| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
| |
|
|
|
|
|
|
| |
(CVE-2017-12135, CVE-2017-12137, CVE-2017-12136, CVE-2017-12134, CVE-2017-12855)
fixes #7736
|
| |
|
|
|
|
|
|
| |
(CVE-2017-14316, CVE-2017-14317, CVE-2017-14318, CVE-2017-14319)
fixes #7823
|
| |
|
|
|
|
| |
CVE-2017-8903, CVE-2017-8904, CVE-2017-8905
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts
http://xenbits.xen.org/xsa/advisory-202.html
CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation
http://xenbits.xen.org/xsa/advisory-203.html
CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation
http://xenbits.xen.org/xsa/advisory-204.html
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9817
CVE-2016-9818
(cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7777
CVE-2016-9377
CVE-2016-9378
CVE-2016-9379
CVE-2016-9380
CVE-2016-9381
CVE-2016-9382
CVE-2016-9383
CVE-2016-9385
CVE-2016-9386
|
|
|
|
|
|
|
| |
CVE-2016-7092, XSA-185: x86: Disallow L3 recursive pagetable for 32-bit PV guests¶
CVE-2016-7093, XSA-186: x86: Mishandling of instruction pointer truncation during emulation¶
CVE-2016-7094, XSA-187: x86 HVM: Overflow of sh_ctxt->seg_reg[]¶
CVE-2016-7154, XSA-188: use after free in FIFO event channel code
|
|
|
|
|
|
| |
fixes #6018
(cherry picked from commit d0a7fcca4e82f4ff531083fa762975ee6b0ec9f4)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code
http://xenbits.xen.org/xsa/advisory-175.html
CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw
http://xenbits.xen.org/xsa/advisory-176.html
CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling
http://xenbits.xen.org/xsa/advisory-178.html
CVE-2016-3710 CVE-2016-3712, XSA-179: QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
http://xenbits.xen.org/xsa/advisory-179.html
CVE-2014-3672, XSA-180: Unrestricted qemu logging
http://xenbits.xen.org/xsa/advisory-180.html
|
|
|
|
|
|
| |
Fixes #5490
(cherry picked from commit 40a3ee6c24583c262a4a8390459526dc40832862)
|
|
|
|
| |
(cherry picked from commit 8de87f6fcb13498bc4cc667709aa9e481f087f7a)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(CVE-2016-2270, XSA-154)
(CVE-2015-8550, XSA-155)
(CVE-2015-8339, CVE-2015-8340, XSA-159)
(CVE-2015-8341, XSA-160)
(CVE-2015-8555, XSA-165)
(CVE-2016-1570, XSA-167)
(CVE-2016-1571, XSA 168)
(CVE-2015-8615, XSA-169)
(CVE-2016-2271, XSA-170)
(cherry picked from commit ccba2d08cc9d7de25cfa2eccbe943cb2e4ced400)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4493
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4394
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #3894
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ref #3704
XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest
teardown
XSA-114 CVE-2014-9065 CVE-2014-9066
p2m lock starvation
XSA-113 CVE-2014-9030 Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling
XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO
emulated inside the hypervisor
XSA-111 CVE-2014-8866 Excessive checking in compatibility mode
hypercall argument translation
XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation
of far branches
XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU
update hypercalls
|
|
|
|
| |
remove screen from deps. use no console as default
|
|
|
|
|
| |
the gnu screen would show files in SCREENDIR before its ready to accept
connections. so starting domains failed
|
|
|
|
|
|
| |
Since xen 4.4 we need set domid for dom0.
see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
|
|
|
|
| |
use a tiny C program to do the file/fd compare instead of perl
|
|
|
|
| |
so we dont need pull in python as dependency
|
| |
|
|
|
|
| |
fixes #3228
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
ref #3412
|
| |
|
|
|
|
| |
ref #3290
|
|
|
|
|
|
|
|
|
| |
hvmloader is 32 bit but pulled in 64bit stdint from musl headers. we solve
this by providing our own stdint_local.h
elf.h pulls in stdint.h too so we ship our own elf_local.h too
ref #3308
|
|
|
|
|
|
|
|
|
| |
- start xendomains after localmount so localmount does not mount over
our /var
- add checkpath to xendomains, just in case
ref #2837
|
| |
|
| |
|
| |
|