[ubuntu/artful-proposed] xen 4.9.0-0ubuntu2 (Accepted)

Stefan Bader stefan.bader at canonical.com
Fri Aug 18 15:38:15 UTC 2017


xen (4.9.0-0ubuntu2) artful; urgency=medium

  * Add libxendevicemodel references to d/libxen-dev.install

xen (4.9.0-0ubuntu1) artful; urgency=medium

  * Update to upstream 4.9.0 release.
    Changes include numerous bugfixes, including security fixes for:
    XSA-213 / CVE-2017-8903
    XSA-214 / CVE-2017-8904
    XSA-217 / CVE-2017-10912
    XSA-218 / CVE-2017-10913, CVE-2017-10914
    XSA-219 / CVE-2017-10915
    XSA-220 / CVE-2017-10916
    XSA-221 / CVE-2017-10917
    XSA-222 / CVE-2017-10918
    XSA-223 / CVE-2017-10919
    XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
    XSA-225 / CVE-2017-10923
  * Additional CVE's:
    - XSA-226 / CVE-2017-12135
    - XSA-227 / CVE-2017-12137
    - XSA-228 / CVE-2017-12136
    - XSA-230 / CVE-2017-12855
  * Additional fixes:
    - debian/rules.real:
      - Add a call to build common tool headers
      - Add a call to install common tool headers
    - Add checking of return values of asprintf calls.
      - d/p/ubuntu/tools-xs-test-hardening.patch
    - Add additional modifications for new libxendevicemodel
      - d/p/ubuntu/tools-libs-abiname.diff
    - Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
      - d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
    - Enable Local MCE feature
      - d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
      - d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
      - d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
      - d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
      - d/p/.../0005-x86-mce-handle-host-LMCE.patch
      - d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
      - d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
      - d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
      - d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
      - d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
      - d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
      - d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
    - Re-introduce (fake) xs_restrict call to keep libxenstore version at
      3.0 for now.
      - d/p/ubuntu/tools-fake-xs-restrict.patch
    - debian/libxenstore3.0.symbols:
      - Added xs_control_command
    - xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
      - Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
        which should handle non English environments (LP: #1321144)

xen (4.8.1-1+deb9u1) unstable; urgency=medium

  * Security fixes for XSA-213 (Closes:#861659) and XSA-214
    (Closes:#861660).  (Xen 4.7 and later is not affected by XSA-215.)

xen (4.8.1-1) unstable; urgency=high

  * Update to upstream 4.8.1 release.
    Changes include numerous bugfixes, including security fixes for:
      XSA-212 / CVE-2017-7228   Closes:#859560
      XSA-207 / no cve yet      Closes:#856229
      XSA-206 / no cve yet      no Debian bug

xen (4.8.1~pre.2017.01.23-1) unstable; urgency=medium

  * Update to current upstream stable-4.8 git branch (Xen 4.8.1-pre).
    Contains bugfixes.
  * debian/control-real etc.: debian.py: Allow version numbers like this.

Date: Fri, 18 Aug 2017 17:22:20 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.9.0-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 18 Aug 2017 17:22:20 +0200
Source: xen
Binary: libxen-4.9 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.9 xen-hypervisor-4.9-amd64 xen-system-amd64 xen-hypervisor-4.9-arm64 xen-system-arm64 xen-hypervisor-4.9-armhf xen-system-armhf xen-hypervisor-4.6-amd64 xen-hypervisor-4.6-armhf xen-hypervisor-4.6-arm64 xen-hypervisor-4.7-amd64 xen-hypervisor-4.7-armhf xen-hypervisor-4.7-arm64 xen-hypervisor-4.8-amd64 xen-hypervisor-4.8-armhf xen-hypervisor-4.8-arm64
Architecture: source
Version: 4.9.0-0ubuntu2
Distribution: artful
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
 libxen-4.9 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.6-amd64 - Transitional package for upgrade
 xen-hypervisor-4.6-arm64 - Transitional package for upgrade
 xen-hypervisor-4.6-armhf - Transitional package for upgrade
 xen-hypervisor-4.7-amd64 - Transitional package for upgrade
 xen-hypervisor-4.7-arm64 - Transitional package for upgrade
 xen-hypervisor-4.7-armhf - Transitional package for upgrade
 xen-hypervisor-4.8-amd64 - Transitional package for upgrade
 xen-hypervisor-4.8-arm64 - Transitional package for upgrade
 xen-hypervisor-4.8-armhf - Transitional package for upgrade
 xen-hypervisor-4.9-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.9-arm64 - Xen Hypervisor on ARM64
 xen-hypervisor-4.9-armhf - Xen Hypervisor on ARMHF
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-arm64 - Xen System on ARM64 (meta-package)
 xen-system-armhf - Xen System on ARMHF (meta-package)
 xen-utils-4.9 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Closes: 856229 859560 861659 861660
Launchpad-Bugs-Fixed: 1321144
Changes:
 xen (4.9.0-0ubuntu2) artful; urgency=medium
 .
   * Add libxendevicemodel references to d/libxen-dev.install
 .
 xen (4.9.0-0ubuntu1) artful; urgency=medium
 .
   * Update to upstream 4.9.0 release.
     Changes include numerous bugfixes, including security fixes for:
     XSA-213 / CVE-2017-8903
     XSA-214 / CVE-2017-8904
     XSA-217 / CVE-2017-10912
     XSA-218 / CVE-2017-10913, CVE-2017-10914
     XSA-219 / CVE-2017-10915
     XSA-220 / CVE-2017-10916
     XSA-221 / CVE-2017-10917
     XSA-222 / CVE-2017-10918
     XSA-223 / CVE-2017-10919
     XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
     XSA-225 / CVE-2017-10923
   * Additional CVE's:
     - XSA-226 / CVE-2017-12135
     - XSA-227 / CVE-2017-12137
     - XSA-228 / CVE-2017-12136
     - XSA-230 / CVE-2017-12855
   * Additional fixes:
     - debian/rules.real:
       - Add a call to build common tool headers
       - Add a call to install common tool headers
     - Add checking of return values of asprintf calls.
       - d/p/ubuntu/tools-xs-test-hardening.patch
     - Add additional modifications for new libxendevicemodel
       - d/p/ubuntu/tools-libs-abiname.diff
     - Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
       - d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
     - Enable Local MCE feature
       - d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
       - d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
       - d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
       - d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
       - d/p/.../0005-x86-mce-handle-host-LMCE.patch
       - d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
       - d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
       - d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
       - d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
       - d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
       - d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
       - d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
     - Re-introduce (fake) xs_restrict call to keep libxenstore version at
       3.0 for now.
       - d/p/ubuntu/tools-fake-xs-restrict.patch
     - debian/libxenstore3.0.symbols:
       - Added xs_control_command
     - xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
       - Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
         which should handle non English environments (LP: #1321144)
 .
 xen (4.8.1-1+deb9u1) unstable; urgency=medium
 .
   * Security fixes for XSA-213 (Closes:#861659) and XSA-214
     (Closes:#861660).  (Xen 4.7 and later is not affected by XSA-215.)
 .
 xen (4.8.1-1) unstable; urgency=high
 .
   * Update to upstream 4.8.1 release.
     Changes include numerous bugfixes, including security fixes for:
       XSA-212 / CVE-2017-7228   Closes:#859560
       XSA-207 / no cve yet      Closes:#856229
       XSA-206 / no cve yet      no Debian bug
 .
 xen (4.8.1~pre.2017.01.23-1) unstable; urgency=medium
 .
   * Update to current upstream stable-4.8 git branch (Xen 4.8.1-pre).
     Contains bugfixes.
   * debian/control-real etc.: debian.py: Allow version numbers like this.
Checksums-Sha1:
 2784a632c42733c914052a075b1bee047295d2b9 3857 xen_4.9.0-0ubuntu2.dsc
 731f8e07e7ffc97e328c5799710119aff5ec9bd1 5774284 xen_4.9.0.orig.tar.gz
 cb247ceb910305088487fca7cf8f250473f8610a 85196 xen_4.9.0-0ubuntu2.debian.tar.xz
 065bfe7689c4c5fb7c7f5631f43631384dba2461 5396 xen_4.9.0-0ubuntu2_source.buildinfo
Checksums-Sha256:
 1f02070ee7e600300742309e6cb3cadb4aba42ada05f9e0741d73d08c1726a80 3857 xen_4.9.0-0ubuntu2.dsc
 b68bbca1a32fcb4280ebfbcb6b5b86a7de386c4e4451d301ea03fe340a6a23ba 5774284 xen_4.9.0.orig.tar.gz
 d84929c102f355d3baeed8abdf01dff443b90915f13d033306874a650db1bd3f 85196 xen_4.9.0-0ubuntu2.debian.tar.xz
 a747e5b895314aa02ba014c53963b48f4dcd457a18e89d914327bbf1ea8ec0e6 5396 xen_4.9.0-0ubuntu2_source.buildinfo
Files:
 df9e0bd679a37caf001259dadbb5a500 3857 kernel optional xen_4.9.0-0ubuntu2.dsc
 96a18a367b94c75080e80cb21785f9c2 5774284 kernel optional xen_4.9.0.orig.tar.gz
 1bbfdeeec506cfc2147967e46d024d9a 85196 kernel optional xen_4.9.0-0ubuntu2.debian.tar.xz
 7abc5de0aa4af7ea7a000be5e55adc6c 5396 kernel optional xen_4.9.0-0ubuntu2_source.buildinfo
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=B6Bi
-----END PGP SIGNATURE-----


More information about the Artful-changes mailing list