-x86/app-emulation/xen-tools/files/xenstored.initd,v 1.2 2011/04/05 21:25:03 alexxy Exp $
>>
>> depend() {
>> - need net
>> before xendomains xend sshd ntp-client ntpd nfs nfsmount rsyncd portmap dhcp
>> }
>>
>
> Applied both patches.
On the rush I forgot to increase pkgrel, can you commit this please:
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
|
| |
|
|
|
|
|
|
| |
Xen init scripts doesn't need to depend on 'net'
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
|
|
|
|
| |
Signed-off-by: Leonardo Arena <rnalrd@alpinelinux.org>
|
| |
|
| |
|
|
|
|
|
|
| |
Next version (4.2) is scheduled to be released very soon
if everything goes ok. This is a very close rc,
which we can start testing until 4.2 comes out.
|
| |
|
|
|
|
| |
Otherwise screen -x will not work without manually setting screen dir
|
|
|
|
|
|
|
| |
We need wait til the detatched screen has created the connection
sockets before trying to set the opts to it.
ref #1181
|
|
|
|
|
|
| |
This should be backported to stable.
Signed-off-by: Roger Pau Monne <roger.pau@citrix.com>
|
| |
|
|
|
|
|
|
| |
Mount /proc/xen on init if it's not mounted.
Signed-off-by: Roger Pau Monne <roger.pau@entel.upc.edu>
|