* Applying Xen Security Advisories: - ACPI: acpi_table_parse() should return handler's error code CVE-2013-0153 / XSA-36 - oxenstored incorrect handling of certain Xenbus ring states CVE-2013-0215 / XSA-38 * xen-introduce-xzalloc.patch Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36 * xen-backport-per-device-vector-map.patch Cherry-picked from upstream xen stable-4.1 as prerequisite for XSA-36 Also fixes issues on AMD systems which could cause Dom0 to loose disks under heavy I/O (because PCI-E devices could use the same IOAPIC vector as the SMBus).