Merge version 4.11.4+57-g41a822c392-1+rpi1 and 4.11.4+57-g41a822c392-2 to produce... archive/raspbian/4.11.4+57-g41a822c392-2+rpi1 raspbian/4.11.4+57-g41a822c392-2+rpi1
authorRaspbian automatic forward porter <root@raspbian.org>
Fri, 18 Dec 2020 04:56:59 +0000 (04:56 +0000)
committerRaspbian automatic forward porter <root@raspbian.org>
Fri, 18 Dec 2020 04:56:59 +0000 (04:56 +0000)
1  2 
debian/changelog
debian/patches/series

index a025b2dd951ea727ce4ec3d87aa2e119d2a260ae,321fe63783c07cc00980fa6685ff4ac0d0550d53..4d433bbe3e53aa872a33c67512b51f75657481df
@@@ -1,15 -1,34 +1,47 @@@
- xen (4.11.4+57-g41a822c392-1+rpi1) buster-staging; urgency=medium
++xen (4.11.4+57-g41a822c392-2+rpi1) buster-staging; urgency=medium
 +
 +  [changes brought forward from 4.4.1-9+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Sun, 30 Aug 2015 15:43:16 +0000]
 +  * replace "dmb" with "mcr p15, #0, r0, c7, c10, #5" for armv6
 +  
 +  [changes introduced in 4.6.0-1+rpi1 by Peter Michael Green]
 +  * Use kernel 3.18 for now as I haven't dealt with 4.x yet.
 +
 +  [changes introduced in 4.11.1+26-g87f51bf366-3+rpi1 by Peter Michael Green]
 +  * Do not fail on files that are not installed.
 +
-  -- Raspbian forward porter <root@raspbian.org>  Wed, 09 Dec 2020 23:42:56 +0000
++ -- Raspbian forward porter <root@raspbian.org>  Fri, 18 Dec 2020 04:56:58 +0000
++
+ xen (4.11.4+57-g41a822c392-2) buster-security; urgency=high
+   * Apply security fixes for the following issues:
+     - oxenstored: permissions not checked on root node
+       XSA-353 (CVE-2020-29479)
+     - xenstore watch notifications lacking permission checks
+       XSA-115 (CVE-2020-29480)
+     - Xenstore: new domains inheriting existing node permissions
+       XSA-322 (CVE-2020-29481)
+     - Xenstore: wrong path length check
+       XSA-323 (CVE-2020-29482)
+     - Xenstore: guests can crash xenstored via watchs
+       XSA-324 (CVE-2020-29484)
+     - Xenstore: guests can disturb domain cleanup
+       XSA-325 (CVE-2020-29483)
+     - oxenstored memory leak in reset_watches
+       XSA-330 (CVE-2020-29485)
+     - oxenstored: node ownership can be changed by unprivileged clients
+       XSA-352 (CVE-2020-29486)
+     - undue recursion in x86 HVM context switch code
+       XSA-348 (CVE-2020-29566)
+     - FIFO event channels control block related ordering
+       XSA-358 (CVE-2020-29570)
+     - FIFO event channels control structure ordering
+       XSA-359 (CVE-2020-29571)
+   * Note that the following XSA are not listed, because...
+     - XSA-349 and XSA-350 have patches for the Linux kernel
+     - XSA-354 has patches for the XAPI toolstack
+     - XSA-356 only applies to Xen 4.14
+  -- Hans van Kranenburg <hans@knorrie.org>  Fri, 11 Dec 2020 22:10:09 +0100
  
  xen (4.11.4+57-g41a822c392-1) buster-security; urgency=high
  
index 07113c359ed0d4331286d34afb983127114ac264,69b12b13afb0f234d4df544631ca86c0389fa545..5266e76eb5554adf83f3900dd990b7180efcb0ce
@@@ -47,4 -47,30 +47,31 @@@ prefix-abiname/tools-libfsimage-prefix.
  0047-pygrub-Set-sys.path.patch
  0048-pygrub-Specify-rpath-LIBEXEC_LIB-when-building-fsima.patch
  0049-tools-xl-bash-completion-also-complete-xen.patch
+ 0050-tools-ocaml-xenstored-do-permission-checks-on-xensto.patch
+ 0051-tools-xenstore-allow-removing-child-of-a-node-exceed.patch
+ 0052-tools-xenstore-ignore-transaction-id-for-un-watch.patch
+ 0053-tools-xenstore-fix-node-accounting-after-failed-node.patch
+ 0054-tools-xenstore-simplify-and-rename-check_event_node.patch
+ 0055-tools-xenstore-check-privilege-for-XS_IS_DOMAIN_INTR.patch
+ 0056-tools-xenstore-rework-node-removal.patch
+ 0057-tools-xenstore-fire-watches-only-when-removing-a-spe.patch
+ 0058-tools-xenstore-introduce-node_perms-structure.patch
+ 0059-tools-xenstore-allow-special-watches-for-privileged-.patch
+ 0060-tools-xenstore-avoid-watch-events-for-nodes-without-.patch
+ 0061-tools-ocaml-xenstored-ignore-transaction-id-for-un-w.patch
+ 0062-tools-ocaml-xenstored-check-privilege-for-XS_IS_DOMA.patch
+ 0063-tools-ocaml-xenstored-unify-watch-firing.patch
+ 0064-tools-ocaml-xenstored-introduce-permissions-for-spec.patch
+ 0065-tools-ocaml-xenstored-avoid-watch-events-for-nodes-w.patch
+ 0066-tools-ocaml-xenstored-add-xenstored.conf-flag-to-tur.patch
+ 0067-tools-xenstore-revoke-access-rights-for-removed-doma.patch
+ 0068-tools-ocaml-xenstored-clean-up-permissions-for-dead-.patch
+ 0069-tools-ocaml-xenstored-Fix-path-length-validation.patch
+ 0070-tools-xenstore-drop-watch-event-messages-exceeding-m.patch
+ 0071-tools-xenstore-Preserve-bad-client-until-they-are-de.patch
+ 0072-tools-ocaml-xenstored-delete-watch-from-trie-too-whe.patch
+ 0073-tools-ocaml-xenstored-only-Dom0-can-change-node-owne.patch
+ 0074-x86-avoid-calling-svm-vmx-_do_resume.patch
+ 0075-evtchn-FIFO-re-order-and-synchronize-with-map_contro.patch
+ 0076-evtchn-FIFO-add-2nd-smp_rmb-to-evtchn_fifo_word_from.patch
 +armv6.diff