summaryrefslogtreecommitdiffstats
path: root/main/xen/APKBUILD
Commit message (Collapse)AuthorAgeFilesLines
* main/xen: security fix for XSA-75Natanael Copa2013-11-121-1/+5
| | | | ref #2298
* main/xen: upgrade to 4.3.1Natanael Copa2013-11-061-42/+6
|
* main/xen: apply relevant XSA patches (XSA-62 through XSA-71)William Pitcock2013-11-011-1/+33
|
* main/xen: add XSA-73 patchWilliam Pitcock2013-11-011-1/+6
|
* main/xen: ipxe build fixNatanael Copa2013-10-211-2/+6
| | | | | fixes issue similar to this: https://bugs.gentoo.org/show_bug.cgi?id=487254
* main/xen: add general robustness patch for qemu's vncWilliam Pitcock2013-09-291-1/+5
|
* main/xen: implement hotplug script adding vTRILL support for situations ↵William Pitcock2013-09-271-1/+6
| | | | where dom0 is an RBridge
* main/xen: pkgrel bumpWilliam Pitcock2013-09-271-1/+1
|
* main/xen: more robust websockets vencrypt-bypass hackWilliam Pitcock2013-09-271-3/+3
|
* main/xen: add hack to force auth type to use plaintext on tls websocket for ↵William Pitcock2013-09-241-1/+5
| | | | noVNC
* main/xen: xen is no longer supported on x86-32, just x86-64William Pitcock2013-09-081-1/+1
|
* main/xen: qemu-coroutine-gthread.patch rebaseWilliam Pitcock2013-09-081-3/+3
|
* main/xen: use gthread coroutine backend on qemu-xenWilliam Pitcock2013-09-081-1/+5
|
* main/xen: docs build fixWilliam Pitcock2013-09-081-3/+3
|
* main/xen: catch errors from individual build stepsWilliam Pitcock2013-09-081-5/+5
|
* main/xen: fix up qemu-xen-websocket patchWilliam Pitcock2013-09-081-3/+3
|
* main/xen: refactor build tasks and make them work independently as abuild stepsWilliam Pitcock2013-09-081-8/+41
|
* main/xen: initial rebase of patches, fixups neededWilliam Pitcock2013-09-081-48/+13
|
* main/xen: create /var/run/xenNatanael Copa2013-09-021-4/+4
| | | | ref #2031
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-1/+4
|
* main/xen: pkgrel bumpWilliam Pitcock2013-07-021-1/+1
|
* main/xen: enable qemu-xen to stream isos with curlWilliam Pitcock2013-07-021-1/+1
|
* main/xen: enable TLS over websockets (and require it) if X509 is enabledWilliam Pitcock2013-07-011-1/+5
|
* main/xen: fix plaintext websockets supportWilliam Pitcock2013-07-011-4/+4
|
* main/xen: splice in websockets support on qemu-xen device-modelWilliam Pitcock2013-07-011-2/+6
|
* main/xen: fix xsa45 and xsa58 (CVE-2013-1918,CVE-2013-1432)Natanael Copa2013-07-011-1/+9
| | | | ref #2123
* main/xen: fix xsa57 (CVE-2013-2211)Natanael Copa2013-06-261-1/+5
| | | | | ref #2117 fixes #2122
* main/xen: security fix (CVE-2013-2194,CVE-2013-2195,CVE-2013-2196)Natanael Copa2013-06-211-1/+5
| | | | fixes #2115
* main/xen: add spice supportNatanael Copa2013-06-101-2/+3
| | | | It seems to be linked in
* main/xen: security fixes (CVE-2013-2076,CVE-2013-2077,CVE-2013-2078)Natanael Copa2013-06-041-1/+13
| | | | | | ref #2044 ref #2049 ref #2054
* main/xen: rebase pod2man patch properlyWilliam Pitcock2013-06-011-3/+3
|
* main/xen: more pod2man fixesWilliam Pitcock2013-06-011-3/+3
|
* main/xen: fix more pod2man breakageWilliam Pitcock2013-06-011-3/+3
|
* main/xen: fix pod2man chokingWilliam Pitcock2013-06-011-0/+5
|
* main/xen: unset LANG/LC_ALLWilliam Pitcock2013-06-011-0/+2
|
* main/xen: upgrade to 4.2.2William Pitcock2013-06-011-40/+8
|
* main/xen: security fix (CVE-2013-2072)Natanael Copa2013-05-201-1/+5
| | | | ref #1900
* main/xen: add perl as depNatanael Copa2013-05-171-2/+2
| | | | | | | | | Currently it will not start domU at all unless perl is there. There are only few lines of perl that probably easily could be ported to C or Lua or something, but until that happens we need perl :-( fixes #1524
* main/xen: misc fixes for xendomains init.d scriptNatanael Copa2013-05-171-5/+5
| | | | | - we need create the parent dirs for SCREENDIR - sync the need/after deps with gentoo
* main/xen: sleep a bit when starting up xen domainsNatanael Copa2013-05-161-7/+7
| | | | fixes #1850
* main/xen: security fixes ↵Roger Pau Monne2013-04-191-1/+68
| | | | | | | | | | | (CVE-2013-1917,CVE-2013-1919,CVE-2013-1920,CVE-2013-1922) CVE-2013-1917 / XSA-44 CVE-2013-1919 / XSA-46 CVE-2013-1920 / XSA-47 CVE-2013-1922 / XSA-48 Signed-off-by: Natanael Copa <ncopa@alpinelinux.org>
* xen: XSA-36 and XSA-38Roger Pau Monne2013-02-061-1/+5
|
* xen: XSA-34 and XSA-35Roger Pau Monne2013-01-231-1/+5
| | | | | Security fixes for nested virtualization. This only apply to Xen 4.2.x, only edge and 2.5.x Alpine Linux systems are affected.
* xen: XSA-41 remaining patchesRoger Pau Monne2013-01-181-1/+5
| | | | | | | Some patches where not included in the original XSA, this are the remaining ones (so far). To be applied to edge and 2.5
* xen: XSA-41Roger Pau Monne2013-01-171-1/+3
|
* xen: add XSA-33 patchRoger Pau Monne2013-01-141-1/+3
|
* main/xen: disable on eglibcCarlo Landmeter2013-01-051-0/+2
|
* main/xen: add iproute2 to dependsNatanael Copa2012-12-251-2/+2
| | | | ref #1529
* xen: update to 4.2.1Roger Pau Monne2012-12-181-27/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Excerpt from release notes: This fixes the following critical vulnerabilities: * CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability * CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability * CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability * CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability * CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk * CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability * CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs * CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory * CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand() * CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values * CVE-2012-5525 / XSA-32: several hypercalls do not validate input GFNs We recommend all users of the 4.2.0 code base to update to this point release. Among many bug fixes and improvements (around 100 since Xen 4.2.0): * A fix for a long standing time management issue * Bug fixes for S3 (suspend to RAM) handling * Bug fixes for other low level system state handling * Bug fixes and improvements to the libxl tool stack * Bug fixes to nested virtualization
* xen: security fixesRoger Pau Monne2012-12-041-1/+13
| | | | | | | | | | | This covers: XSA-26 (CVE-2012-5510) XSA-27 (CVE-2012-5511) XSA-29 (CVE-2012-5513) XSA-30 (CVE-2012-5514) XSA-31 (CVE-2012-5515) XSA-32 (CVE-2012-5525)