aboutsummaryrefslogtreecommitdiffstats
path: root/main/xen
Commit message (Collapse)AuthorAgeFilesLines
* main/xen: security fixes (CVE-2014-7154, CVE-2014-7155, CVE-2014-7156)Natanael Copa2014-10-234-1/+118
| | | | | | | | | | XSA-104 CVE-2014-7154 Race condition in HVMOP_track_dirty_vram XSA-105 CVE-2014-7155 Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation XSA-106 CVE-2014-7156 Missing privilege level checks in x86 emulation of software interrupts fixes #3459
* main/xen: upgrade to 4.3.3 and fix CVE-2014-7188Natanael Copa2014-10-142-4/+44
| | | | | | | | | | | | | | The following critical vulnerabilities have been fixed: - CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible - CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be created - CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection - CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests Also add patch for xsa108: - CVE-2014-7188: Improper MSR range used for x2APIC emulation. fixes #3415
* main/xen: upgrade to 4.3.2 and fix XSA-97 (CVE-2014-5146,CVE-2014-5149)Natanael Copa2014-08-254-173/+494
| | | | fixes #3293
* main/xen: security fix for XSA-75Natanael Copa2013-11-122-1/+60
| | | | | ref #2298 fixes #2325
* main/xen: upgrade to 4.3.1Natanael Copa2013-11-0610-634/+6
|
* main/xen: apply relevant XSA patches (XSA-62 through XSA-71)William Pitcock2013-11-019-1/+511
|
* main/xen: add XSA-73 patchWilliam Pitcock2013-11-012-1/+111
|
* main/xen: ipxe build fixNatanael Copa2013-10-212-2/+292
| | | | | fixes issue similar to this: https://bugs.gentoo.org/show_bug.cgi?id=487254
* main/xen: add general robustness patch for qemu's vncWilliam Pitcock2013-09-292-1/+73
|
* main/xen: implement hotplug script adding vTRILL support for situations ↵William Pitcock2013-09-272-1/+144
| | | | where dom0 is an RBridge
* main/xen: pkgrel bumpWilliam Pitcock2013-09-271-1/+1
|
* main/xen: more robust websockets vencrypt-bypass hackWilliam Pitcock2013-09-272-8/+58
|
* main/xen: add hack to force auth type to use plaintext on tls websocket for ↵William Pitcock2013-09-242-1/+16
| | | | noVNC
* main/xen: xen is no longer supported on x86-32, just x86-64William Pitcock2013-09-081-1/+1
|
* main/xen: qemu-coroutine-gthread.patch rebaseWilliam Pitcock2013-09-082-5/+5
|
* main/xen: decruft old and unused patchesWilliam Pitcock2013-09-081-10/+0
|
* main/xen: use gthread coroutine backend on qemu-xenWilliam Pitcock2013-09-082-1/+15
|
* main/xen: docs build fixWilliam Pitcock2013-09-082-3/+14
|
* main/xen: catch errors from individual build stepsWilliam Pitcock2013-09-081-5/+5
|
* main/xen: fix up qemu-xen-websocket patchWilliam Pitcock2013-09-082-5/+14
|
* main/xen: refactor build tasks and make them work independently as abuild stepsWilliam Pitcock2013-09-081-8/+41
|
* main/xen: initial rebase of patches, fixups neededWilliam Pitcock2013-09-0812-5443/+140
|
* main/xen: create /var/run/xenNatanael Copa2013-09-022-5/+7
| | | | ref #2031
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-1/+4
|
* main/xen: pkgrel bumpWilliam Pitcock2013-07-021-1/+1
|
* main/xen: enable qemu-xen to stream isos with curlWilliam Pitcock2013-07-021-1/+1
|
* main/xen: enable TLS over websockets (and require it) if X509 is enabledWilliam Pitcock2013-07-012-1/+119
|
* main/xen: fix plaintext websockets supportWilliam Pitcock2013-07-012-9/+21
|
* main/xen: splice in websockets support on qemu-xen device-modelWilliam Pitcock2013-07-013-2/+926
|
* main/xen: fix xsa45 and xsa58 (CVE-2013-1918,CVE-2013-1432)Natanael Copa2013-07-013-1/+1271
| | | | ref #2123
* main/xen: fix xsa57 (CVE-2013-2211)Natanael Copa2013-06-262-1/+338
| | | | | ref #2117 fixes #2122
* main/xen: security fix (CVE-2013-2194,CVE-2013-2195,CVE-2013-2196)Natanael Copa2013-06-212-1/+3436
| | | | fixes #2115
* main/xen: add spice supportNatanael Copa2013-06-101-2/+3
| | | | It seems to be linked in
* main/xen: security fixes (CVE-2013-2076,CVE-2013-2077,CVE-2013-2078)Natanael Copa2013-06-044-1/+140
| | | | | | ref #2044 ref #2049 ref #2054
* main/xen: rebase pod2man patch properlyWilliam Pitcock2013-06-012-14/+3
|
* main/xen: more pod2man fixesWilliam Pitcock2013-06-012-3/+64
|
* main/xen: fix more pod2man breakageWilliam Pitcock2013-06-012-3/+14
|
* main/xen: fix pod2man chokingWilliam Pitcock2013-06-012-0/+16
|
* main/xen: unset LANG/LC_ALLWilliam Pitcock2013-06-011-0/+2
|
* main/xen: remove obsolete XSA patches.William Pitcock2013-06-018-872/+0
|
* main/xen: upgrade to 4.2.2William Pitcock2013-06-011-40/+8
|
* main/xen: security fix (CVE-2013-2072)Natanael Copa2013-05-202-1/+55
| | | | ref #1900
* main/xen: add perl as depNatanael Copa2013-05-171-2/+2
| | | | | | | | | Currently it will not start domU at all unless perl is there. There are only few lines of perl that probably easily could be ported to C or Lua or something, but until that happens we need perl :-( fixes #1524
* main/xen: misc fixes for xendomains init.d scriptNatanael Copa2013-05-172-7/+10
| | | | | - we need create the parent dirs for SCREENDIR - sync the need/after deps with gentoo
* main/xen: sleep a bit when starting up xen domainsNatanael Copa2013-05-163-7/+24
| | | | fixes #1850
* main/xen: security fixes ↵Roger Pau Monne2013-04-196-1/+638
| | | | | | | | | | | (CVE-2013-1917,CVE-2013-1919,CVE-2013-1920,CVE-2013-1922) CVE-2013-1917 / XSA-44 CVE-2013-1919 / XSA-46 CVE-2013-1920 / XSA-47 CVE-2013-1922 / XSA-48 Signed-off-by: Natanael Copa <ncopa@alpinelinux.org>
* xen: XSA-36 and XSA-38Roger Pau Monne2013-02-063-1/+401
|
* xen: XSA-34 and XSA-35Roger Pau Monne2013-01-233-1/+59
| | | | | Security fixes for nested virtualization. This only apply to Xen 4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
* xen: XSA-41 remaining patchesRoger Pau Monne2013-01-183-1/+111
| | | | | | | Some patches where not included in the original XSA, this are the remaining ones (so far). To be applied to edge and 2.5
* xen: XSA-41Roger Pau Monne2013-01-172-1/+75
|