| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
(cherry picked from commit 097c4a54001bde7233db0d2bd2f71767207da03d)
|
|
|
|
| |
(cherry picked from commit 5b95861a7a8be2f706aa8839ce6bf26116fb6809)
|
|
|
|
|
|
|
|
|
| |
By default cmake will use full path to source files (*.c). This will
make the log macro in core/log.h, who uses __FILE__ expand the source
file to full path which will make the logs pretty noisy.
We force cmake to use relative paths.
(cherry picked from commit c243e51cdbad8e9f5c43440513f97fe57f567ceb)
|
|
|
|
|
|
| |
(cherry picked from commit fe84c99e3fe1734640aee76a1f66c41f7a0caac8)
fixes #1481
|
|
|
|
|
| |
ref #1481
(cherry picked from commit 98a4d550920704cf79e621714053157926dd3f52)
|
|
|
|
|
|
|
|
|
|
| |
ref #1465
I think the initramfs create /dev/fd as a dir. When mdev-mount later runs
'ln -snf /proc/self/fd /dev/fd' the 'fd' symlink ends up as /dev/fd/fd.
We fix this by always remove /dev/fd before creating the symlink.
(cherry picked from commit 20dfee5aff22b445738a27d737b31121b709d920)
|
|
|
|
| |
fixes #1511
|
|
|
|
|
| |
ref #1404
(cherry picked from commit ed2761657813f46e8975756b317f7b8ffdd850e1)
|
|
|
|
|
| |
ref #1475
(cherry picked from commit c6c1c3d078dec6fd9ddd110d1d533d79e1dbe6cc)
|
|
|
|
| |
(cherry picked from commit 1e114ef2b08f55b69bbd64d213d3720958949da2)
|
|
|
|
| |
(cherry picked from commit 5d5572c57c5191fdbf859d3837a7f5c4d7b620b7)
|
|
|
|
| |
(cherry picked from commit 7e775bc6a662da96528f6681e4969fd75509ec8a)
|
| |
|
|
|
|
| |
(cherry picked from commit e2da8ff0fcedbd9028e2723da54f44f431c73cf8)
|
|
|
|
| |
(cherry picked from commit d3ec040d21676affd47a1a710611a568f16252f1)
|
|
|
|
|
| |
ref #1525
(cherry picked from commit 55308616857799c744cd6ba246e2ba4d1806a07f)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Excerpt from release notes:
This fixes the following critical vulnerabilities:
* CVE-2012-4535 / XSA-20:
Timer overflow DoS vulnerability
* CVE-2012-4537 / XSA-22:
Memory mapping failure DoS vulnerability
* CVE-2012-4538 / XSA-23:
Unhooking empty PAE entries DoS vulnerability
* CVE-2012-4539 / XSA-24:
Grant table hypercall infinite loop DoS vulnerability
* CVE-2012-4544,CVE-2012-2625 / XSA-25:
Xen domain builder Out-of-memory due to malicious kernel/ramdisk
* CVE-2012-5510 / XSA-26:
Grant table version switch list corruption vulnerability
* CVE-2012-5511 / XSA-27:
several HVM operations do not validate the range of their inputs
* CVE-2012-5513 / XSA-29:
XENMEM_exchange may overwrite hypervisor memory
* CVE-2012-5514 / XSA-30:
Broken error handling in guest_physmap_mark_populate_on_demand()
* CVE-2012-5515 / XSA-31:
Several memory hypercall operations allow invalid extent order
values
* CVE-2012-5525 / XSA-32:
several hypercalls do not validate input GFNs
We recommend all users of the 4.2.0 code base to update to this
point release.
Among many bug fixes and improvements (around 100 since Xen 4.2.0):
* A fix for a long standing time management issue
* Bug fixes for S3 (suspend to RAM) handling
* Bug fixes for other low level system state handling
* Bug fixes and improvements to the libxl tool stack
* Bug fixes to nested virtualization
(cherry picked from commit 119185999980a6a6a78506a6b49e1a70ab55ad03)
|
| |
|
|
|
|
| |
(cherry picked from commit cb77e89c85b1bb1a9a64a61645e6f069211d6534)
|
|
|
|
|
| |
Conflicts:
main/debootstrap/APKBUILD
|
|
|
|
| |
(cherry picked from commit e796416ff54ba8245da9909b91ac65d6a317b543)
|
|
|
|
|
|
|
| |
(cherry picked from commit a961d7672edfda15ce80bb85e36d5e36504bbce1)
Conflicts:
main/squid/APKBUILD
|
|
|
|
| |
(cherry picked from commit 80aa523c971b108d5f472ca5ac576e7deda46240)
|
|
|
|
| |
(cherry picked from commit 429bcc16248a39abd26ba6a03f739804734521b5)
|
|
|
|
| |
(cherry picked from commit e0e8b01f39acbb2a02e35f7372f157ef96506b99)
|
|
|
|
| |
fixes #1488
|
| |
|
|
|
|
|
|
| |
(CVE-2012-4559,CVE-2012-4561,CVE-2012-4562)
fixes #1493
|
|
|
|
| |
fixes #1502
|
|
|
|
| |
fixes #1507
|
|
|
|
| |
fixes #1516
|
| |
|
|
|
|
| |
(cherry picked from commit c46796750567cd3fa8c7cae8b61aa7a7e61c1803)
|
|
|
|
| |
(cherry picked from commit ea5a40b3aff7ef89d011aacea0031a9de6e237b4)
|
|
|
|
| |
(cherry picked from commit 7a7541409db0d9d98931fa18fd4a91b5bb422895)
|
|
|
|
|
|
| |
fixes #1486
(cherry picked from commit 84ad0cd074a4f7e337d0f4f0d4b1fea5a24bea5f)
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The nfs-utils assumes getaddrinfo(AI_NUMERICHOST) never fills in
ai_canonname, but it appears to do on uclibc. It also assumes that if it
filled in, it will be allocated separately and that freeaddrinfo() will
free it. This is not what uclibc does.
This patch should fix a potensial memleak on nfs server and probably it
will fix nfs server on x86_64
ref #1486
(cherry picked from commit 95e73982d6b68780a74a677f0fada23e6392e2fc)
|
|
|
|
|
|
|
|
|
|
|
|
| |
This covers:
XSA-26 (CVE-2012-5510)
XSA-27 (CVE-2012-5511)
XSA-29 (CVE-2012-5513)
XSA-30 (CVE-2012-5514)
XSA-31 (CVE-2012-5515)
XSA-32 (CVE-2012-5525)
(cherry picked from commit 02c9cf16cb335a73de4a175a8f9a451a4a19a1ed)
|
|
|
|
|
| |
screen is needed by xendomains init script. Also bump pkgrel.
(cherry picked from commit 9dcb820d809f104dd8d04314d3ab175334a7470f)
|
|
|
|
| |
(cherry picked from commit a5cfc78fea7ba38a87393901d33cffd50c089e0f)
|
|
|
|
| |
(cherry picked from commit 3ff51d6080e33bb08c705a7faa197a0eac6e3efd)
|
|
|
|
| |
(cherry picked from commit e83f9273a6712fddf7c2a1a940fbf23fe330123f)
|
|
|
|
| |
(cherry picked from commit 82cd3b6de0c480b046ba9e84e165bd03b79115ca)
|
|
|
|
| |
(cherry picked from commit b7902a63ac30cff6562a32162ef856409bbcc455)
|
|
|
|
| |
(cherry picked from commit feed29bcdc750a57b2adc065eb8ca04a98f28f08)
|
|
|
|
| |
(cherry picked from commit d7882b418f925a699a9616958bb91c7c3d1133c7)
|
|
|
|
| |
(cherry picked from commit d5e0d3acd9bebf56545dd176be14add6cb7768cb)
|
|
|
|
| |
(cherry picked from commit 75836d52daac3782e50a56a02122491c6ad997c8)
|
|
|
|
| |
(cherry picked from commit 914d5147ee9281253bbc1693d754970c8b5c1987)
|
|
|
|
| |
(cherry picked from commit 41a35763c0368d6db691f8289906d0d28375f0b2)
|