| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
CVE-2017-8903, CVE-2017-8904, CVE-2017-8905
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Removed patches that are already applied in xen-4.5.5
https://www.xenproject.org/downloads/xen-archives/xen-45-series/xen-455.html
New fixes:
CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts
http://xenbits.xen.org/xsa/advisory-202.html
CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation
http://xenbits.xen.org/xsa/advisory-204.html
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9818
(cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7777
CVE-2016-9377
CVE-2016-9378
CVE-2016-9379
CVE-2016-9380
CVE-2016-9381
CVE-2016-9382
CVE-2016-9383
CVE-2016-9384
CVE-2016-9385
CVE-2016-9386
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7092, XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests¶
CVE-2016-7093, XSA-186: x86: Mishandling of instruction pointer truncation during emulation¶
CVE-2016-7094, XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]¶
CVE-2016-7154, XSA-188: use after free in FIFO event channel code
(cherry picked from commit 4e7e31ba548ffec94da90438b7f64a61026becd8)
|
|
|
|
| |
(CVE-2016-5242, CVE-2016-6258, CVE-2016-6259, CVE-2016-5403)
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code
http://xenbits.xen.org/xsa/advisory-175.html
CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw
http://xenbits.xen.org/xsa/advisory-176.html
CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling
http://xenbits.xen.org/xsa/advisory-178.html
|
|
|
|
| |
Fixes #5491
|
|
|
|
|
|
|
|
|
|
|
|
| |
(CVE-2016-2270, XSA-154)
(CVE-2015-8550, XSA-155)
(CVE-2015-8339, CVE-2015-8340, XSA-159)
(CVE-2015-8341, XSA-160)
(CVE-2015-8555, XSA-165)
(CVE-2016-1570, XSA-167)
(CVE-2016-1571, XSA 168)
(CVE-2015-8615, XSA-169)
(CVE-2016-2271, XSA-170)
|
| |
|
|
|
|
| |
fixes #4494
|
| |
|
| |
|
|
|
|
| |
fixes #4394
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #3894
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ref #3704
XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest
teardown
XSA-114 CVE-2014-9065 CVE-2014-9066
p2m lock starvation
XSA-113 CVE-2014-9030 Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling
XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO
emulated inside the hypervisor
XSA-111 CVE-2014-8866 Excessive checking in compatibility mode
hypercall argument translation
XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation
of far branches
XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU
update hypercalls
|
|
|
|
| |
remove screen from deps. use no console as default
|
|
|
|
|
| |
the gnu screen would show files in SCREENDIR before its ready to accept
connections. so starting domains failed
|
|
|
|
|
|
| |
Since xen 4.4 we need set domid for dom0.
see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
|
|
|
|
| |
use a tiny C program to do the file/fd compare instead of perl
|
|
|
|
| |
so we dont need pull in python as dependency
|
| |
|
|
|
|
| |
fixes #3228
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
ref #3412
|
| |
|
|
|
|
| |
ref #3290
|
|
|
|
|
|
|
|
|
| |
hvmloader is 32 bit but pulled in 64bit stdint from musl headers. we solve
this by providing our own stdint_local.h
elf.h pulls in stdint.h too so we ship our own elf_local.h too
ref #3308
|
|
|
|
|
|
|
|
|
| |
- start xendomains after localmount so localmount does not mount over
our /var
- add checkpath to xendomains, just in case
ref #2837
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
seems like busybox 1.22 needs it
|
| |
|
| |
|
|
|
|
|
|
| |
xenstore as a stubdomain""
This reverts commit 4c825a2884ff2910d84d948141f320bd3fad3b6c.
|
|
|
|
|
|
|
|
| |
a stubdomain"
fails to build and blocks build server
This reverts commit 157e38bfbb80daadeea3df319acaa6a098a7c280.
|
|
|
|
| |
stubdomain
|
|
|
|
| |
ref #2298
|
| |
|