ubuntu/+source/xen:applied/ubuntu/yakkety

Last commit made on 2016-10-07
Get this branch:
git clone -b applied/ubuntu/yakkety https://git.launchpad.net/ubuntu/+source/xen
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/ubuntu/yakkety
Repository:
lp:ubuntu/+source/xen

Recent commits

00c5e50... by Stefan Bader on 2016-10-06

Import patches-applied version 4.7.0-0ubuntu2 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: e5deb9b98695b08fa5277bf983940a416ef8a031
Unapplied parent: 8063ee741f3b53752d06ef4213c1ae8014db1af1

New changelog entries:
  * Applying Xen Security Advisories:
    - CVE-2016-6258 / XSA-182
      * x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath
    - CVE-2016-6259 / XSA-183
      * x86/entry: Avoid SMAP violation in compat_create_bounce_frame()
    - CVE-2016-7092 / XSA-185
      * x86/32on64: don't allow recursive page tables from L3
    - CVE-2016-7093 / XSA-186
      * x86/emulate: Correct boundary interactions of emulated instructions
      * hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual
        boundary
    - CVE-2016-7094 / XSA-187
      * x86/shadow: Avoid overflowing sh_ctxt->seg_reg[]
      * x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]
    - CVE-2016-7777 / XSA-190
      * x86emul: honor guest CR0.TS and CR0.EM

8063ee7... by Stefan Bader on 2016-10-06

xsa190.patch

No DEP3 Subject or Description header found

Gbp-Pq: xsa190.patch.

4a4fab9... by Stefan Bader on 2016-10-06

x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]

Gbp-Pq: xsa187-4.7-0002-x86-segment-Bounds-check-accesses-to-emulation-ctx.patch.

57d23cd... by Stefan Bader on 2016-10-06

x86/shadow: Avoid overflowing sh_ctxt->seg_reg[]

Gbp-Pq: xsa187-4.7-0001-x86-shadow-Avoid-overflowing-sh_ctxt-seg.patch.

22e9abd... by Stefan Bader on 2016-10-06

hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual boundary

Gbp-Pq: xsa186-4.7-0002-hvm-fep-Allow-testing-of-instructions-crossing-the.patch.

0e3d882... by Stefan Bader on 2016-10-06

[PATCH 1/2] x86/emulate: Correct boundary interactions of emulated

Gbp-Pq: xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch.

d35cb9b... by Stefan Bader on 2016-10-06

x86/32on64: don't allow recursive page tables from L3

Gbp-Pq: xsa185.patch.

f70585f... by Stefan Bader on 2016-10-06

[PATCH] x86/entry: Avoid SMAP violation in compat_create_bounce_frame()

Gbp-Pq: xsa183-unstable.patch.

2aefaf7... by Stefan Bader on 2016-10-06

[PATCH] x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath

Gbp-Pq: xsa182-unstable.patch.

518e446... by Stefan Bader on 2016-10-06

libxc: correct max_pfn calculation for saving domain

Gbp-Pq: preup-tools-fix-linear-p2m-save.patch.