ubuntu/+source/xen:applied/ubuntu/precise-updates

Last commit made on 2017-01-12
Get this branch:
git clone -b applied/ubuntu/precise-updates https://git.launchpad.net/ubuntu/+source/xen
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/ubuntu/precise-updates
Repository:
lp:ubuntu/+source/xen

Recent commits

817a3c3... by Stefan Bader on 2017-01-11

Import patches-applied version 4.1.6.1-0ubuntu0.12.04.13 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 4672c400ae6bdc368376749f143af7682a23d4b3
Unapplied parent: 83bed17cd07bde9fa8f1762f3b614545501b84c0

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2016-9386 / XSA-191
      * x86/hvm: Fix the handling of non-present segments
    - CVE-2016-9382 / XSA-192
      * x86/HVM: don't load LDTR with VM86 mode attrs during task switch
    - CVE-2016-9383 / XSA-195
      * x86emul: fix huge bit offset handling
    - CVE-2016-9381 / XSA-197
      * xen: fix ioreq handling
    - CVE-2016-9379, CVE-2016-9380 / XSA-198
      * pygrub: Properly quote results, when returning them to the caller
    - CVE-2016-9637 / XSA-199
      * qemu: ioport_read, ioport_write: be defensive about 32-bit addresses
    - CVE-2016-9932 / XSA-200
      * x86/emulator: add feature checks for newer instructions
      * x86emul: CMPXCHG8B ignores operand size prefix
    - CVE-2016-10024 / XSA-202
      * x86: use MOV instead of PUSH/POP when saving/restoring register state
      * x86: force EFLAGS.IF on when exiting to PV guests
    - CVE-2016-10013 / XSA-204
      * x86/emul: Correct the handling of eflags with SYSCALL

83bed17... by Stefan Bader on 2017-01-11

[PATCH] x86/emul: Correct the handling of eflags with SYSCALL

Gbp-Pq: xsa204-4.5.patch.

617583c... by Stefan Bader on 2017-01-11

x86: force EFLAGS.IF on when exiting to PV guests

Gbp-Pq: xsa202-4.4.patch.

7bcbc12... by Stefan Bader on 2017-01-11

[PATCH] x86: use MOV instead of PUSH/POP when saving/restoring

Gbp-Pq: xsa202-4.1-prereq1.patch.

b66de0d... by Stefan Bader on 2017-01-11

x86emul: CMPXCHG8B ignores operand size prefix

Gbp-Pq: xsa200-4.6.patch.

9324064... by Stefan Bader on 2017-01-11

[PATCH] x86/emulator: add feature checks for newer instructions

Gbp-Pq: xsa200-4.1-prereq1.patch.

e44da44... by Stefan Bader on 2017-01-11

[PATCH] qemu: ioport_read, ioport_write: be defensive about 32-bit

Gbp-Pq: xsa199-trad.patch.

f64afa7... by Stefan Bader on 2017-01-11

[PATCH] pygrub: Properly quote results, when returning them to the

Gbp-Pq: xsa198.patch.

6b7588a... by Stefan Bader on 2017-01-11

xen: fix ioreq handling

Gbp-Pq: xsa197-4.5-qemut.patch.

04f50b5... by Stefan Bader on 2017-01-11

x86emul: fix huge bit offset handling

Gbp-Pq: xsa195.patch.