Last commit made on 2017-03-16
Get this branch:
git clone -b applied/ubuntu/yakkety-proposed https://git.launchpad.net/ubuntu/+source/xen
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information


Recent commits

c435a75... by Stefan Bader on 2017-03-14

Import patches-applied version 4.7.2-0ubuntu1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: c508d12e06d00292ed54021f6757798f0e2dd5ab
Unapplied parent: be280a22c943a35ea6f83df7bd7af170e7a91a27

New changelog entries:
  * Rebasing to upstream stable release 4.7.2 (LP: #1672767)
    - Includes fix for booting 4.10 Linux kernels in HVM guests on Intel
      hosts which support the TSC_ADJUST MSR (LP: #1671760)
    - Dropping: d/p/preup-tools-fix-linear-p2m-save.patch which is part
      of the stable update.
    - Additional security relevant changes:
      * XSA-207
        - memory leak when destroying guest without PT devices
    - Replacing the following security fixes with the versions from the
      stable update:
      * CVE-2016-6258 / XSA-182
        - x86: Privilege escalation in PV guests
      * CVE-2016-6259 / XSA-183
        - x86: Missing SMAP whitelisting in 32-bit exception / event delivery
      * CVE-2016-7092 / XSA-185
        - x86: Disallow L3 recursive pagetable for 32-bit PV guests
      * CVE-2016-7093 / XSA-186
        - x86: Mishandling of instruction pointer truncation during emulation
      * CVE-2016-7094 / XSA-187
        - x86 HVM: Overflow of sh_ctxt->seg_reg[]
      * CVE-2016-7777 / XSA-190
        - CR0.TS and CR0.EM not always honored for x86 HVM guests
      * CVE-2016-9386 / XSA-191
        - x86 null segments not always treated as unusable
      * CVE-2016-9382 / XSA-192
        - x86 task switch to VM86 mode mis-handled
      * CVE-2016-9385 / XSA-193
        - x86 segment base write emulation lacking canonical address checks
      * CVE-2016-9384 / XSA-194
        - guest 32-bit ELF symbol table load leaking host data
      * CVE-2016-9383 / XSA-195
        - x86 64-bit bit test instruction emulation broken
      * CVE-2016-9377, CVE-2016-9378 / XSA-196
        - x86 software interrupt injection mis-handled
      * CVE-2016-9379, CVE-2016-9380 / XSA-198
        - delimiter injection vulnerabilities in pygrub
      * CVE-2016-9932 / XSA-200
        - x86 CMPXCHG8B emulation fails to ignore operand size override
      * CVE-2016-9815, CVE-2016-9816, CVE-2016-9817, CVE-2016-9818 / XSA-201
        - ARM guests may induce host asynchronous abort
      * CVE-2016-10024 / XSA-202
        - x86 PV guests may be able to mask interrupts
      * CVE-2016-10025 / XSA-203
        - x86: missing NULL pointer check in VMFUNC emulation
      * CVE-2016-10013 / XSA-204
        - x86: Mishandling of SYSCALL singlestep during emulation
  * Copy contents of debian/build/install-utils_$(ARCH)/usr/sbin into
    debian/build/install-utils_$ARCH/usr/lib/xen-$(VERSION) (LP: #1396670).

be280a2... by Stefan Bader on 2017-03-14

Fix FTBS due to missing macro

Gbp-Pq: ubuntu-x86emul-fix-compile.patch.

144d361... by Stefan Bader on 2017-03-14

Fix FTBS on Arm platforms

Gbp-Pq: ubuntu-tools-fix-ftbs-arm.patch.

65d71e6... by Stefan Bader on 2017-03-14

Change abiname of new helper libs

Gbp-Pq: ubuntu-tools-libs-abiname.diff.

c1880c1... by Stefan Bader on 2017-03-14


Gbp-Pq: tools-xenstore-compatibility.diff.

3d1fa01... by Stefan Bader on 2017-03-14


Gbp-Pq: tools-xenmon-install.diff.

b001111... by Stefan Bader on 2017-03-14


Gbp-Pq: tools-include-install.diff.

d24f204... by Stefan Bader on 2017-03-14

Remove static solaris support from pygrub

Gbp-Pq: tools-pygrub-remove-static-solaris-support.

f9b7165... by Stefan Bader on 2017-03-14


Gbp-Pq: tools-xentrace-prefix.diff.

fb0df8b... by Stefan Bader on 2017-03-14


Gbp-Pq: tools-xenstore-prefix.diff.