[ubuntu/artful-proposed] xen 4.9.0-0ubuntu1 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Thu Aug 17 14:52:14 UTC 2017
xen (4.9.0-0ubuntu1) artful; urgency=medium
* Update to upstream 4.9.0 release.
Changes include numerous bugfixes, including security fixes for:
XSA-213 / CVE-2017-8903
XSA-214 / CVE-2017-8904
XSA-217 / CVE-2017-10912
XSA-218 / CVE-2017-10913, CVE-2017-10914
XSA-219 / CVE-2017-10915
XSA-220 / CVE-2017-10916
XSA-221 / CVE-2017-10917
XSA-222 / CVE-2017-10918
XSA-223 / CVE-2017-10919
XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
XSA-225 / CVE-2017-10923
* Additional CVE's:
- XSA-226 / CVE-2017-12135
- XSA-227 / CVE-2017-12137
- XSA-228 / CVE-2017-12136
- XSA-230 / CVE-2017-12855
* Additional fixes:
- debian/rules.real:
- Add a call to build common tool headers
- Add a call to install common tool headers
- Add checking of return values of asprintf calls.
- d/p/ubuntu/tools-xs-test-hardening.patch
- Add additional modifications for new libxendevicemodel
- d/p/ubuntu/tools-libs-abiname.diff
- Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
- d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
- Enable Local MCE feature
- d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
- d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
- d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
- d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
- d/p/.../0005-x86-mce-handle-host-LMCE.patch
- d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
- d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
- d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
- d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
- d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
- d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
- d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
- Re-introduce (fake) xs_restrict call to keep libxenstore version at
3.0 for now.
- d/p/ubuntu/tools-fake-xs-restrict.patch
- debian/libxenstore3.0.symbols:
- Added xs_control_command
- xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
- Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
which should handle non English environments (LP: #1321144)
Date: Thu, 17 Aug 2017 11:37:11 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.9.0-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 17 Aug 2017 11:37:11 +0200
Source: xen
Binary: libxen-4.9 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.9 xen-hypervisor-4.9-amd64 xen-system-amd64 xen-hypervisor-4.9-arm64 xen-system-arm64 xen-hypervisor-4.9-armhf xen-system-armhf xen-hypervisor-4.6-amd64 xen-hypervisor-4.6-armhf xen-hypervisor-4.6-arm64 xen-hypervisor-4.7-amd64 xen-hypervisor-4.7-armhf xen-hypervisor-4.7-arm64 xen-hypervisor-4.8-amd64 xen-hypervisor-4.8-armhf xen-hypervisor-4.8-arm64
Architecture: source
Version: 4.9.0-0ubuntu1
Distribution: artful
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.9 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxenstore3.0 - Xenstore communications library for Xen
xen-hypervisor-4.6-amd64 - Transitional package for upgrade
xen-hypervisor-4.6-arm64 - Transitional package for upgrade
xen-hypervisor-4.6-armhf - Transitional package for upgrade
xen-hypervisor-4.7-amd64 - Transitional package for upgrade
xen-hypervisor-4.7-arm64 - Transitional package for upgrade
xen-hypervisor-4.7-armhf - Transitional package for upgrade
xen-hypervisor-4.8-amd64 - Transitional package for upgrade
xen-hypervisor-4.8-arm64 - Transitional package for upgrade
xen-hypervisor-4.8-armhf - Transitional package for upgrade
xen-hypervisor-4.9-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.9-arm64 - Xen Hypervisor on ARM64
xen-hypervisor-4.9-armhf - Xen Hypervisor on ARMHF
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-arm64 - Xen System on ARM64 (meta-package)
xen-system-armhf - Xen System on ARMHF (meta-package)
xen-utils-4.9 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Launchpad-Bugs-Fixed: 1321144
Changes:
xen (4.9.0-0ubuntu1) artful; urgency=medium
.
* Update to upstream 4.9.0 release.
Changes include numerous bugfixes, including security fixes for:
XSA-213 / CVE-2017-8903
XSA-214 / CVE-2017-8904
XSA-217 / CVE-2017-10912
XSA-218 / CVE-2017-10913, CVE-2017-10914
XSA-219 / CVE-2017-10915
XSA-220 / CVE-2017-10916
XSA-221 / CVE-2017-10917
XSA-222 / CVE-2017-10918
XSA-223 / CVE-2017-10919
XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
XSA-225 / CVE-2017-10923
* Additional CVE's:
- XSA-226 / CVE-2017-12135
- XSA-227 / CVE-2017-12137
- XSA-228 / CVE-2017-12136
- XSA-230 / CVE-2017-12855
* Additional fixes:
- debian/rules.real:
- Add a call to build common tool headers
- Add a call to install common tool headers
- Add checking of return values of asprintf calls.
- d/p/ubuntu/tools-xs-test-hardening.patch
- Add additional modifications for new libxendevicemodel
- d/p/ubuntu/tools-libs-abiname.diff
- Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
- d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
- Enable Local MCE feature
- d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
- d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
- d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
- d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
- d/p/.../0005-x86-mce-handle-host-LMCE.patch
- d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
- d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
- d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
- d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
- d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
- d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
- d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
- Re-introduce (fake) xs_restrict call to keep libxenstore version at
3.0 for now.
- d/p/ubuntu/tools-fake-xs-restrict.patch
- debian/libxenstore3.0.symbols:
- Added xs_control_command
- xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
- Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
which should handle non English environments (LP: #1321144)
Checksums-Sha1:
f8eb0a77f4274cbef89055d0112200de041d443c 3857 xen_4.9.0-0ubuntu1.dsc
731f8e07e7ffc97e328c5799710119aff5ec9bd1 5774284 xen_4.9.0.orig.tar.gz
f607227c11dec6fad989a2da9413a65130d19408 85164 xen_4.9.0-0ubuntu1.debian.tar.xz
663e64db043c683faf826508fc6bd254e2c216b2 5396 xen_4.9.0-0ubuntu1_source.buildinfo
Checksums-Sha256:
ec581ef2af718cbc08bd014be723033780f5cefcd75f21c3fd567da5438dc8a3 3857 xen_4.9.0-0ubuntu1.dsc
b68bbca1a32fcb4280ebfbcb6b5b86a7de386c4e4451d301ea03fe340a6a23ba 5774284 xen_4.9.0.orig.tar.gz
b2694a4ace6949f3e597bfd4213498b397331cdff765406a6bcfd6c3e0d830fe 85164 xen_4.9.0-0ubuntu1.debian.tar.xz
d9d2f32b860a7bc7ff782b9c83a5d8538100979eb36e6018866c55e2261bc879 5396 xen_4.9.0-0ubuntu1_source.buildinfo
Files:
e1589043dc592c8d0014563a9dab9705 3857 kernel optional xen_4.9.0-0ubuntu1.dsc
96a18a367b94c75080e80cb21785f9c2 5774284 kernel optional xen_4.9.0.orig.tar.gz
3628a82d138e710fd073cc1aecc3c592 85164 kernel optional xen_4.9.0-0ubuntu1.debian.tar.xz
83c0b63646deba26c78f5c90d426c98f 5396 kernel optional xen_4.9.0-0ubuntu1_source.buildinfo
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=GgOg
-----END PGP SIGNATURE-----
More information about the Artful-changes
mailing list