Commits

Peter Korsgaard committed 78ec7c6592e
xen: security bump to version 4.7.3 The 4.7.3 release brings a number of bugfixes and improvements: https://www.xenproject.org/downloads/xen-archives/xen-project-47-series/xen-473.html Including fixes for the following security issues: XSA-211: Cirrus VGA Heap overflow via display refresh (CVE-2016-9603) XSA-212: x86: broken check in memory_exchange() permits PV guest breakout (CVE-2017-7228) XSA-213: x86: 64bit PV guest breakout via pagetable use-after-mode-change (CVE-2017-8903) XSA-214: grant transfer allows PV guest to elevate privileges (CVE-2017-8904) XSA-215: possible memory corruption via failsafe callback (CVE-2017-8905) XSA-216: blkif responses leak backend stack data (CVE-2017-10911) XSA-217: page transfer may allow PV guest to elevate privilege (CVE-2017-10912) XSA-218: Races in the grant table unmap code (CVE-2017-10913 CVE-2017-10914) XSA-219: x86: insufficient reference counts during shadow emulation (CVE-2017-10915) XSA-220: x86: PKRU and BND* leakage between vCPU-s (CVE-2017-10916) XSA-221: NULL pointer deref in event channel poll (CVE-2017-10917) XSA-222: stale P2M mappings due to insufficient error checking (CVE-2017-10918) XSA-223: ARM guest disabling interrupt may crash Xen (CVE-2017-10919) XSA-224: grant table operations mishandle reference counts (CVE-2017-10920 CVE-2017-10921 CVE-2017-10922) XSA-225: arm: vgic: Out-of-bound access when sending SGIs (CVE-2017-10923) Also change download location as bits.xensource.com seems to be down. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>