View Git repositories
Name Status Last Modified Last Commit
lp:ubuntu/wily/xen 1 Development 2015-05-06 05:37:41 UTC 2015-05-06
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/vivid/xen 2 Mature 2014-10-27 01:55:54 UTC 2014-10-27
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/utopic/xen 2 Mature 2014-04-25 07:34:03 UTC 2014-04-25
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/trusty/xen 2 Mature 2013-10-21 09:28:14 UTC 2013-10-21
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/precise-security/xen bug 2 Mature 2013-06-21 14:52:44 UTC 2013-06-21
36. * Applying Xen Security Advisories ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:52:44 UTC

* Applying Xen Security Advisories
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: abolish elf_sval and elf_access_signed
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libxc: Introduce xc_bitops.h
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/precise-updates/xen bug 2 Mature 2013-06-21 14:52:44 UTC 2013-06-21
38. * Applying Xen Security Advisories ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:52:44 UTC

* Applying Xen Security Advisories
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: abolish elf_sval and elf_access_signed
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libxc: Introduce xc_bitops.h
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/quantal-security/xen bug 2 Mature 2013-06-21 14:44:27 UTC 2013-06-21
36. * Applying Xen Security Advisories ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:44:27 UTC

* Applying Xen Security Advisories
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: abolish elf_sval and elf_access_signed
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libxc: Introduce xc_bitops.h
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/quantal-updates/xen bug 2 Mature 2013-06-21 14:44:27 UTC 2013-06-21
37. * Applying Xen Security Advisories ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:44:27 UTC

* Applying Xen Security Advisories
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: abolish elf_sval and elf_access_signed
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libxc: Introduce xc_bitops.h
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/raring-security/xen 2 Mature 2013-06-21 14:38:24 UTC 2013-06-21
38. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:38:24 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/raring-updates/xen 2 Mature 2013-06-21 14:38:24 UTC 2013-06-21
38. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:38:24 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/saucy/xen 2 Mature 2013-06-21 14:23:14 UTC 2013-06-21
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/saucy-proposed/xen 1 Development 2013-06-21 14:23:14 UTC 2013-06-21
43. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-06-21 14:23:14 UTC

* Applying Xen Security Advisories:
  - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
    * libelf: abolish libelf-relocate.c
    * libxc: introduce xc_dom_seg_to_ptr_pages
    * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
    * libelf: add `struct elf_binary*' parameter to elf_load_image
    * libelf: abolish elf_sval and elf_access_signed
    * libelf: move include of <asm/guest_access.h> to top of file
    * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
    * libelf: introduce macros for memory access and pointer handling
    * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
    * libelf: check nul-terminated strings properly
    * libelf: check all pointer accesses
    * libelf: Check pointer references in elf_is_elfbinary
    * libelf: Make all callers call elf_check_broken
    * libelf: use C99 bool for booleans
    * libelf: use only unsigned integers
    * libelf: check loops for running away
    * libelf: abolish obsolete macros
    * libxc: Add range checking to xc_dom_binloader
    * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
    * libxc: check return values from malloc
    * libxc: range checks in xc_dom_p2m_host and _guest
    * libxc: check blob size before proceeding in xc_dom_check_gzip
    * libxc: Better range check in xc_dom_alloc_segment
  - CVE-XXXX-XXXX / XSA57
    * libxl: Restrict permissions on PV console device xenstore nodes

lp:ubuntu/quantal-proposed/xen bug 2 Mature 2013-04-17 08:52:31 UTC 2013-04-17
34. * Fix HVM VCPUs getting stuck on boot...

Author: Stefan Bader
Revision Date: 2013-04-08 14:37:33 UTC

* Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
  - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
  - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
  - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

lp:ubuntu/precise-proposed/xen bug 2 Mature 2013-04-17 08:52:27 UTC 2013-04-17
31. * Fix HVM VCPUs getting stuck on boot...

Author: Stefan Bader
Revision Date: 2013-04-08 17:53:45 UTC

* Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
  - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
  - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
  - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

lp:ubuntu/raring/xen bug 1 Development 2013-04-08 19:21:57 UTC 2013-04-08
35. * Fix FTBS on i386 - 0007-x86-Fix-i...

Author: Stefan Bader
Revision Date: 2013-04-05 16:39:45 UTC

* Fix FTBS on i386
  - 0007-x86-Fix-i386-virtual-apic.patch
* Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
  - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
  - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
  - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

lp:ubuntu/raring-proposed/xen bug 2 Mature 2013-04-08 18:50:28 UTC 2013-04-08
39. * Fix FTBS on i386 - 0007-x86-Fix-i...

Author: Stefan Bader
Revision Date: 2013-04-05 16:39:45 UTC

* Fix FTBS on i386
  - 0007-x86-Fix-i386-virtual-apic.patch
* Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
  - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
  - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
  - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch

lp:ubuntu/oneiric-security/xen bug 2 Mature 2013-01-30 13:37:48 UTC 2013-01-30
29. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-01-30 13:37:48 UTC

* Applying Xen Security Advisories:
  - ACPI: acpi_table_parse() should return handler's error code
    CVE-2013-0153 / XSA-36
  - oxenstored incorrect handling of certain Xenbus ring states
    CVE-2013-0215 / XSA-38
* xen-introduce-xzalloc.patch
  Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
* xen-backport-per-device-vector-map.patch
  Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  Also fixes issues on AMD systems which could cause Dom0 to loose disks
  under heavy I/O (because PCI-E devices could use the same IOAPIC vector
  as the SMBus).

lp:ubuntu/oneiric-updates/xen bug 2 Mature 2013-01-30 13:37:48 UTC 2013-01-30
30. * Applying Xen Security Advisories: ...

Author: Stefan Bader
Revision Date: 2013-01-30 13:37:48 UTC

* Applying Xen Security Advisories:
  - ACPI: acpi_table_parse() should return handler's error code
    CVE-2013-0153 / XSA-36
  - oxenstored incorrect handling of certain Xenbus ring states
    CVE-2013-0215 / XSA-38
* xen-introduce-xzalloc.patch
  Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
* xen-backport-per-device-vector-map.patch
  Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36
  Also fixes issues on AMD systems which could cause Dom0 to loose disks
  under heavy I/O (because PCI-E devices could use the same IOAPIC vector
  as the SMBus).

lp:ubuntu/quantal/xen bug 2 Mature 2012-10-15 01:43:43 UTC 2012-10-15
30. * Merge from Debian unstable. Remaini...

Author: Stefan Bader
Revision Date: 2012-09-27 21:27:44 UTC

* Merge from Debian unstable. Remaining changes:
  - libxenstore3.0: Conflict and replaces libxen3.
  - libxen-dev: Conflict and replaces libxen3-dev.
  - xenstore-utils: Conflict and replaces libxen3.
  - xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
    and xen-utils-4.1.
  - Change depend back to ipxe as we do not have ipxe-qemu.
  - etherboot: Change the config back to include the 8086100e.rom
  - Dropped:
    - Make sure the LDFLAGS value passed is suitable for use by ld
      rather than gcc. Right now there seem to be no LDFLAGS passed.
* Backported AMD specific improvements from upstream Xen (LP: #1009098):
  - svm: Do not intercept RDTSC(P) when TSC scaling is supported by hardware
  - x86: Use deep C states for off-lined CPUs
  - x86/AMD: Add support for AMD's OSVW feature in guests.
  - hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors

lp:ubuntu/precise/xen bug 2 Mature 2012-03-09 06:09:21 UTC 2012-03-09
28. etherboot: Change the config back to ...

Author: Stefan Bader
Revision Date: 2012-03-06 20:58:14 UTC

etherboot: Change the config back to include the 8086100e.rom
(LP: #948333)

lp:ubuntu/oneiric-proposed/xen 2 Mature 2012-01-26 00:55:00 UTC 2012-01-26
25. debian/patches/xen-pirq-resubmit-irq....

Author: Chuck Short
Revision Date: 2011-10-10 19:30:09 UTC

debian/patches/xen-pirq-resubmit-irq.patch: Retrigger
pirq events when asserted while processing. Thanks to Stefan Bader
(LP: #854829)

lp:ubuntu/oneiric/xen 2 Mature 2012-01-26 00:54:53 UTC 2012-01-26
24. Rebuild to drop build records on arme...

Author: Matthias Klose
Revision Date: 2011-10-06 14:15:35 UTC

Rebuild to drop build records on armel and powerpc. LP: #823714.

lp:ubuntu/feisty/xen 1 Development 2009-07-27 09:08:53 UTC 2009-07-27
3. * Patches applied upstream: non-xen-i...

Author: Adam Heath
Revision Date: 2005-07-06 12:35:50 UTC

* Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
  python-install.patch, disable-html-docs.patch.
* New upstream released. Closes: #311336.
* Remove comparison to UML from xen short description. Closes: #317066.
* Make packages conflicts with 1.2 doc debs. Closes: #304285.
* Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
  #317468.

lp:ubuntu/edgy/xen 1 Development 2009-07-27 09:08:37 UTC 2009-07-27
3. * Patches applied upstream: non-xen-i...

Author: Adam Heath
Revision Date: 2005-07-06 12:35:50 UTC

* Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
  python-install.patch, disable-html-docs.patch.
* New upstream released. Closes: #311336.
* Remove comparison to UML from xen short description. Closes: #317066.
* Make packages conflicts with 1.2 doc debs. Closes: #304285.
* Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
  #317468.

lp:ubuntu/dapper/xen 2 Mature 2009-07-27 09:08:20 UTC 2009-07-27
3. * Patches applied upstream: non-xen-i...

Author: Adam Heath
Revision Date: 2005-07-06 12:35:50 UTC

* Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
  python-install.patch, disable-html-docs.patch.
* New upstream released. Closes: #311336.
* Remove comparison to UML from xen short description. Closes: #317066.
* Make packages conflicts with 1.2 doc debs. Closes: #304285.
* Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
  #317468.

lp:ubuntu/breezy/xen 1 Development 2009-07-27 09:08:05 UTC 2009-07-27
3. * Patches applied upstream: non-xen-i...

Author: Adam Heath
Revision Date: 2005-07-06 12:35:50 UTC

* Patches applied upstream: non-xen-init-exit.patch, add-build.patch,
  python-install.patch, disable-html-docs.patch.
* New upstream released. Closes: #311336.
* Remove comparison to UML from xen short description. Closes: #317066.
* Make packages conflicts with 1.2 doc debs. Closes: #304285.
* Add iproute to xen depends, as it uses /bin/ip. Closes: #300488,
  #317468.

lp:ubuntu/warty/xen 1 Development 2009-07-27 09:07:54 UTC 2009-07-27
2. Added xen-docs.README.Debian, which e...

Author: Adam Heath
Revision Date: 2004-03-26 17:36:41 UTC

Added xen-docs.README.Debian, which explains the kernel image layout,
and contains references on the locations differ from what is mentioned
by the upstream documentation. Closes: #230345.

127 of 27 results