Revert "pvshim: make PV shim build selectable from configure"
This reverts commit
8845155c831c59e867ee3dd31ee63e0cc6c7dcf2.
This upstream change changes stuff that breaks our very fragile mess
that builds the shim when it needs to, and doesn't when it should not.
The result is that it's missing in the end for the i386 build... :|
dh_install: warning: Cannot find (any matches for)
"usr/lib/debug/usr/lib/xen-*/boot/*" (tried in ., debian/tmp)
dh_install: warning: xen-utils-4.14 missing files:
usr/lib/debug/usr/lib/xen-*/boot/*
dh_install: error: missing files, aborting
Gbp-Pq: Name 0012-Revert-pvshim-make-PV-shim-build-selectable-from-con.patch
xen (4.14.5+
86-g1c354767d5-1) bullseye-security; urgency=medium
* Update to new upstream version 4.14.5+
86-g1c354767d5, which also contains
security fixes for the following issues: (Closes: #
1021668)
- Xenstore: guests can let run xenstored out of memory
XSA-326 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314
CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318
- insufficient TLB flush for x86 PV guests in shadow mode
XSA-408 CVE-2022-33745
- Arm: unbounded memory consumption for 2nd-level page tables
XSA-409 CVE-2022-33747
- P2M pool freeing may take excessively long
XSA-410 CVE-2022-33746
- lock order inversion in transitive grant copy handling
XSA-411 CVE-2022-33748
- Xenstore: Guests can crash xenstored
XSA-414 CVE-2022-42309
- Xenstore: Guests can create orphaned Xenstore nodes
XSA-415 CVE-2022-42310
- Xenstore: Guests can cause Xenstore to not free temporary memory
XSA-416 CVE-2022-42319
- Xenstore: Guests can get access to Xenstore nodes of deleted domains
XSA-417 CVE-2022-42320
- Xenstore: Guests can crash xenstored via exhausting the stack
XSA-418 CVE-2022-42321
- Xenstore: Cooperating guests can create arbitrary numbers of nodes
XSA-419 CVE-2022-42322 CVE-2022-42323
- Oxenstored 32->31 bit integer truncation issues
XSA-420 CVE-2022-42324
- Xenstore: Guests can create arbitrary number of nodes via transactions
XSA-421 CVE-2022-42325 CVE-2022-42326
* The upstream Xen changes now also contain the first mentioned patch of
XSA-403 ("Linux disk/nic frontends data leaks") for stable branch lines.
For more information, please refer to the XSA-403 advisory text.
* Note that the following XSA are not listed, because...
- XSA-412 only applies to Xen 4.16 and newer
- XSA-413 applies to XAPI which is not included in Debian
* Correct a typo in the previous changelog entry.
[dgit import unpatched xen 4.14.5+
86-g1c354767d5-1]
Import xen_4.14.5+
86-g1c354767d5.orig.tar.xz
[dgit import orig xen_4.14.5+
86-g1c354767d5.orig.tar.xz]
Import xen_4.14.5+
86-g1c354767d5-1.debian.tar.xz
[dgit import tarball xen 4.14.5+
86-g1c354767d5-1 xen_4.14.5+
86-g1c354767d5-1.debian.tar.xz]