| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
XSA-204 CVE-2016-10013 x86: Mishandling of SYSCALL singlestep during emulation
XSA-203 CVE-2016-10025 x86: missing NULL pointer check in VMFUNC emulation
XSA-202 CVE-2016-10024 x86 PV guests may be able to mask interrupts
fixes #6570
|
| |
|
|
|
|
|
|
|
|
| |
CVE-2016-9932
CVE-2016-9815
CVE-2016-9816
CVE-2016-9817
CVE-2016-9818
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- XSA-198 CVE-2016-9379 CVE-2016-9380
delimiter injection vulnerabilities in pygrub
- XSA-197 CVE-2016-9381
qemu incautious about shared ring processing
- XSA-196 CVE-2016-9377 CVE-2016-9378
x86 software interrupt injection mis-handled
- XSA-195 CVE-2016-9383
x86 64-bit bit test instruction emulation broken
- XSA-194 CVE-2016-9384
guest 32-bit ELF symbol table load leaking host data
- XSA-193 CVE-2016-9385
x86 segment base write emulation lacking canonical address checks
- XSA-192 CVE-2016-9382
x86 task switch to VM86 mode mis-handled
- XSA-191 CVE-2016-9386
x86 null segments not always treated as unusable
fixes #6495
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Recent kernel updates makes xenstore-read return ESRCH due to
not having a transaction in progress when talking to xenbus,
this makes sure that a transaction is always in place.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
gcc: error: unrecognized argument in option '-mcpu=generic'
gcc: note: valid arguments to '-mcpu=' are: arm1020e arm1020t arm1022e arm1026ej-s arm10e arm10tdmi arm1136j-s arm1136jf-s arm1156t2-s arm1156t2f-s arm1176jz-s arm1176jzf-s arm2 arm250 arm3 arm6 arm60 arm600 arm610 arm620 arm7 arm70 arm700 arm700i arm710 arm7100 arm710c arm710t arm720 arm720t arm740t arm7500 arm7500fe arm7d arm7di arm7dm arm7dmi arm7m arm7tdmi arm7tdmi-s arm8 arm810 arm9 arm920 arm920t arm922t arm926ej-s arm940t arm946e-s arm966e-s arm968e-s arm9e arm9tdmi cortex-a12 cortex-a15 cortex-a15.cortex-a7 cortex-a17 cortex-a17.cortex-a7 cortex-a32 cortex-a35 cortex-a5 cortex-a53 cortex-a57 cortex-a57.cortex-a53 cortex-a7 cortex-a72 cortex-a72.cortex-a53 cortex-a8 cortex-a9 cortex-m0 cortex-m0.small-multiply cortex-m0plus cortex-m0plus.small-multiply cortex-m1 cortex-m1.small-multiply cortex-m3 cortex-m4 cortex-m7 cortex-r4 cortex-r4f cortex-r5 cortex-r7 cortex-r8 ep9312 exynos-m1 fa526 fa606te fa626 fa626te fa726te fmp626 generic-armv7-a iwmmxt iwmmxt2 marvell-pj4 mpcore mpcorenovfp native qdf24xx strongarm strongarm110 strongarm1100 strongarm1110 xgene1 xscale
gcc: error: unrecognized argument in option '-mcpu=generic'
gcc: note: valid arguments to '-mcpu=' are: arm1020e arm1020t arm1022e arm1026ej-s arm10e arm10tdmi arm1136j-s arm1136jf-s arm1156t2-s arm1156t2f-s arm1176jz-s arm1176jzf-s arm2 arm250 arm3 arm6 arm60 arm600 arm610 arm620 arm7 arm70 arm700 arm700i arm710 arm7100 arm710c arm710t arm720 arm720t arm740t arm7500 arm7500fe arm7d arm7di arm7dm arm7dmi arm7m arm7tdmi arm7tdmi-s arm8 arm810 arm9 arm920 arm920t arm922t arm926ej-s arm940t arm946e-s arm966e-s arm968e-s arm9e arm9tdmi cortex-a12 cortex-a15 cortex-a15.cortex-a7 cortex-a17 cortex-a17.cortex-a7 cortex-a32 cortex-a35 cortex-a5 cortex-a53 cortex-a57 cortex-a57.cortex-a53 cortex-a7 cortex-a72 cortex-a72.cortex-a53 cortex-a8 cortex-a9 cortex-m0 cortex-m0.small-multiply cortex-m0plus cortex-m0plus.small-multiply cortex-m1 cortex-m1.small-multiply cortex-m3 cortex-m4 cortex-m7 cortex-r4 cortex-r4f cortex-r5 cortex-r7 cortex-r8 ep9312 exynos-m1 fa526 fa606te fa626 fa626te fa726te fmp626 generic-armv7-a iwmmxt iwmmxt2 marvell-pj4 mpcore mpcorenovfp native qdf24xx strongarm strongarm110 strongarm1100 strongarm1110 xgene1 xscale
gcc: error: unrecognized command line option '-mgeneral-regs-only'
gcc: error: unrecognized command line option '-mgeneral-regs-only'
make[3]: *** [Makefile:103: asm-offsets.s] Error 1
make[3]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen/arch/arm'
make[2]: *** [Makefile:133: /home/buildozer/aports/main/xen/src/xen-4.7.0/xen/xen] Error 2
make[2]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen'
make[1]: *** [Makefile:45: install] Error 2
make[1]: Leaving directory '/home/buildozer/aports/main/xen/src/xen-4.7.0/xen'
|
| |
|
|
|
|
| |
apparently xenstore-read segfaults
|
|
|
|
|
|
|
|
|
| |
fixes:
XSA-185 (CVE-2016-7092)
XSA-186 (CVE-2016-7093)
XSA-187 (CVE-2016-7094)
fixes #6151
|
|
|
|
|
|
|
| |
fixes for:
- CVE-2016-6258
- CVE-2016-6259
- CVE-2016-5403
|
|
|
|
| |
This reverts commit 4138843cb6988b29e88e93a4eb1a87fd2e75cace.
|
|
|
|
|
|
| |
fixes #6016
(cherry picked from commit d0a7fcca4e82f4ff531083fa762975ee6b0ec9f4)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
XSA-181 CVE-2016-5242
arm: Host crash caused by VMID exhaustion
XSA-180 CVE-2014-3672
Unrestricted qemu logging
XSA-179 CVE-2016-3710 CVE-2016-3712
QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
XSA-178 CVE-2016-4963
Unsanitised driver domain input in libxl device handling
XSA-176 CVE-2016-4480
x86 software guest page walk PS bit handling flaw
XSA-175 CVE-2016-4962
Unsanitised guest input in libxl device handling code
XSA-174 CVE-2016-3961
hugetlbfs use may crash PV Linux guests
|
|
|
|
| |
ref #5679
|
|
|
|
| |
Fixes #5489
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
(CVE-2016-2270, XSA-154)
(CVE-2015-8550, XSA-155)
(CVE-2015-8339, CVE-2015-8340, XSA-159)
(CVE-2015-8341, XSA-160)
(CVE-2015-8555, XSA-165)
(CVE-2016-1570, XSA-167)
(CVE-2016-1571, XSA 168)
(CVE-2015-8615, XSA-169)
(CVE-2016-2271, XSA-170)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4493
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #4394
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
ref #3894
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ref #3704
XSA-116 CVE-2015-0361 xen crash due to use after free on hvm guest
teardown
XSA-114 CVE-2014-9065 CVE-2014-9066
p2m lock starvation
XSA-113 CVE-2014-9030 Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling
XSA-112 CVE-2014-8867 Insufficient bounding of "REP MOVS" to MMIO
emulated inside the hypervisor
XSA-111 CVE-2014-8866 Excessive checking in compatibility mode
hypercall argument translation
XSA-110 CVE-2014-8595 Missing privilege level checks in x86 emulation
of far branches
XSA-109 CVE-2014-8594 Insufficient restrictions on certain MMU
update hypercalls
|
|
|
|
| |
remove screen from deps. use no console as default
|
|
|
|
|
| |
the gnu screen would show files in SCREENDIR before its ready to accept
connections. so starting domains failed
|
|
|
|
|
|
| |
Since xen 4.4 we need set domid for dom0.
see http://xenbits.xen.org/gitweb/?p=xen.git;a=patch;h=02ebea7768fe723deaa56c2cfcb860874544b47d
|
|
|
|
| |
use a tiny C program to do the file/fd compare instead of perl
|
|
|
|
| |
so we dont need pull in python as dependency
|
| |
|
|
|
|
| |
fixes #3228
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The following critical vulnerabilities have been fixed:
- CVE-2014-2599 / XSA-89 HVMOP_set_mem_access is not preemptible
- CVE-2014-3124 / XSA-92 HVMOP_set_mem_type allows invalid P2M entries
to be created
- CVE-2014-3967,CVE-2014-3968 / XSA-96 Vulnerabilities in HVM MSI injection
- CVE-2014-4021 / XSA-100 Hypervisor heap contents leaked to guests
Also add patch for xsa108:
- CVE-2014-7188: Improper MSR range used for x2APIC emulation.
ref #3412
|
| |
|
|
|
|
| |
ref #3290
|