lp:ubuntu/quantal-updates/xen
- Get this branch:
- bzr branch lp:ubuntu/quantal-updates/xen
Branch merges
Branch information
Recent revisions
- 37. By Stefan Bader
-
* Applying Xen Security Advisories
- CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
* libelf: abolish libelf-relocate.c
* libxc: introduce xc_dom_seg_to_ ptr_pages
* libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
* libelf: abolish elf_sval and elf_access_signed
* libelf/xc_dom_ load_elf_ symtab: Do not use "syms" uninitialised
* libelf: introduce macros for memory access and pointer handling
* tools/xcutils/readnotes: adjust print_l1_ mfn_valid_ note
* libelf: check nul-terminated strings properly
* libelf: check all pointer accesses
* libelf: Check pointer references in elf_is_elfbinary
* libelf: Make all callers call elf_check_broken
* libelf: use C99 bool for booleans
* libelf: use only unsigned integers
* libxc: Introduce xc_bitops.h
* libelf: check loops for running away
* libelf: abolish obsolete macros
* libxc: Add range checking to xc_dom_binloader
* libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_ range
* libxc: check return values from malloc
* libxc: range checks in xc_dom_p2m_host and _guest
* libxc: check blob size before proceeding in xc_dom_check_gzip
- CVE-XXXX-XXXX / XSA57
* libxl: Restrict permissions on PV console device xenstore nodes - 36. By Stefan Bader
-
* Applying Xen Security Advisories
- CVE-2013-1918 / XSA-45
* x86: make vcpu_destroy_pagetables( ) preemptible
* x86: make new_guest_cr3() preemptible
* x86: make MMUEXT_NEW_USER_ BASEPTR preemptible
* x86: make vcpu_reset() preemptible
* x86: make arch_set_info_guest( ) preemptible
* x86: make page table unpinning preemptible
* x86: make page table handling error paths preemptible
- CVE-2013-1952 / XSA-49
* VT-d: don't permit SVT_NO_VERIFY entries for known device types
- CVE-2013-1964 / XSA-50
* Fix rcu domain locking for transitive grants
- CVE-2013-2076 / XSA-52
* x86/xsave: fix information leak on AMD CPUs
- CVE-2013-2077 / XSA-53
* x86/xsave: recover from faults on XRSTOR
- CVE-2013-2078 / XSA-54
* x86/xsave: properly check guest input to XSETBV
- CVE-2013-2072 / XSA-56
* libxc: limit cpu values when setting vcpu affinity - 35. By Stefan Bader
-
* Applying Xen Security Advisories:
- CVE-2013-1917 / XSA-44
x86: clear EFLAGS.NT in SYSENTER entry path
- CVE-2013-1919 / XSA-46
x86: fix various issues with handling guest IRQs
- CVE-2013-1920 / XSA-47
defer event channel bucket pointer store until after XSM checks - 34. By Stefan Bader
-
* Fix HVM VCPUs getting stuck on boot when host supports SMEP (LP: #1157757)
- 0008-vmx-Simplify- cr0-update- handling- by-deferring- cr4-ch. patch
- 0009-VMX-disable- SMEP-feature- when-guest- is-in-non- paging. patch
- 0010-VMX-Always- disable- SMEP-when- guest-is- in-non- paging- .patch - 33. By Stefan Bader
-
* Applying Xen Security Advisories:
- ACPI: acpi_table_parse() should return handler's error code
CVE-2013-0153 / XSA-36
- oxenstored incorrect handling of certain Xenbus ring states
CVE-2013-0215 / XSA-38 - 32. By Stefan Bader
-
* Applying Xen Security Advisory:
- VT-d: fix interrupt remapping source validation for devices behind
legacy bridges
CVE-2012-5634
* Applying qemu security fixes:
- e1000: Discard packets that are too long if !SBP and !LPE
CVE-2012-6075
- Discard packets longer than 16384 when !SBP to match the hardware
behavior.
CVE-2012-6075 - 31. By Stefan Bader
-
* Applying Xen Security fixes (LP: #1086801, #1086875)
- VCPU/timers: Prevent overflow in calculations, leading to DoS
vulnerability
CVE-2012-4535
- x86/physdev: Range check pirq parameter from guests
CVE-2012-4536
- x86/physmap: Prevent incorrect updates of m2p mappings
CVE-2012-4537
- xen/mm/shadow: check toplevel pagetables are present before unhooking
them
CVE-2012-4538
- compat/gnttab: Prevent infinite loop in compat code
CVE-2012-4539
- libxc: builder: limit maximum size of kernel/ramdisk
CVE-2012-4544
- gnttab: fix releasing of memory upon switches between versions
CVE-2012-5510
- hvm: Limit the size of large HVM op batches
CVE-2012-5511
- x86/HVM: range check xen_hvm_set_mem_ access. hvmmem_ access before use
CVE-2012-5512
- xen: add missing guest address range checks to XENMEM_exchange handlers
CVE-2012-5513
- xen: fix error handling of guest_physmap_mark_populate_ on_demand( )
CVE-2012-5514
- memop: limit guest specified extent order
CVE-2012-5515 - 30. By Stefan Bader
-
* Merge from Debian unstable. Remaining changes:
- libxenstore3.0: Conflict and replaces libxen3.
- libxen-dev: Conflict and replaces libxen3-dev.
- xenstore-utils: Conflict and replaces libxen3.
- xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
and xen-utils-4.1.
- Change depend back to ipxe as we do not have ipxe-qemu.
- etherboot: Change the config back to include the 8086100e.rom
- Dropped:
- Make sure the LDFLAGS value passed is suitable for use by ld
rather than gcc. Right now there seem to be no LDFLAGS passed.
* Backported AMD specific improvements from upstream Xen (LP: #1009098):
- svm: Do not intercept RDTSC(P) when TSC scaling is supported by hardware
- x86: Use deep C states for off-lined CPUs
- x86/AMD: Add support for AMD's OSVW feature in guests.
- hvm: vpmu: Enable HVM VPMU for AMD Family 12h and 14h processors - 29. By Chuck Short
-
[ Ubuntu Merge-o-Matic ]
* Merge from Debian unstable. Remaining changes:
- Thanks to Stefan Bader.
- libxenstore3.0: Conflict and replaces libxen3.
- libxen-dev: Conflict and replaces libxen3-dev.
- xenstore-utils: Conflict and replaces libxen3.
- xen-utils-4.1: Conflict and replaces libxen3, python-xen-3.3,
and xen-utils-4.1.
- Change depend back to ipxe as we do not have ipxe-qemu.
- etherboot: Change the config back to include the 8086100e.rom
- Dropped:
- Make sure the LDFLAGS value passed is suitable for use by ld
rather than gcc. Right now there seem to be no LDFLAGS passed.
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp:ubuntu/raring/xen