[ubuntu/artful-proposed] xen 4.9.0-0ubuntu2 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Fri Aug 18 15:38:15 UTC 2017
xen (4.9.0-0ubuntu2) artful; urgency=medium
* Add libxendevicemodel references to d/libxen-dev.install
xen (4.9.0-0ubuntu1) artful; urgency=medium
* Update to upstream 4.9.0 release.
Changes include numerous bugfixes, including security fixes for:
XSA-213 / CVE-2017-8903
XSA-214 / CVE-2017-8904
XSA-217 / CVE-2017-10912
XSA-218 / CVE-2017-10913, CVE-2017-10914
XSA-219 / CVE-2017-10915
XSA-220 / CVE-2017-10916
XSA-221 / CVE-2017-10917
XSA-222 / CVE-2017-10918
XSA-223 / CVE-2017-10919
XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
XSA-225 / CVE-2017-10923
* Additional CVE's:
- XSA-226 / CVE-2017-12135
- XSA-227 / CVE-2017-12137
- XSA-228 / CVE-2017-12136
- XSA-230 / CVE-2017-12855
* Additional fixes:
- debian/rules.real:
- Add a call to build common tool headers
- Add a call to install common tool headers
- Add checking of return values of asprintf calls.
- d/p/ubuntu/tools-xs-test-hardening.patch
- Add additional modifications for new libxendevicemodel
- d/p/ubuntu/tools-libs-abiname.diff
- Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
- d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
- Enable Local MCE feature
- d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
- d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
- d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
- d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
- d/p/.../0005-x86-mce-handle-host-LMCE.patch
- d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
- d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
- d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
- d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
- d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
- d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
- d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
- Re-introduce (fake) xs_restrict call to keep libxenstore version at
3.0 for now.
- d/p/ubuntu/tools-fake-xs-restrict.patch
- debian/libxenstore3.0.symbols:
- Added xs_control_command
- xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
- Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
which should handle non English environments (LP: #1321144)
xen (4.8.1-1+deb9u1) unstable; urgency=medium
* Security fixes for XSA-213 (Closes:#861659) and XSA-214
(Closes:#861660). (Xen 4.7 and later is not affected by XSA-215.)
xen (4.8.1-1) unstable; urgency=high
* Update to upstream 4.8.1 release.
Changes include numerous bugfixes, including security fixes for:
XSA-212 / CVE-2017-7228 Closes:#859560
XSA-207 / no cve yet Closes:#856229
XSA-206 / no cve yet no Debian bug
xen (4.8.1~pre.2017.01.23-1) unstable; urgency=medium
* Update to current upstream stable-4.8 git branch (Xen 4.8.1-pre).
Contains bugfixes.
* debian/control-real etc.: debian.py: Allow version numbers like this.
Date: Fri, 18 Aug 2017 17:22:20 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.9.0-0ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 18 Aug 2017 17:22:20 +0200
Source: xen
Binary: libxen-4.9 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.9 xen-hypervisor-4.9-amd64 xen-system-amd64 xen-hypervisor-4.9-arm64 xen-system-arm64 xen-hypervisor-4.9-armhf xen-system-armhf xen-hypervisor-4.6-amd64 xen-hypervisor-4.6-armhf xen-hypervisor-4.6-arm64 xen-hypervisor-4.7-amd64 xen-hypervisor-4.7-armhf xen-hypervisor-4.7-arm64 xen-hypervisor-4.8-amd64 xen-hypervisor-4.8-armhf xen-hypervisor-4.8-arm64
Architecture: source
Version: 4.9.0-0ubuntu2
Distribution: artful
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.9 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxenstore3.0 - Xenstore communications library for Xen
xen-hypervisor-4.6-amd64 - Transitional package for upgrade
xen-hypervisor-4.6-arm64 - Transitional package for upgrade
xen-hypervisor-4.6-armhf - Transitional package for upgrade
xen-hypervisor-4.7-amd64 - Transitional package for upgrade
xen-hypervisor-4.7-arm64 - Transitional package for upgrade
xen-hypervisor-4.7-armhf - Transitional package for upgrade
xen-hypervisor-4.8-amd64 - Transitional package for upgrade
xen-hypervisor-4.8-arm64 - Transitional package for upgrade
xen-hypervisor-4.8-armhf - Transitional package for upgrade
xen-hypervisor-4.9-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.9-arm64 - Xen Hypervisor on ARM64
xen-hypervisor-4.9-armhf - Xen Hypervisor on ARMHF
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-arm64 - Xen System on ARM64 (meta-package)
xen-system-armhf - Xen System on ARMHF (meta-package)
xen-utils-4.9 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Closes: 856229 859560 861659 861660
Launchpad-Bugs-Fixed: 1321144
Changes:
xen (4.9.0-0ubuntu2) artful; urgency=medium
.
* Add libxendevicemodel references to d/libxen-dev.install
.
xen (4.9.0-0ubuntu1) artful; urgency=medium
.
* Update to upstream 4.9.0 release.
Changes include numerous bugfixes, including security fixes for:
XSA-213 / CVE-2017-8903
XSA-214 / CVE-2017-8904
XSA-217 / CVE-2017-10912
XSA-218 / CVE-2017-10913, CVE-2017-10914
XSA-219 / CVE-2017-10915
XSA-220 / CVE-2017-10916
XSA-221 / CVE-2017-10917
XSA-222 / CVE-2017-10918
XSA-223 / CVE-2017-10919
XSA-224 / CVE-2017-10920, CVE-2017-10921, CVE-2017-10922
XSA-225 / CVE-2017-10923
* Additional CVE's:
- XSA-226 / CVE-2017-12135
- XSA-227 / CVE-2017-12137
- XSA-228 / CVE-2017-12136
- XSA-230 / CVE-2017-12855
* Additional fixes:
- debian/rules.real:
- Add a call to build common tool headers
- Add a call to install common tool headers
- Add checking of return values of asprintf calls.
- d/p/ubuntu/tools-xs-test-hardening.patch
- Add additional modifications for new libxendevicemodel
- d/p/ubuntu/tools-libs-abiname.diff
- Fix a segmentation fault when mmio_hole is set in hvm.cfg (from 4.9.y)
- d/p/upstream-4.9.1-tools-libxl-Fix-a-segment-fault-when-mmio_hole...
- Enable Local MCE feature
- d/p/.../0001-x86-mce-make-mce-barriers-private-to-their-users.patch
- d/p/.../0002-x86-mce-make-found_error-and-mce_fatal_cpus-private-.patch
- d/p/.../0003-x86-mce-fix-comment-of-struct-mc_telem_cpu_ctl.patch
- d/p/.../0004-x86-mce-allow-mce_barrier_-enter-exit-to-return-with.patch
- d/p/.../0005-x86-mce-handle-host-LMCE.patch
- d/p/.../0006-x86-mce_intel-detect-and-enable-LMCE-on-Intel-host.patch
- d/p/.../0007-x86-domctl-generalize-the-restore-of-vMCE-parameters.patch
- d/p/.../0008-x86-vmce-emulate-MSR_IA32_MCG_EXT_CTL.patch
- d/p/.../0009-x86-vmce-enable-injecting-LMCE-to-guest-on-Intel-hos.patch
- d/p/.../0010-x86-vmx-expose-LMCE-feature-via-guest-MSR_IA32_FEATU.patch
- d/p/.../0011-x86-vmce-tools-libxl-expose-LMCE-capability-in-guest.patch
- d/p/.../0012-x86-mce-add-support-of-vLMCE-injection-to-XEN_MC_inj.patch
- Re-introduce (fake) xs_restrict call to keep libxenstore version at
3.0 for now.
- d/p/ubuntu/tools-fake-xs-restrict.patch
- debian/libxenstore3.0.symbols:
- Added xs_control_command
- xen-4.9.0/debian/xen-hypervisor-4.9.xen.cfg:
- Modified GRUB_DEFAULT setting to be dynamic (like update-grub does)
which should handle non English environments (LP: #1321144)
.
xen (4.8.1-1+deb9u1) unstable; urgency=medium
.
* Security fixes for XSA-213 (Closes:#861659) and XSA-214
(Closes:#861660). (Xen 4.7 and later is not affected by XSA-215.)
.
xen (4.8.1-1) unstable; urgency=high
.
* Update to upstream 4.8.1 release.
Changes include numerous bugfixes, including security fixes for:
XSA-212 / CVE-2017-7228 Closes:#859560
XSA-207 / no cve yet Closes:#856229
XSA-206 / no cve yet no Debian bug
.
xen (4.8.1~pre.2017.01.23-1) unstable; urgency=medium
.
* Update to current upstream stable-4.8 git branch (Xen 4.8.1-pre).
Contains bugfixes.
* debian/control-real etc.: debian.py: Allow version numbers like this.
Checksums-Sha1:
2784a632c42733c914052a075b1bee047295d2b9 3857 xen_4.9.0-0ubuntu2.dsc
731f8e07e7ffc97e328c5799710119aff5ec9bd1 5774284 xen_4.9.0.orig.tar.gz
cb247ceb910305088487fca7cf8f250473f8610a 85196 xen_4.9.0-0ubuntu2.debian.tar.xz
065bfe7689c4c5fb7c7f5631f43631384dba2461 5396 xen_4.9.0-0ubuntu2_source.buildinfo
Checksums-Sha256:
1f02070ee7e600300742309e6cb3cadb4aba42ada05f9e0741d73d08c1726a80 3857 xen_4.9.0-0ubuntu2.dsc
b68bbca1a32fcb4280ebfbcb6b5b86a7de386c4e4451d301ea03fe340a6a23ba 5774284 xen_4.9.0.orig.tar.gz
d84929c102f355d3baeed8abdf01dff443b90915f13d033306874a650db1bd3f 85196 xen_4.9.0-0ubuntu2.debian.tar.xz
a747e5b895314aa02ba014c53963b48f4dcd457a18e89d914327bbf1ea8ec0e6 5396 xen_4.9.0-0ubuntu2_source.buildinfo
Files:
df9e0bd679a37caf001259dadbb5a500 3857 kernel optional xen_4.9.0-0ubuntu2.dsc
96a18a367b94c75080e80cb21785f9c2 5774284 kernel optional xen_4.9.0.orig.tar.gz
1bbfdeeec506cfc2147967e46d024d9a 85196 kernel optional xen_4.9.0-0ubuntu2.debian.tar.xz
7abc5de0aa4af7ea7a000be5e55adc6c 5396 kernel optional xen_4.9.0-0ubuntu2_source.buildinfo
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=B6Bi
-----END PGP SIGNATURE-----
More information about the Artful-changes
mailing list