Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | main/xen: security fix for XSA-75 | Natanael Copa | 2013-11-12 | 1 | -1/+5 |
| | | | | ref #2298 | ||||
* | main/xen: upgrade to 4.3.1 | Natanael Copa | 2013-11-06 | 1 | -42/+6 |
| | |||||
* | main/xen: apply relevant XSA patches (XSA-62 through XSA-71) | William Pitcock | 2013-11-01 | 1 | -1/+33 |
| | |||||
* | main/xen: add XSA-73 patch | William Pitcock | 2013-11-01 | 1 | -1/+6 |
| | |||||
* | main/xen: ipxe build fix | Natanael Copa | 2013-10-21 | 1 | -2/+6 |
| | | | | | fixes issue similar to this: https://bugs.gentoo.org/show_bug.cgi?id=487254 | ||||
* | main/xen: add general robustness patch for qemu's vnc | William Pitcock | 2013-09-29 | 1 | -1/+5 |
| | |||||
* | main/xen: implement hotplug script adding vTRILL support for situations ↵ | William Pitcock | 2013-09-27 | 1 | -1/+6 |
| | | | | where dom0 is an RBridge | ||||
* | main/xen: pkgrel bump | William Pitcock | 2013-09-27 | 1 | -1/+1 |
| | |||||
* | main/xen: more robust websockets vencrypt-bypass hack | William Pitcock | 2013-09-27 | 1 | -3/+3 |
| | |||||
* | main/xen: add hack to force auth type to use plaintext on tls websocket for ↵ | William Pitcock | 2013-09-24 | 1 | -1/+5 |
| | | | | noVNC | ||||
* | main/xen: xen is no longer supported on x86-32, just x86-64 | William Pitcock | 2013-09-08 | 1 | -1/+1 |
| | |||||
* | main/xen: qemu-coroutine-gthread.patch rebase | William Pitcock | 2013-09-08 | 1 | -3/+3 |
| | |||||
* | main/xen: use gthread coroutine backend on qemu-xen | William Pitcock | 2013-09-08 | 1 | -1/+5 |
| | |||||
* | main/xen: docs build fix | William Pitcock | 2013-09-08 | 1 | -3/+3 |
| | |||||
* | main/xen: catch errors from individual build steps | William Pitcock | 2013-09-08 | 1 | -5/+5 |
| | |||||
* | main/xen: fix up qemu-xen-websocket patch | William Pitcock | 2013-09-08 | 1 | -3/+3 |
| | |||||
* | main/xen: refactor build tasks and make them work independently as abuild steps | William Pitcock | 2013-09-08 | 1 | -8/+41 |
| | |||||
* | main/xen: initial rebase of patches, fixups needed | William Pitcock | 2013-09-08 | 1 | -48/+13 |
| | |||||
* | main/xen: create /var/run/xen | Natanael Copa | 2013-09-02 | 1 | -4/+4 |
| | | | | ref #2031 | ||||
* | [all autotools packages]: normalize ./configure | Timo Teräs | 2013-07-30 | 1 | -1/+4 |
| | |||||
* | main/xen: pkgrel bump | William Pitcock | 2013-07-02 | 1 | -1/+1 |
| | |||||
* | main/xen: enable qemu-xen to stream isos with curl | William Pitcock | 2013-07-02 | 1 | -1/+1 |
| | |||||
* | main/xen: enable TLS over websockets (and require it) if X509 is enabled | William Pitcock | 2013-07-01 | 1 | -1/+5 |
| | |||||
* | main/xen: fix plaintext websockets support | William Pitcock | 2013-07-01 | 1 | -4/+4 |
| | |||||
* | main/xen: splice in websockets support on qemu-xen device-model | William Pitcock | 2013-07-01 | 1 | -2/+6 |
| | |||||
* | main/xen: fix xsa45 and xsa58 (CVE-2013-1918,CVE-2013-1432) | Natanael Copa | 2013-07-01 | 1 | -1/+9 |
| | | | | ref #2123 | ||||
* | main/xen: fix xsa57 (CVE-2013-2211) | Natanael Copa | 2013-06-26 | 1 | -1/+5 |
| | | | | | ref #2117 fixes #2122 | ||||
* | main/xen: security fix (CVE-2013-2194,CVE-2013-2195,CVE-2013-2196) | Natanael Copa | 2013-06-21 | 1 | -1/+5 |
| | | | | fixes #2115 | ||||
* | main/xen: add spice support | Natanael Copa | 2013-06-10 | 1 | -2/+3 |
| | | | | It seems to be linked in | ||||
* | main/xen: security fixes (CVE-2013-2076,CVE-2013-2077,CVE-2013-2078) | Natanael Copa | 2013-06-04 | 1 | -1/+13 |
| | | | | | | ref #2044 ref #2049 ref #2054 | ||||
* | main/xen: rebase pod2man patch properly | William Pitcock | 2013-06-01 | 1 | -3/+3 |
| | |||||
* | main/xen: more pod2man fixes | William Pitcock | 2013-06-01 | 1 | -3/+3 |
| | |||||
* | main/xen: fix more pod2man breakage | William Pitcock | 2013-06-01 | 1 | -3/+3 |
| | |||||
* | main/xen: fix pod2man choking | William Pitcock | 2013-06-01 | 1 | -0/+5 |
| | |||||
* | main/xen: unset LANG/LC_ALL | William Pitcock | 2013-06-01 | 1 | -0/+2 |
| | |||||
* | main/xen: upgrade to 4.2.2 | William Pitcock | 2013-06-01 | 1 | -40/+8 |
| | |||||
* | main/xen: security fix (CVE-2013-2072) | Natanael Copa | 2013-05-20 | 1 | -1/+5 |
| | | | | ref #1900 | ||||
* | main/xen: add perl as dep | Natanael Copa | 2013-05-17 | 1 | -2/+2 |
| | | | | | | | | | Currently it will not start domU at all unless perl is there. There are only few lines of perl that probably easily could be ported to C or Lua or something, but until that happens we need perl :-( fixes #1524 | ||||
* | main/xen: misc fixes for xendomains init.d script | Natanael Copa | 2013-05-17 | 1 | -5/+5 |
| | | | | | - we need create the parent dirs for SCREENDIR - sync the need/after deps with gentoo | ||||
* | main/xen: sleep a bit when starting up xen domains | Natanael Copa | 2013-05-16 | 1 | -7/+7 |
| | | | | fixes #1850 | ||||
* | main/xen: security fixes ↵ | Roger Pau Monne | 2013-04-19 | 1 | -1/+68 |
| | | | | | | | | | | | (CVE-2013-1917,CVE-2013-1919,CVE-2013-1920,CVE-2013-1922) CVE-2013-1917 / XSA-44 CVE-2013-1919 / XSA-46 CVE-2013-1920 / XSA-47 CVE-2013-1922 / XSA-48 Signed-off-by: Natanael Copa <ncopa@alpinelinux.org> | ||||
* | xen: XSA-36 and XSA-38 | Roger Pau Monne | 2013-02-06 | 1 | -1/+5 |
| | |||||
* | xen: XSA-34 and XSA-35 | Roger Pau Monne | 2013-01-23 | 1 | -1/+5 |
| | | | | | Security fixes for nested virtualization. This only apply to Xen 4.2.x, only edge and 2.5.x Alpine Linux systems are affected. | ||||
* | xen: XSA-41 remaining patches | Roger Pau Monne | 2013-01-18 | 1 | -1/+5 |
| | | | | | | | Some patches where not included in the original XSA, this are the remaining ones (so far). To be applied to edge and 2.5 | ||||
* | xen: XSA-41 | Roger Pau Monne | 2013-01-17 | 1 | -1/+3 |
| | |||||
* | xen: add XSA-33 patch | Roger Pau Monne | 2013-01-14 | 1 | -1/+3 |
| | |||||
* | main/xen: disable on eglibc | Carlo Landmeter | 2013-01-05 | 1 | -0/+2 |
| | |||||
* | main/xen: add iproute2 to depends | Natanael Copa | 2012-12-25 | 1 | -2/+2 |
| | | | | ref #1529 | ||||
* | xen: update to 4.2.1 | Roger Pau Monne | 2012-12-18 | 1 | -27/+3 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Excerpt from release notes: This fixes the following critical vulnerabilities: * CVE-2012-4535 / XSA-20: Timer overflow DoS vulnerability * CVE-2012-4537 / XSA-22: Memory mapping failure DoS vulnerability * CVE-2012-4538 / XSA-23: Unhooking empty PAE entries DoS vulnerability * CVE-2012-4539 / XSA-24: Grant table hypercall infinite loop DoS vulnerability * CVE-2012-4544,CVE-2012-2625 / XSA-25: Xen domain builder Out-of-memory due to malicious kernel/ramdisk * CVE-2012-5510 / XSA-26: Grant table version switch list corruption vulnerability * CVE-2012-5511 / XSA-27: several HVM operations do not validate the range of their inputs * CVE-2012-5513 / XSA-29: XENMEM_exchange may overwrite hypervisor memory * CVE-2012-5514 / XSA-30: Broken error handling in guest_physmap_mark_populate_on_demand() * CVE-2012-5515 / XSA-31: Several memory hypercall operations allow invalid extent order values * CVE-2012-5525 / XSA-32: several hypercalls do not validate input GFNs We recommend all users of the 4.2.0 code base to update to this point release. Among many bug fixes and improvements (around 100 since Xen 4.2.0): * A fix for a long standing time management issue * Bug fixes for S3 (suspend to RAM) handling * Bug fixes for other low level system state handling * Bug fixes and improvements to the libxl tool stack * Bug fixes to nested virtualization | ||||
* | xen: security fixes | Roger Pau Monne | 2012-12-04 | 1 | -1/+13 |
| | | | | | | | | | | | This covers: XSA-26 (CVE-2012-5510) XSA-27 (CVE-2012-5511) XSA-29 (CVE-2012-5513) XSA-30 (CVE-2012-5514) XSA-31 (CVE-2012-5515) XSA-32 (CVE-2012-5525) |