aboutsummaryrefslogtreecommitdiffstats
path: root/main/xen
Commit message (Collapse)AuthorAgeFilesLines
* main/xen: security fixes #6919 (XSA-207, CVE-2017-2615, CVE-2017-2620)Leonardo Arena2017-06-167-1/+355
|
* main/xen: security fixes #7292Leonardo Arena2017-06-154-14/+281
| | | | CVE-2017-8903, CVE-2017-8904, CVE-2017-8905
* main/xen: security fixes #7116 (CVE-2016-9603, CVE-2017-7228)Leonardo Arena2017-04-284-1/+591
|
* main/xen: security upgrade to 4.5.5 - fixes #6573Sergey Lukin2016-12-2650-3638/+156
| | | | | | | | | | | | Removed patches that are already applied in xen-4.5.5 https://www.xenproject.org/downloads/xen-archives/xen-45-series/xen-455.html New fixes: CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts http://xenbits.xen.org/xsa/advisory-202.html CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation http://xenbits.xen.org/xsa/advisory-204.html
* main/xen: security fixes. Fixes #6543Leonardo Arena2016-12-205-1/+493
| | | | | | | | | CVE-2016-9932 CVE-2016-9815 CVE-2016-9816 CVE-2016-9818 (cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
* main/xen: security upgrade - fixes #6351, #6498Sergey Lukin2016-12-1311-1/+842
| | | | | | | | | | | | | | CVE-2016-7777 CVE-2016-9377 CVE-2016-9378 CVE-2016-9379 CVE-2016-9380 CVE-2016-9381 CVE-2016-9382 CVE-2016-9383 CVE-2016-9384 CVE-2016-9385 CVE-2016-9386
* main/xen: security fixes. Fixes #6154Leonardo Arena2016-10-146-6/+365
| | | | | | | | | CVE-2016-7092, XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests¶ CVE-2016-7093, XSA-186: x86: Mishandling of instruction pointer truncation during emulation¶ CVE-2016-7094, XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]¶ CVE-2016-7154, XSA-188: use after free in FIFO event channel code (cherry picked from commit 4e7e31ba548ffec94da90438b7f64a61026becd8)
* main/xen: security upgrade to 4.5.3. Fixes #6019Leonardo Arena2016-08-1223-1651/+334
| | | | (CVE-2016-5242, CVE-2016-6258, CVE-2016-6259, CVE-2016-5403)
* main/xen: security fixes. Fixes #5777Leonardo Arena2016-06-2434-1/+2590
| | | | | | | | | | | CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code http://xenbits.xen.org/xsa/advisory-175.html CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw http://xenbits.xen.org/xsa/advisory-176.html CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling http://xenbits.xen.org/xsa/advisory-178.html
* main/xen: security fixes (CVE-2016-3158, CVE-2016-3159, CVE-2016-3960). ↵Leonardo Arena2016-05-093-1/+292
| | | | Fixes #5491
* main/xen: security fix multiple vulnerabilities. Fixes #5161Leonardo Arena2016-02-2413-1/+1001
| | | | | | | | | | | | (CVE-2016-2270, XSA-154) (CVE-2015-8550, XSA-155) (CVE-2015-8339, CVE-2015-8340, XSA-159) (CVE-2015-8341, XSA-160) (CVE-2015-8555, XSA-165) (CVE-2016-1570, XSA-167) (CVE-2016-1571, XSA 168) (CVE-2015-8615, XSA-169) (CVE-2016-2271, XSA-170)
* main/xen: security fixes (CVE-2015-5307, CVE-2015-8104)Leonardo Arena2015-11-102-1/+132
|
* main/xen: security fixes (CVE-2015-3259,CVE-2015-5154)Natanael Copa2015-07-317-1/+579
| | | | fixes #4494
* main/xen: enable libnl3Natanael Copa2015-07-011-2/+2
|
* main/xen: security upgrade to 4.5.1Natanael Copa2015-06-3017-1361/+152
|
* main/xen: fix xendomains init.d script with screenNatanael Copa2015-06-302-5/+5
| | | | fixes #4394
* main/xen: upgrade to 4.5Natanael Copa2015-05-1518-63/+1383
|
* main/*: replace all sbin/runscript with sbin/openrc-runNatanael Copa2015-04-286-18/+18
|
* main/xen: upgrade to 4.4.2Natanael Copa2015-04-2111-1160/+45
|
* main/*: remove libiconv-dev from makedependsNatanael Copa2015-04-091-1/+1
|
* main/xen: fix for xsa118Natanael Copa2015-03-132-1/+120
| | | | ref #3894
* main/xen: various sec fixes (xsa109 - xsa116)Natanael Copa2015-01-238-2/+997
| | | | | | | | | | | | | | | | | | | | | | | | | ref #3704 XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest teardown XSA-114 CVE-2014-9065 CVE-2014-9066 p2m lock starvation XSA-113 CVE-2014-9030 Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor XSA-111 CVE-2014-8866 Excessive checking in compatibility mode hypercall argument translation XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation of far branches XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU update hypercalls
* main/xen: add tmux supportNatanael Copa2014-11-243-21/+53
| | | | remove screen from deps. use no console as default
* main/xen: fix race in xendomains init.d scriptNatanael Copa2014-11-242-39/+59
| | | | | the gnu screen would show files in SCREENDIR before its ready to accept connections. so starting domains failed
* main/xen: write domain 0's domid to xenstoreNatanael Copa2014-11-032-7/+8
| | | | | | Since xen 4.4 we need set domid for dom0. see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
* main/xen: remove perl dependencyNatanael Copa2014-10-093-2/+101
| | | | use a tiny C program to do the file/fd compare instead of perl
* main/xen: split out python bits into py-xenNatanael Copa2014-10-091-2/+29
| | | | so we dont need pull in python as dependency
* main/xen: fix filename clash with qemu and cleanupNatanael Copa2014-10-097-94/+18
|
* main/xen: upgrade to 4.4.1 and remove xendNatanael Copa2014-10-0914-2014/+74
| | | | fixes #3228
* main/xen: upgrade to 4.3.3 and fix CVE-2014-7188Natanael Copa2014-10-022-6/+45
| | | | | | | | | | | | | | The following critical vulnerabilities have been fixed: - CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible - CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries to be created - CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection - CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests Also add patch for xsa108: - CVE-2014-7188: Improper MSR range used for x2APIC emulation. ref #3412
* main/xen: integrate XSA-97 patchWilliam Pitcock2014-09-141-0/+2
|
* main/xen: security fix for XSA-97 (CVE-2014-5146,CVE-2014-5149)Natanael Copa2014-08-252-1/+490
| | | | ref #3290
* main/xen: fix hvmloaderNatanael Copa2014-08-254-1/+3048
| | | | | | | | | hvmloader is 32 bit but pulled in 64bit stdint from musl headers. we solve this by providing our own stdint_local.h elf.h pulls in stdint.h too so we ship our own elf_local.h too ref #3308
* main/xen: make sure /var/run/xen existsNatanael Copa2014-06-113-9/+11
| | | | | | | | | - start xendomains after localmount so localmount does not mount over our /var - add checkpath to xendomains, just in case ref #2837
* main/xen: revision bump (to resign)William Pitcock2014-04-251-1/+1
|
* main/xen: upgrade to 4.3.2William Pitcock2014-04-095-174/+27
|
* main/xen: fix uclibc regression in musl-support patchWilliam Pitcock2014-03-252-14/+3
|
* main/xen: update makedepends for autoreconfWilliam Pitcock2014-03-241-1/+1
|
* main/xen: pkgrel bumpWilliam Pitcock2014-03-241-1/+1
|
* main/xen: build_tools clean on muslWilliam Pitcock2014-03-242-3/+55
|
* main/xen: further work on muslWilliam Pitcock2014-03-242-0/+62
|
* main/xen: some work on muslWilliam Pitcock2014-03-241-1/+5
|
* xen: use posix syntax for findNatanael Copa2014-01-061-2/+3
| | | | seems like busybox 1.22 needs it
* main/xen: add makedepends on findutilsWilliam Pitcock2014-01-031-1/+1
|
* main/xen: fix checksumsWilliam Pitcock2014-01-031-3/+3
|
* Revert "Revert "main/xen: implement experimental support for running the ↵William Pitcock2014-01-034-12/+39
| | | | | | xenstore as a stubdomain"" This reverts commit 4c825a2884ff2910d84d948141f320bd3fad3b6c.
* Revert "main/xen: implement experimental support for running the xenstore as ↵Natanael Copa2014-01-034-39/+12
| | | | | | | | a stubdomain" fails to build and blocks build server This reverts commit 157e38bfbb80daadeea3df319acaa6a098a7c280.
* main/xen: implement experimental support for running the xenstore as a ↵William Pitcock2013-12-314-12/+39
| | | | stubdomain
* main/xen: security fix for XSA-75Natanael Copa2013-11-122-1/+60
| | | | ref #2298
* main/xen: upgrade to 4.3.1Natanael Copa2013-11-0610-634/+6
|