Control: tags -1 + fixed-upstream confirmed

Hi 

On Fri, Feb 07, 2025 at 09:03:25PM +0000, Andrew Kanaber wrote:
> Package: linux-source-6.1
> Version: 6.1.124-1
> Severity: critical
> Justification: breaks the whole system
> Tags: patch
> 
> Hi,
> 
> It turns out the upstream changes made to fix XSA-466 / CVE-2024-53241
> "x86/xen: remove hypercall page" [1] and
> "x86/xen: use new hypercall functions instead of hypercall page" [2]
> can leave an Xen PVH domU unbootable. These went into Debian in
> linux-image-6.1.0-29-amd64 (6.1.123-1) and upstream Linux in 6.1.121,
> and also into other kernel series, and mainline.
> 
> Juergen Gross has already very helpfully diagnosed this problem and
> fixed it with a patch that's been accepted in mainline
> "x86/xen: fix xen_hypercall_hvm() to not clobber %rbx" [3]
> 
> This bug report is to request this patch be incorporated into the Debian
> stable kernel.

Thanks for the report. Debian is following the 6.1.y stable series, so
once the patch has been submitted and accepted for stable into 6.1.y
we will pick it up automatically and incorporate it in the respective
upload.

Regards,
Salvtore

Reply via email to