[ubuntu/groovy-proposed] xen 4.11.4+24-gddaaccbbab-1ubuntu1 (Accepted)
Gianfranco Costamagna
locutusofborg at debian.org
Mon Aug 24 15:30:18 UTC 2020
xen (4.11.4+24-gddaaccbbab-1ubuntu1) groovy; urgency=low
* Merge from Debian unstable. Remaining changes:
- Enforce python2 usage
- Build-depend on python2-dev.
- Build using python2.
- Build-depend on lmodern.
- Set python2 for xen-init-name and xen-init-list scripts
- Recommend qemu-system-x86-xen
- Force fcf-protection off when using -mindirect-branch
- Strip .note.gnu.property section for intermediate files
- Add transitional packages for upgrades
- Handle config file moving between packages
- Update: Building hypervisor with cf-protection enabled
xen (4.11.4+24-gddaaccbbab-1) unstable; urgency=medium
* Update to new upstream version 4.11.4+24-gddaaccbbab, which also contains
security fixes for the following issues:
- inverted code paths in x86 dirty VRAM tracking
XSA-319 CVE-2020-15563
- Special Register Buffer speculative side channel
XSA-320 CVE-2020-0543
N.B: To mitigate this issue, new cpu microcode is required. The changes
in Xen provide a workaround for affected hardware that is not receiving
a vendor microcode update. Please refer to the upstream XSA-320 Advisory
text for more details.
- insufficient cache write-back under VT-d
XSA-321 CVE-2020-15565
- Missing alignment check in VCPUOP_register_vcpu_info
XSA-327 CVE-2020-15564
- non-atomic modification of live EPT PTE
XSA-328 CVE-2020-15567
xen (4.11.4-1) unstable; urgency=medium
* Update to new upstream version 4.11.4, which also contains security fixes
for the following issues:
- arm: a CPU may speculate past the ERET instruction
XSA-312 (no CVE yet)
- multiple xenoprof issues
XSA-313 CVE-2020-11740 CVE-2020-11741
- Missing memory barriers in read-write unlock paths
XSA-314 CVE-2020-11739
- Bad error path in GNTTABOP_map_grant
XSA-316 CVE-2020-11743
- Bad continuation handling in GNTTABOP_copy
XSA-318 CVE-2020-11742
* xen-utils and xen-utils-common maint scripts: Replace the previous fix in
the xen init script with a better fix in the xen-utils package instead, to
prevent calling the init script stop action (resulting in a disappeared
xenconsoled) when removing a xen-utils package that belongs to a previous
(not currently runing) Xen version. Also prevent the xen-utils-common
package from inadvertently calling stop and start actions because
dh_installinit would add code for that. (Closes: #932759)
* debian/NEWS: Mention fixing #932759 and how to deal with the bug
Date: Mon, 24 Aug 2020 17:25:22 +0200
Changed-By: Gianfranco Costamagna <locutusofborg at debian.org>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.11.4+24-gddaaccbbab-1ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 24 Aug 2020 17:25:22 +0200
Source: xen
Binary: xenstore-utils xen-utils-common xen-hypervisor-common xen-doc xen-utils-4.11 xen-hypervisor-4.11-amd64 xen-system-amd64 xen-hypervisor-4.11-arm64 xen-system-arm64 xen-hypervisor-4.11-armhf xen-system-armhf libxen-dev libxenmisc4.11 libxencall1 libxendevicemodel1 libxenevtchn1 libxenforeignmemory1 libxengnttab1 libxenstore3.0 libxentoolcore1 libxentoollog1 xen-hypervisor-4.9-amd64 xen-hypervisor-4.9-armhf xen-hypervisor-4.9-arm64
Architecture: source
Version: 4.11.4+24-gddaaccbbab-1ubuntu1
Distribution: groovy
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Gianfranco Costamagna <locutusofborg at debian.org>
Description:
libxen-dev - Public headers and libs for Xen
libxencall1 - Xen runtime library - libxencall
libxendevicemodel1 - Xen runtime libraries - libxendevicemodel
libxenevtchn1 - Xen runtime libraries - libxenevtchn
libxenforeignmemory1 - Xen runtime libraries - libxenforeignmemory
libxengnttab1 - Xen runtime libraries - libxengnttab
libxenmisc4.11 - Xen runtime libraries - miscellaneous, versioned ABI
libxenstore3.0 - Xen runtime libraries - libxenstore
libxentoolcore1 - Xen runtime libraries - libxentoolcore
libxentoollog1 - Xen runtime libraries - libxentoollog
xen-doc - XEN documentation
xen-hypervisor-4.11-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.11-arm64 - Xen Hypervisor on ARM64
xen-hypervisor-4.11-armhf - Xen Hypervisor on ARMHF
xen-hypervisor-4.9-amd64 - Transitional package for upgrade
xen-hypervisor-4.9-arm64 - Transitional package for upgrade
xen-hypervisor-4.9-armhf - Transitional package for upgrade
xen-hypervisor-common - Xen Hypervisor - common files
xen-system-amd64 - Xen System on AMD64 (metapackage)
xen-system-arm64 - Xen System on ARM64 (metapackage)
xen-system-armhf - Xen System on ARMHF (metapackage)
xen-utils-4.11 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Closes: 932759
Changes:
xen (4.11.4+24-gddaaccbbab-1ubuntu1) groovy; urgency=low
.
* Merge from Debian unstable. Remaining changes:
- Enforce python2 usage
- Build-depend on python2-dev.
- Build using python2.
- Build-depend on lmodern.
- Set python2 for xen-init-name and xen-init-list scripts
- Recommend qemu-system-x86-xen
- Force fcf-protection off when using -mindirect-branch
- Strip .note.gnu.property section for intermediate files
- Add transitional packages for upgrades
- Handle config file moving between packages
- Update: Building hypervisor with cf-protection enabled
.
xen (4.11.4+24-gddaaccbbab-1) unstable; urgency=medium
.
* Update to new upstream version 4.11.4+24-gddaaccbbab, which also contains
security fixes for the following issues:
- inverted code paths in x86 dirty VRAM tracking
XSA-319 CVE-2020-15563
- Special Register Buffer speculative side channel
XSA-320 CVE-2020-0543
N.B: To mitigate this issue, new cpu microcode is required. The changes
in Xen provide a workaround for affected hardware that is not receiving
a vendor microcode update. Please refer to the upstream XSA-320 Advisory
text for more details.
- insufficient cache write-back under VT-d
XSA-321 CVE-2020-15565
- Missing alignment check in VCPUOP_register_vcpu_info
XSA-327 CVE-2020-15564
- non-atomic modification of live EPT PTE
XSA-328 CVE-2020-15567
.
xen (4.11.4-1) unstable; urgency=medium
.
* Update to new upstream version 4.11.4, which also contains security fixes
for the following issues:
- arm: a CPU may speculate past the ERET instruction
XSA-312 (no CVE yet)
- multiple xenoprof issues
XSA-313 CVE-2020-11740 CVE-2020-11741
- Missing memory barriers in read-write unlock paths
XSA-314 CVE-2020-11739
- Bad error path in GNTTABOP_map_grant
XSA-316 CVE-2020-11743
- Bad continuation handling in GNTTABOP_copy
XSA-318 CVE-2020-11742
* xen-utils and xen-utils-common maint scripts: Replace the previous fix in
the xen init script with a better fix in the xen-utils package instead, to
prevent calling the init script stop action (resulting in a disappeared
xenconsoled) when removing a xen-utils package that belongs to a previous
(not currently runing) Xen version. Also prevent the xen-utils-common
package from inadvertently calling stop and start actions because
dh_installinit would add code for that. (Closes: #932759)
* debian/NEWS: Mention fixing #932759 and how to deal with the bug
Checksums-Sha1:
9153e6308f76f560ab364ea3ea5b8715441803f8 4456 xen_4.11.4+24-gddaaccbbab-1ubuntu1.dsc
ad24abf183893b429b27cbb28f49a906b4d571ff 4248964 xen_4.11.4+24-gddaaccbbab.orig.tar.xz
2a871085c3772d9df54f6471b005652ce0f06478 148712 xen_4.11.4+24-gddaaccbbab-1ubuntu1.debian.tar.xz
3c8207cb23473bf2b8d4a5a85db430066a19b2d2 9602 xen_4.11.4+24-gddaaccbbab-1ubuntu1_source.buildinfo
Checksums-Sha256:
64f86f139e06e3a17ebf7b959e24c168b81ac06270228ecd94115279f6445653 4456 xen_4.11.4+24-gddaaccbbab-1ubuntu1.dsc
9341af7e6509b16c6f5c1e400974a1fb6ec6d6d23b28c278e84ea17b4d3e3611 4248964 xen_4.11.4+24-gddaaccbbab.orig.tar.xz
833f91844f3713856dcd5b7c78119fbad65c9818b92cecf3309f1c7d13f78131 148712 xen_4.11.4+24-gddaaccbbab-1ubuntu1.debian.tar.xz
b40605380ec0deb67e76b8edf17fab0df6ec5991d4e3a03ff9a5d2994ba8b002 9602 xen_4.11.4+24-gddaaccbbab-1ubuntu1_source.buildinfo
Files:
134422f8485a9dd2dd0fcb15fe2ed076 4456 admin optional xen_4.11.4+24-gddaaccbbab-1ubuntu1.dsc
443157dfcb63eeef0486e68f6f81ea48 4248964 admin optional xen_4.11.4+24-gddaaccbbab.orig.tar.xz
7a511a3705e1ae27487d37d2769c284a 148712 admin optional xen_4.11.4+24-gddaaccbbab-1ubuntu1.debian.tar.xz
b1036ee1c76546516783f54f0d99f003 9602 admin optional xen_4.11.4+24-gddaaccbbab-1ubuntu1_source.buildinfo
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----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=ZTHB
-----END PGP SIGNATURE-----
More information about the Groovy-changes
mailing list