| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
CVE-2018-10471, CVE-2018-10472, CVE-2018-8897,
CVE-2018-10981, CVE-2018-10982
Fixes #8889
|
|
|
|
|
|
|
| |
CVE-2018-7540, XSA-252
CVE-2018-7541, XSA-255
Fixes #8617
|
|
|
|
|
|
|
|
|
| |
CVE-2017-17566, XSA-248
CVE-2017-17563, XSA-249
CVE-2017-17564, XSA-250
CVE-2017-17565, XSA-251
Partially fixes #8523
|
|
|
|
|
|
|
| |
CVE-2017-15596, CVE-2017-15588, CVE-2017-15589, CVE-2017-15590, XSA-238
CVE-2017-15593, CVE-2017-15592, CVE-2017-15594, CVE-2017-15595, CVE-2017-15597
Fixes #8064
|
|
|
|
|
|
| |
CVE-2017-17044, CVE-2017-17045
Fixes #8222
|
| |
|
|
|
|
|
|
| |
(CVE-2017-12135, CVE-2017-12137, CVE-2017-12136, CVE-2017-12134, CVE-2017-12855)
fixes #7734
|
| |
|
|
|
|
|
|
| |
(CVE-2017-14316, CVE-2017-14317, CVE-2017-14318, CVE-2017-14319)
fixes #7822
|
| |
|
|
|
|
| |
CVE-2017-8903, CVE-2017-8904, CVE-2017-8905
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts
http://xenbits.xen.org/xsa/advisory-202.html
CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation
http://xenbits.xen.org/xsa/advisory-203.html
CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation
http://xenbits.xen.org/xsa/advisory-204.html
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9817
CVE-2016-9818
(cherry picked from commit 3b5fa3b170637b8149c63d415d3a42c638b8b71a)
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9386
CVE-2016-9382
CVE-2016-9385
CVE-2016-9383
CVE-2016-9377
CVE-2016-9378
CVE-2016-9381
CVE-2016-9379
CVE-2016-9380
|
| |
|
|
|
|
|
|
| |
Recent kernel updates makes xenstore-read return ESRCH due to
not having a transaction in progress when talking to xenbus,
this makes sure that a transaction is always in place.
|
|
|
|
|
|
|
|
| |
XSA-185 (CVE-2016-7092)
XSA-186 (CVE-2016-7093)
XSA-187 (CVE-2016-7094)
fixes #6152
|
| |
|
|
|
|
| |
fixes #6017
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-4962, XSA-175: Unsanitised guest input in libxl device handling code
http://xenbits.xen.org/xsa/advisory-175.html
CVE-2016-4480, XSA-176: x86 software guest page walk PS bit handling flaw
http://xenbits.xen.org/xsa/advisory-176.html
CVE-2016-4963, XSA-178: Unsanitised driver domain input in libxl device handling
http://xenbits.xen.org/xsa/advisory-178.html
CVE-2016-3710 CVE-2016-3712, XSA-179: QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
http://xenbits.xen.org/xsa/advisory-179.html
CVE-2014-3672, XSA-180: Unrestricted qemu logging
http://xenbits.xen.org/xsa/advisory-180.html
|
|
|
|
|
|
| |
fixes #5679
(cherry picked from commit 76eb405243001ae8f8b49a1fd50cffe55acaa2c6)
|
|
|
|
| |
Fixes #5489
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
(CVE-2016-2270, XSA-154)
(CVE-2015-8550, XSA-155)
(CVE-2015-8339, CVE-2015-8340, XSA-159)
(CVE-2015-8341, XSA-160)
(CVE-2015-8555, XSA-165)
(CVE-2016-1570, XSA-167)
(CVE-2016-1571, XSA 168)
(CVE-2015-8615, XSA-169)
(CVE-2016-2271, XSA-170)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4493
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4394
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #3894
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ref #3704
XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest
teardown
XSA-114 CVE-2014-9065 CVE-2014-9066
p2m lock starvation
XSA-113 CVE-2014-9030 Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling
XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO
emulated inside the hypervisor
XSA-111 CVE-2014-8866 Excessive checking in compatibility mode
hypercall argument translation
XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation
of far branches
XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU
update hypercalls
|
|
|
|
| |
remove screen from deps. use no console as default
|
|
|
|
|
| |
the gnu screen would show files in SCREENDIR before its ready to accept
connections. so starting domains failed
|
|
|
|
|
|
| |
Since xen 4.4 we need set domid for dom0.
see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
|
|
|
|
| |
use a tiny C program to do the file/fd compare instead of perl
|
|
|
|
| |
so we dont need pull in python as dependency
|
| |
|