[ubuntu/jammy-proposed] xen 4.16.0-1~ubuntu2 (Accepted)

Christian Ehrhardt christian.ehrhardt at canonical.com
Wed Feb 9 13:21:14 UTC 2022


xen (4.16.0-1~ubuntu2) jammy; urgency=medium

  * Merge Debian experimental/salsa, among many other changes this fixes
    booting kernels with zstd compression (LP: #1956166).
    Remaining changes:
    - Recommend qemu-system-x86-xen
  * Dropped changes:
    - Additional patches to handle compiling with gcc10 [in upstream]
    - Select python2 for xen-init-* scripts [Debian is on python3 now]
    - Enforce python2 usage [Debian is on python3 now]
      - Build-depend on python2-dev.
      - Build using python2.
      - Build-depend on lmodern.
    - Handle config file moving between packages [no more needed]
  * Note changes already dropped in 4.11.4+24-gddaaccbbab-1ubuntu2
    - Set python2 for xen-init-name and xen-init-list scripts
      [in Debian]
    - Force fcf-protection off when using -mindirect-branch
      [fixed upstream]
    - Update: Building hypervisor with cf-protection enabled
      [fixed upstream]
    - Strip .note.gnu.property section for intermediate files
      [no more needed with the groovy toolchain]
    - Add transitional packages for upgrades
      [no more needed post focal]

xen (4.16.0-1~exp1) experimental; urgency=medium

  Significant changes:
  * Update to new upstream version 4.16.0. This also includes a security fix
    for the following issue, which was not applicable to Xen 4.14 yet:
    - certain VT-d IOMMUs may not work in shared page table mode
      XSA-390 CVE-2021-28710
  * No longer build any package for the i386 architecture. It was already not
    possible to use x86_32 hardware because the i386 packages already
    shipped a 64-bit hypervisor and PV shim. Running 32-bit utils with a
    64-bit hypervisor requires using a compatibility layer that is fragile and
    becomes harder to maintain and test upstream. This change ends the 'grace
    period' in which users should have moved to using a fully 64-bit dom0.
    - debian/{control,rules,salsa-ci.yml,xen-utils-V.install.vsn-in}: make the
      necessary changes
    - Remove the Recommends on libc6-xen, which already actually does not
      exist any more. (Closes: #992909)
    - Drop patch "tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc on
      x86_32" because it is not relevant any more.

  Changes related to upgrading to Xen 4.16:
  * debian/control: adjust to 4.16  [Maximilian Engelhardt]
  * Drop patches that have been applied upstream
  * Refresh remaining patches if needed
  * debian: follow upstream removal of '.sh' suffix in xl bash_completion file
    [Maximilian Engelhardt]
  * debian/control, debian/libxenstore*: ship a libxenstore4 package instead
    of libxenstore3.0, since upstream bumped the soname
    [Maximilian Engelhardt]

  Packaging minor fixes and improvements  [Maximilian Engelhardt]:
  * debian/rules: set SOURCE_BASE_DIR to the top level build dir so that the
    "Display Debian package version in hypervisor log" patch can use it.
  * Add patch "xen/arch/x86: make objdump output user locale agnostic" to fix
    reproducable builds. This patch will also be sent upstream.
  * d/rules: remove reproducible=+fixfilepath from DEB_BUILD_MAINT_OPTIONS
  * d/salsa-ci.yml: Explicitly set RELEASE variable to unstable
  * d/salsa-ci.yml: disable cross building as it's currently not working
  * debian: call update-grub when installing/removing xen-hypervisor-common
    (Closes: #988901)
  * debian: fix dependency generation for python after dh-python was fixed
    first. (Closes: #976597) Note that this packaging change can be safely
    reverted when building a backports package for Debian Bullseye.
  * debian/rules: remove unused pybuild settings

  Packaging minor fixes and improvements:
  * Improve patches for building the PV shim separately. This enables to
    drop the extra Revert of an upstream commit that was done in
    4.14.0+80-gd101b417b7-1~exp1:
    - Drop patch: Revert "pvshim: make PV shim build selectable from
      configure"
    - Update patch "[...] Respect caller's CONFIG_PV_SHIM" to follow moving
      of a line to a different file
    - Drop patch: "tools/firmware/Makefile: CONFIG_PV_SHIM: enable only on
      x86_64" because that's now already the default upstream
  * debian/control.md5sum: remove this obsolete file
  * Merge patches "vif-common: disable handle_iptable" and
    "t/h/L/vif-common.sh: fix handle_iptable return value" into a single
    patch, since the latter was a fix for the first.
  * debian/control: change the Uploaders email address for Ian Jackson,
    since he does not work at Citrix any more now

xen (4.14.3+32-g9de3671772-1) unstable; urgency=medium

  * Update to new upstream version 4.14.3+32-g9de3671772, which also contains
    security fixes for the following issues:
    - guests may exceed their designated memory limit
      XSA-385 CVE-2021-28706
    - PCI devices with RMRRs not deassigned correctly
      XSA-386 CVE-2021-28702
    - PoD operations on misaligned GFNs
      XSA-388 CVE-2021-28704 CVE-2021-28707 CVE-2021-28708
    - issues with partially successful P2M updates on x86
      XSA-389 CVE-2021-28705 CVE-2021-28709
  * Note that the following XSA are not listed, because...
    - XSA-387 only applies to Xen 4.13 and older
    - XSA-390 only applies to Xen 4.15
  * Pick the following upstream commits to fix a regression which prevents
    amd64 type hardware to fully power off. The issue was introduced in
    version 4.14.0+88-g1d1d1f5391-1 after including upstream commits to
    improve Raspberry Pi 4 support. (Closes: #994899):
    - 8b6d55c126 ("x86/ACPI: fix mapping of FACS")
    - f390941a92 ("x86/DMI: fix table mapping when one lives above 1Mb")
    - 0f089bbf43 ("x86/ACPI: fix S3 wakeup vector mapping")
    - 16ca5b3f87 ("x86/ACPI: don't invalidate S5 data when S3 wakeup vector
                   cannot be determined")

xen (4.14.3-1) unstable; urgency=high

  * Update to new upstream version 4.14.3, which also contains security fixes
    for the following issues:
    - IOMMU page mapping issues on x86
      XSA-378 CVE-2021-28694 CVE-2021-28695 CVE-2021-28696
    - grant table v2 status pages may remain accessible after de-allocation
      XSA-379 CVE-2021-28697
    - long running loops in grant table handling
      XSA-380 CVE-2021-28698
    - inadequate grant-v2 status frames array bounds check
      XSA-382 CVE-2021-28699
    - xen/arm: No memory limit for dom0less domUs
      XSA-383 CVE-2021-28700
    - Another race in XENMAPSPACE_grant_table handling
      XSA-384 CVE-2021-28701

xen (4.14.2+25-gb6a8c4f72d-2) unstable; urgency=medium

  * Add README.Debian.security containing a note about the end of upstream
    security support for Xen 4.14. Install it into xen-hypervisor-common.

xen (4.14.2+25-gb6a8c4f72d-1) unstable; urgency=medium

  * Update to new upstream version 4.14.2+25-gb6a8c4f72d, which also contains
    security fixes for the following issues:
    - HVM soft-reset crashes toolstack
      XSA-368 CVE-2021-28687
    - xen/arm: Boot modules are not scrubbed
      XSA-372 CVE-2021-28693
    - inappropriate x86 IOMMU timeout detection / handling
      XSA-373 CVE-2021-28692
    - Speculative Code Store Bypass
      XSA-375 CVE-2021-0089 CVE-2021-26313
    - x86: TSX Async Abort protections not restored after S3
      XSA-377 CVE-2021-28690
  * Note that the following XSA are not listed, because...
    - XSA-370 does not contain code changes.
    - XSA-365, XSA-367, XSA-369, XSA-371 and XSA-374 have patches for the
      Linux kernel.
    - XSA-366 only applies to Xen 4.11.

xen (4.14.1+11-gb0b734a8b3-1) unstable; urgency=medium

  * Update to new upstream version 4.14.1+11-gb0b734a8b3, which also contains
    security fixes for the following issues:
    - IRQ vector leak on x86
      XSA-360 CVE-2021-3308  (Closes: #981052)
    - arm: The cache may not be cleaned for newly allocated scrubbed pages
      XSA-364 CVE-2021-26933
  * Drop separate patches for XSAs up to 359 that are now included in the
    upstream stable branch.

  Packaging bugfixes and improvements [Elliott Mitchell]:
  * debian/rules: Set CC/LD to enable cross-building
  * d/shuffle-binaries: Fix binary shuffling script for cross-building
  * Rework "debian/rules: Do not try to move EFI binaries on armhf"
  * debian/scripts: Optimize runtime scripts
  * debian/xen-utils-common.examples: Remove xm examples
  * d/shuffle-boot-files: make it POSIX compliant  [Hans van Kranenburg, based
    on a patch by Elliott Mitchell]
  * d/shuffle-binaries: Switch loop from for to while
  * d/shuffle-binaries: Switch to POSIX shell, instead of Bash
  * d/shuffle-boot-files: Switch to POSIX shell, instead of Bash
  * debian/xendomains.init: Pipe xen-init-list instead of tmp file

  Make the package build reproducibly [Maximilian Engelhardt]:
  * debian/salsa-ci.yml: enable salsa-ci
  * debian/salsa-ci.yml: enable diffoscope in reprotest
  * debian/rules: use SOURCE_DATE_EPOCH for xen build dates
  * debian/rules: don't include build path in binaries
  * debian/rules: reproducibly build oxenstored
  * Pick the following upstream commits:
    - 5816d327e4 ("xen: don't have timestamp inserted in config.gz")
    - ee41b5c450 ("x86/EFI: don't insert timestamp when SOURCE_DATE_EPOCH is
                   defined")
    - e18dadc5b7 ("docs: use predictable ordering in generated documentation")
  * Include upstream patch that is not committed yet, but needed:
    - docs: set date to SOURCE_DATE_EPOCH if available
  * debian/salsa-ci.yml: don't allow reprotest to fail

  Packaging bugfixes and improvements:
  * d/shuffle-boot-files: Document more inner workings

xen (4.14.0+88-g1d1d1f5391-2) unstable; urgency=high

  * For now, revert "debian/rules: Set CC/LD to enable cross-building", since
    it causes an FTBFS on i386.

xen (4.14.0+88-g1d1d1f5391-1) unstable; urgency=high

  * Update to new upstream version 4.14.0+88-g1d1d1f5391, which also contains
    security fixes for the following issues:
    - stack corruption from XSA-346 change
      XSA-355 CVE-2020-29040 (Closes: #976109)
  * Apply security fixes for the following issues:
    - oxenstored: permissions not checked on root node
      XSA-353 CVE-2020-29479
    - xenstore watch notifications lacking permission checks
      XSA-115 CVE-2020-29480
    - Xenstore: new domains inheriting existing node permissions
      XSA-322 CVE-2020-29481
    - Xenstore: wrong path length check
      XSA-323 CVE-2020-29482
    - Xenstore: guests can crash xenstored via watchs
      XSA-324 CVE-2020-29484
    - Xenstore: guests can disturb domain cleanup
      XSA-325 CVE-2020-29483
    - oxenstored memory leak in reset_watches
      XSA-330 CVE-2020-29485
    - oxenstored: node ownership can be changed by unprivileged clients
      XSA-352 CVE-2020-29486
    - undue recursion in x86 HVM context switch code
      XSA-348 CVE-2020-29566
    - infinite loop when cleaning up IRQ vectors
      XSA-356 CVE-2020-29567
    - FIFO event channels control block related ordering
      XSA-358 CVE-2020-29570
    - FIFO event channels control structure ordering
      XSA-359 CVE-2020-29571
  * Note that the following XSA are not listed, because...
    - XSA-349 and XSA-350 have patches for the Linux kernel
    - XSA-354 has patches for the XAPI toolstack

  Packaging bugfixes and improvements:
  * d/rules: do not compress /usr/share/doc/xen/html (Closes: #942611)
  * Add missing CVE numbers to the previous changelog entries

  Packaging bugfixes and improvements [Elliott Mitchell]:
  * d/shuffle-binaries: Make error detection/message overt
  * d/shuffle-binaries: Add quoting for potentially changeable variables
  * d/shuffle-boot-files: Add lots of double-quotes when handling variables
  * debian/rules: Set CC/LD to enable cross-building
  * debian/xen.init: Load xen_acpi_processor on boot
  * d/shuffle-binaries: Remove useless extra argument being passed in

  Packaging bugfixes and improvements [Maximilian Engelhardt]:
  * d/xen-hypervisor-V-F.postinst.vsn-in: use reboot-required
    (Closes: #862408)
  * d/xen-hypervisor-V-F.postrm: actually install script
  * d/xen-hypervisor-V.*: clean up unused files
  * d/xen-hypervisor-V.bug-control.vsn-in: actually install script
  * debian/rules: enable verbose build

  Fixes to patches for upstream code:
  * t/h/L/vif-common.sh: force handle_iptable return value to be 0
    (Closes: #955994)

  * Pick the following upstream commits to improve Raspberry Pi 4 support,
    requested by Elliott Mitchell:
    - 25849c8b16 ("xen/rpi4: implement watchdog-based reset")
    - 17d192e023 ("tools/python: Pass linker to Python build process")
    - 861f0c1109 ("xen/arm: acpi: Don't fail if SPCR table is absent")
    - 1c4aa69ca1 ("xen/acpi: Rework acpi_os_map_memory() and
                   acpi_os_unmap_memory()")
    - 4d625ff3c3 ("xen/arm: acpi: The fixmap area should always be cleared
                   during failure/unmap")
    - dac867bf9a ("xen/arm: Check if the platform is not using ACPI before
                   initializing Dom0less")
    - 9c2bc0f24b ("xen/arm: Introduce fw_unreserved_regions() and use it")
    - 7056f2f89f ("xen/arm: acpi: add BAD_MADT_GICC_ENTRY() macro")
    - 957708c2d1 ("xen/arm: traps: Don't panic when receiving an unknown debug
                   trap")

  * Pick upstream commit ba6e78f0db ("fix spelling errors"). Thanks, Diederik.

xen (4.14.0+80-gd101b417b7-1) unstable; urgency=medium

  * Re-upload to unstable for rebuild.

xen (4.14.0+80-gd101b417b7-1~exp2) experimental; urgency=medium

  * Re-upload since apparently DMs aren't allowed NEW?

xen (4.14.0+80-gd101b417b7-1~exp1) experimental; urgency=medium

  * Update to new upstream version 4.14.0+80-gd101b417b7, which also contains
    security fixes for the following issues:
    - Information leak via power sidechannel
      XSA-351 CVE-2020-28368
    - x86 PV guest INVLPG-like flushes may leave stale TLB entries
      XSA-286 CVE-2020-27674
    - unsafe AMD IOMMU page table updates
      XSA-347 CVE-2020-27670
    - undue deferral of IOMMU TLB flushes
      XSA-346 CVE-2020-27671
    - x86: Race condition in Xen mapping code
      XSA-345 CVE-2020-27672
    - lack of preemption in evtchn_reset() / evtchn_destroy()
      XSA-344 CVE-2020-25601
    - races with evtchn_reset()
      XSA-343 CVE-2020-25599
    - out of bounds event channels available to 32-bit x86 domains
      XSA-342 CVE-2020-25600
    - Missing memory barriers when accessing/allocating an event channel
      XSA-340 CVE-2020-25603
    - x86 pv guest kernel DoS via SYSENTER
      XSA-339 CVE-2020-25596
    - once valid event channels may not turn invalid
      XSA-338 CVE-2020-25597
    - PCI passthrough code reading back hardware registers
      XSA-337 CVE-2020-25595
    - race when migrating timers between x86 HVM vCPU-s
      XSA-336 CVE-2020-25604
    - Missing unlock in XENMEM_acquire_resource error path
      XSA-334 CVE-2020-25598
    - x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
      XSA-333 CVE-2020-25602
  * Updating to the most recent upstream stable-4.14 branch also fixes
    additional compiling issues with gcc 10 that we were running into. These
    were: upstream commit 5d45ecabe3c0 ("xen/arm64: force gcc 10+ to always
    inline generic atomics helpers") to fix a FTBFS at mem_access.c and
    upstream commit 0dfddb2116e3 ("tools/xenpmd: Fix gcc10 snprintf warning")
    to fix a FTBFS on armhf. (Closes: #970802)
  * Drop upstream commits d25cc3ec93eb ("libxl: workaround gcc 10.2
    maybe-uninitialized warning") and fff1b7f50e75 ("libxl: fix
    -Werror=stringop-truncation in libxl__prepare_sockaddr_un") from our patch
    pile because these gcc 10 related fixes are in the upstream stable branch
    now.
  * Partially revert "debian/rules: Combine shared Make args" since it caused
    a FTBFS on i386.
  * Revert upstream commit a516bddbd3 ("tools/firmware/Makefile:
    CONFIG_PV_SHIM: enable only on x86_64") and cherry-pick our previous
    commits 0b898ccc2 ("tools/firmware/Makfile: Respect caller's
    CONFIG_PV_SHIM") and a516bddbd3 ("tools/firmware/Makefile: CONFIG_PV_SHIM:
    enable only on x86_64") again to work around a FTBFS where the shim would
    not be built during the i386 package build.
  * Now all FTBFS issues should be resolved, so we can do (Closes: #968965)

  Packaging minor fixes and improvements:
  * d/xen-utils-common.xen.init: Actually *really* include the change to
    disable oom killer for xenstored. It inadvertently got lost in
    4.14.0-1~exp1. (Closes: #961511)

  Lintian related fixes:
  * debian/changelog: fix a typo in the previous changelog entry

xen (4.14.0-1~exp1) experimental; urgency=medium

  Significant changes:
  * Update to new upstream version 4.14.0.
    (Closes: #866380) about removal of broken xen-bugtool
  * debian/{rules,control}: switch to python 3
    (Closes: #938843) about python 2 removal in bullseye
  * debian/control: Fix python dependency to use python3-dev:any and
    libpython3-dev  [Elliott Mitchell]

  Changes related to upgrading to Xen 4.14:
  * debian/control: adjust to 4.14
  * debian/rules: remove install commands for pkgconfig files, since those
    files are not present any more
  * debian/: Follow fsimage -> xenfsimage renaming
  * debian/xen-utils-V.*: Use @version@ instead of hardcoded version
  * debian/control: add flex, bison
  * debian/control: add libxenhypfs[1]  [Ian Jackson]
  * debian/libxenstore3.0.symbols: drop xprintf
    (Closes: #968965)  [Ian Jackson; also reported by Gianfranco Costamagna]
  * d/scripts/xen-init-name, d/scripts/xen-init-list: rewrite these two
    scripts, hugely simplify them and make them use python 3
  * Pick upstream commits d25cc3ec93eb ("libxl: workaround gcc 10.2
    maybe-uninitialized warning") and fff1b7f50e75 ("libxl: fix
    -Werror=stringop-truncation in libxl__prepare_sockaddr_un") to fix gcc 10
    FTBFS
  * tools: don't build/ship xenmon, it can't work with python 3

  Packaging minor fixes and improvements:
  * debian/rules: Set DEB_BUILD_MAINT_OPTIONS in shell
    (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
  * debian/rules: Improve comment about hardening options
    (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
  * debian/rules: Drop redundant sequence numbers in dh_installinit
    (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
  * d/xen-utils-common.xen.init: add important notes to keep in mind when
    changing this script, related to multi-version handling
  * debian/control: cleanup Uploaders and add myself
  * debian/control: s/libncurses5-dev/libncurses-dev/
  * xen-utils-V scripts: remove update-alternatives command
  * xen-utils-V.postinst.vsn-in: whitespace cosmetics
  * d/xen-utils-common.xen.init: disable oom killer for xenstored
    (Closes: #961511)
  * debian/rules: Combine shared Make args  [Elliott Mitchell]

  Fixes and improvements for cross-compiling  [Elliott Mitchell]:
  * debian/rules: Add --host to tools configure target
  * Pick upstream commit 69953e285638 ('tools: Partially revert
    "Cross-compilation fixes."')

  Lintian related fixes:
  * debian/changelog: trim trailing whitespace.  [Debian Janitor]
  * debian/pycompat: remove obsolete file.  [Debian Janitor]
  * debian/rules: Avoid using $(PWD) variable.  [Debian Janitor]
  * debian/control: hardcode xen-utils-4.14 python3 dependency because
    dh_python can't figure out how to add it
  * debian/control: xen-doc: add ${misc:Depends}
  * d/xen-hypervisor-V-F.lintian-overrides.vsn-in: fix override to use the
    newer debug-suffix-not-dbg tag and correct the file path used so it
    matches again
  * debian/control: remove XS-Python-Version which is deprecated
  * debian/control: drop autotools-dev build dependency because debhelper
    already takes care of this
  * d/xen-utils-V.lintian-overrides.vsn-in: fix rpath override because the
    xenfsimage python .so filename changed from xenfsimage.so into
    xenfsimage.cpython-38-x86_64-linux-gnu.so now, make it match again
  * d/xen-utils-V.lintian-overrides.vsn-in: s/fsimage/xenfsimage/ which is a
    left over change from the rename in some comment lines
  * d/xen-utils-common.xen.init: use /run instead of /var/run because we don't
    expect anyone on a pre-stretch system to build and use these packages
  * debian/control: update Standards-Version to 4.5.0

xen (4.11.4+24-gddaaccbbab-1) unstable; urgency=medium

  * Update to new upstream version 4.11.4+24-gddaaccbbab, which also contains
    security fixes for the following issues:
    - inverted code paths in x86 dirty VRAM tracking
      XSA-319 CVE-2020-15563
    - Special Register Buffer speculative side channel
      XSA-320 CVE-2020-0543
      N.B: To mitigate this issue, new cpu microcode is required. The changes
      in Xen provide a workaround for affected hardware that is not receiving
      a vendor microcode update. Please refer to the upstream XSA-320 Advisory
      text for more details.
    - insufficient cache write-back under VT-d
      XSA-321 CVE-2020-15565
    - Missing alignment check in VCPUOP_register_vcpu_info
      XSA-327 CVE-2020-15564
    - non-atomic modification of live EPT PTE
      XSA-328 CVE-2020-15567

Date: Tue, 18 Jan 2022 11:00:29 +0100
Changed-By: Christian Ehrhardt <christian.ehrhardt at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.16.0-1~ubuntu2
-------------- next part --------------
Format: 1.8
Date: Tue, 18 Jan 2022 11:00:29 +0100
Source: xen
Architecture: source
Version: 4.16.0-1~ubuntu2
Distribution: jammy
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Christian Ehrhardt <christian.ehrhardt at canonical.com>
Closes: 862408 866380 938843 939560 942611 955994 961511 968965 970802 976109 976597 981052 988901 992909 994899
Launchpad-Bugs-Fixed: 1956166
Changes:
 xen (4.16.0-1~ubuntu2) jammy; urgency=medium
 .
   * Merge Debian experimental/salsa, among many other changes this fixes
     booting kernels with zstd compression (LP: #1956166).
     Remaining changes:
     - Recommend qemu-system-x86-xen
   * Dropped changes:
     - Additional patches to handle compiling with gcc10 [in upstream]
     - Select python2 for xen-init-* scripts [Debian is on python3 now]
     - Enforce python2 usage [Debian is on python3 now]
       - Build-depend on python2-dev.
       - Build using python2.
       - Build-depend on lmodern.
     - Handle config file moving between packages [no more needed]
   * Note changes already dropped in 4.11.4+24-gddaaccbbab-1ubuntu2
     - Set python2 for xen-init-name and xen-init-list scripts
       [in Debian]
     - Force fcf-protection off when using -mindirect-branch
       [fixed upstream]
     - Update: Building hypervisor with cf-protection enabled
       [fixed upstream]
     - Strip .note.gnu.property section for intermediate files
       [no more needed with the groovy toolchain]
     - Add transitional packages for upgrades
       [no more needed post focal]
 .
 xen (4.16.0-1~exp1) experimental; urgency=medium
 .
   Significant changes:
   * Update to new upstream version 4.16.0. This also includes a security fix
     for the following issue, which was not applicable to Xen 4.14 yet:
     - certain VT-d IOMMUs may not work in shared page table mode
       XSA-390 CVE-2021-28710
   * No longer build any package for the i386 architecture. It was already not
     possible to use x86_32 hardware because the i386 packages already
     shipped a 64-bit hypervisor and PV shim. Running 32-bit utils with a
     64-bit hypervisor requires using a compatibility layer that is fragile and
     becomes harder to maintain and test upstream. This change ends the 'grace
     period' in which users should have moved to using a fully 64-bit dom0.
     - debian/{control,rules,salsa-ci.yml,xen-utils-V.install.vsn-in}: make the
       necessary changes
     - Remove the Recommends on libc6-xen, which already actually does not
       exist any more. (Closes: #992909)
     - Drop patch "tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc on
       x86_32" because it is not relevant any more.
 .
   Changes related to upgrading to Xen 4.16:
   * debian/control: adjust to 4.16  [Maximilian Engelhardt]
   * Drop patches that have been applied upstream
   * Refresh remaining patches if needed
   * debian: follow upstream removal of '.sh' suffix in xl bash_completion file
     [Maximilian Engelhardt]
   * debian/control, debian/libxenstore*: ship a libxenstore4 package instead
     of libxenstore3.0, since upstream bumped the soname
     [Maximilian Engelhardt]
 .
   Packaging minor fixes and improvements  [Maximilian Engelhardt]:
   * debian/rules: set SOURCE_BASE_DIR to the top level build dir so that the
     "Display Debian package version in hypervisor log" patch can use it.
   * Add patch "xen/arch/x86: make objdump output user locale agnostic" to fix
     reproducable builds. This patch will also be sent upstream.
   * d/rules: remove reproducible=+fixfilepath from DEB_BUILD_MAINT_OPTIONS
   * d/salsa-ci.yml: Explicitly set RELEASE variable to unstable
   * d/salsa-ci.yml: disable cross building as it's currently not working
   * debian: call update-grub when installing/removing xen-hypervisor-common
     (Closes: #988901)
   * debian: fix dependency generation for python after dh-python was fixed
     first. (Closes: #976597) Note that this packaging change can be safely
     reverted when building a backports package for Debian Bullseye.
   * debian/rules: remove unused pybuild settings
 .
   Packaging minor fixes and improvements:
   * Improve patches for building the PV shim separately. This enables to
     drop the extra Revert of an upstream commit that was done in
     4.14.0+80-gd101b417b7-1~exp1:
     - Drop patch: Revert "pvshim: make PV shim build selectable from
       configure"
     - Update patch "[...] Respect caller's CONFIG_PV_SHIM" to follow moving
       of a line to a different file
     - Drop patch: "tools/firmware/Makefile: CONFIG_PV_SHIM: enable only on
       x86_64" because that's now already the default upstream
   * debian/control.md5sum: remove this obsolete file
   * Merge patches "vif-common: disable handle_iptable" and
     "t/h/L/vif-common.sh: fix handle_iptable return value" into a single
     patch, since the latter was a fix for the first.
   * debian/control: change the Uploaders email address for Ian Jackson,
     since he does not work at Citrix any more now
 .
 xen (4.14.3+32-g9de3671772-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.14.3+32-g9de3671772, which also contains
     security fixes for the following issues:
     - guests may exceed their designated memory limit
       XSA-385 CVE-2021-28706
     - PCI devices with RMRRs not deassigned correctly
       XSA-386 CVE-2021-28702
     - PoD operations on misaligned GFNs
       XSA-388 CVE-2021-28704 CVE-2021-28707 CVE-2021-28708
     - issues with partially successful P2M updates on x86
       XSA-389 CVE-2021-28705 CVE-2021-28709
   * Note that the following XSA are not listed, because...
     - XSA-387 only applies to Xen 4.13 and older
     - XSA-390 only applies to Xen 4.15
   * Pick the following upstream commits to fix a regression which prevents
     amd64 type hardware to fully power off. The issue was introduced in
     version 4.14.0+88-g1d1d1f5391-1 after including upstream commits to
     improve Raspberry Pi 4 support. (Closes: #994899):
     - 8b6d55c126 ("x86/ACPI: fix mapping of FACS")
     - f390941a92 ("x86/DMI: fix table mapping when one lives above 1Mb")
     - 0f089bbf43 ("x86/ACPI: fix S3 wakeup vector mapping")
     - 16ca5b3f87 ("x86/ACPI: don't invalidate S5 data when S3 wakeup vector
                    cannot be determined")
 .
 xen (4.14.3-1) unstable; urgency=high
 .
   * Update to new upstream version 4.14.3, which also contains security fixes
     for the following issues:
     - IOMMU page mapping issues on x86
       XSA-378 CVE-2021-28694 CVE-2021-28695 CVE-2021-28696
     - grant table v2 status pages may remain accessible after de-allocation
       XSA-379 CVE-2021-28697
     - long running loops in grant table handling
       XSA-380 CVE-2021-28698
     - inadequate grant-v2 status frames array bounds check
       XSA-382 CVE-2021-28699
     - xen/arm: No memory limit for dom0less domUs
       XSA-383 CVE-2021-28700
     - Another race in XENMAPSPACE_grant_table handling
       XSA-384 CVE-2021-28701
 .
 xen (4.14.2+25-gb6a8c4f72d-2) unstable; urgency=medium
 .
   * Add README.Debian.security containing a note about the end of upstream
     security support for Xen 4.14. Install it into xen-hypervisor-common.
 .
 xen (4.14.2+25-gb6a8c4f72d-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.14.2+25-gb6a8c4f72d, which also contains
     security fixes for the following issues:
     - HVM soft-reset crashes toolstack
       XSA-368 CVE-2021-28687
     - xen/arm: Boot modules are not scrubbed
       XSA-372 CVE-2021-28693
     - inappropriate x86 IOMMU timeout detection / handling
       XSA-373 CVE-2021-28692
     - Speculative Code Store Bypass
       XSA-375 CVE-2021-0089 CVE-2021-26313
     - x86: TSX Async Abort protections not restored after S3
       XSA-377 CVE-2021-28690
   * Note that the following XSA are not listed, because...
     - XSA-370 does not contain code changes.
     - XSA-365, XSA-367, XSA-369, XSA-371 and XSA-374 have patches for the
       Linux kernel.
     - XSA-366 only applies to Xen 4.11.
 .
 xen (4.14.1+11-gb0b734a8b3-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.14.1+11-gb0b734a8b3, which also contains
     security fixes for the following issues:
     - IRQ vector leak on x86
       XSA-360 CVE-2021-3308  (Closes: #981052)
     - arm: The cache may not be cleaned for newly allocated scrubbed pages
       XSA-364 CVE-2021-26933
   * Drop separate patches for XSAs up to 359 that are now included in the
     upstream stable branch.
 .
   Packaging bugfixes and improvements [Elliott Mitchell]:
   * debian/rules: Set CC/LD to enable cross-building
   * d/shuffle-binaries: Fix binary shuffling script for cross-building
   * Rework "debian/rules: Do not try to move EFI binaries on armhf"
   * debian/scripts: Optimize runtime scripts
   * debian/xen-utils-common.examples: Remove xm examples
   * d/shuffle-boot-files: make it POSIX compliant  [Hans van Kranenburg, based
     on a patch by Elliott Mitchell]
   * d/shuffle-binaries: Switch loop from for to while
   * d/shuffle-binaries: Switch to POSIX shell, instead of Bash
   * d/shuffle-boot-files: Switch to POSIX shell, instead of Bash
   * debian/xendomains.init: Pipe xen-init-list instead of tmp file
 .
   Make the package build reproducibly [Maximilian Engelhardt]:
   * debian/salsa-ci.yml: enable salsa-ci
   * debian/salsa-ci.yml: enable diffoscope in reprotest
   * debian/rules: use SOURCE_DATE_EPOCH for xen build dates
   * debian/rules: don't include build path in binaries
   * debian/rules: reproducibly build oxenstored
   * Pick the following upstream commits:
     - 5816d327e4 ("xen: don't have timestamp inserted in config.gz")
     - ee41b5c450 ("x86/EFI: don't insert timestamp when SOURCE_DATE_EPOCH is
                    defined")
     - e18dadc5b7 ("docs: use predictable ordering in generated documentation")
   * Include upstream patch that is not committed yet, but needed:
     - docs: set date to SOURCE_DATE_EPOCH if available
   * debian/salsa-ci.yml: don't allow reprotest to fail
 .
   Packaging bugfixes and improvements:
   * d/shuffle-boot-files: Document more inner workings
 .
 xen (4.14.0+88-g1d1d1f5391-2) unstable; urgency=high
 .
   * For now, revert "debian/rules: Set CC/LD to enable cross-building", since
     it causes an FTBFS on i386.
 .
 xen (4.14.0+88-g1d1d1f5391-1) unstable; urgency=high
 .
   * Update to new upstream version 4.14.0+88-g1d1d1f5391, which also contains
     security fixes for the following issues:
     - stack corruption from XSA-346 change
       XSA-355 CVE-2020-29040 (Closes: #976109)
   * Apply security fixes for the following issues:
     - oxenstored: permissions not checked on root node
       XSA-353 CVE-2020-29479
     - xenstore watch notifications lacking permission checks
       XSA-115 CVE-2020-29480
     - Xenstore: new domains inheriting existing node permissions
       XSA-322 CVE-2020-29481
     - Xenstore: wrong path length check
       XSA-323 CVE-2020-29482
     - Xenstore: guests can crash xenstored via watchs
       XSA-324 CVE-2020-29484
     - Xenstore: guests can disturb domain cleanup
       XSA-325 CVE-2020-29483
     - oxenstored memory leak in reset_watches
       XSA-330 CVE-2020-29485
     - oxenstored: node ownership can be changed by unprivileged clients
       XSA-352 CVE-2020-29486
     - undue recursion in x86 HVM context switch code
       XSA-348 CVE-2020-29566
     - infinite loop when cleaning up IRQ vectors
       XSA-356 CVE-2020-29567
     - FIFO event channels control block related ordering
       XSA-358 CVE-2020-29570
     - FIFO event channels control structure ordering
       XSA-359 CVE-2020-29571
   * Note that the following XSA are not listed, because...
     - XSA-349 and XSA-350 have patches for the Linux kernel
     - XSA-354 has patches for the XAPI toolstack
 .
   Packaging bugfixes and improvements:
   * d/rules: do not compress /usr/share/doc/xen/html (Closes: #942611)
   * Add missing CVE numbers to the previous changelog entries
 .
   Packaging bugfixes and improvements [Elliott Mitchell]:
   * d/shuffle-binaries: Make error detection/message overt
   * d/shuffle-binaries: Add quoting for potentially changeable variables
   * d/shuffle-boot-files: Add lots of double-quotes when handling variables
   * debian/rules: Set CC/LD to enable cross-building
   * debian/xen.init: Load xen_acpi_processor on boot
   * d/shuffle-binaries: Remove useless extra argument being passed in
 .
   Packaging bugfixes and improvements [Maximilian Engelhardt]:
   * d/xen-hypervisor-V-F.postinst.vsn-in: use reboot-required
     (Closes: #862408)
   * d/xen-hypervisor-V-F.postrm: actually install script
   * d/xen-hypervisor-V.*: clean up unused files
   * d/xen-hypervisor-V.bug-control.vsn-in: actually install script
   * debian/rules: enable verbose build
 .
   Fixes to patches for upstream code:
   * t/h/L/vif-common.sh: force handle_iptable return value to be 0
     (Closes: #955994)
 .
   * Pick the following upstream commits to improve Raspberry Pi 4 support,
     requested by Elliott Mitchell:
     - 25849c8b16 ("xen/rpi4: implement watchdog-based reset")
     - 17d192e023 ("tools/python: Pass linker to Python build process")
     - 861f0c1109 ("xen/arm: acpi: Don't fail if SPCR table is absent")
     - 1c4aa69ca1 ("xen/acpi: Rework acpi_os_map_memory() and
                    acpi_os_unmap_memory()")
     - 4d625ff3c3 ("xen/arm: acpi: The fixmap area should always be cleared
                    during failure/unmap")
     - dac867bf9a ("xen/arm: Check if the platform is not using ACPI before
                    initializing Dom0less")
     - 9c2bc0f24b ("xen/arm: Introduce fw_unreserved_regions() and use it")
     - 7056f2f89f ("xen/arm: acpi: add BAD_MADT_GICC_ENTRY() macro")
     - 957708c2d1 ("xen/arm: traps: Don't panic when receiving an unknown debug
                    trap")
 .
   * Pick upstream commit ba6e78f0db ("fix spelling errors"). Thanks, Diederik.
 .
 xen (4.14.0+80-gd101b417b7-1) unstable; urgency=medium
 .
   * Re-upload to unstable for rebuild.
 .
 xen (4.14.0+80-gd101b417b7-1~exp2) experimental; urgency=medium
 .
   * Re-upload since apparently DMs aren't allowed NEW?
 .
 xen (4.14.0+80-gd101b417b7-1~exp1) experimental; urgency=medium
 .
   * Update to new upstream version 4.14.0+80-gd101b417b7, which also contains
     security fixes for the following issues:
     - Information leak via power sidechannel
       XSA-351 CVE-2020-28368
     - x86 PV guest INVLPG-like flushes may leave stale TLB entries
       XSA-286 CVE-2020-27674
     - unsafe AMD IOMMU page table updates
       XSA-347 CVE-2020-27670
     - undue deferral of IOMMU TLB flushes
       XSA-346 CVE-2020-27671
     - x86: Race condition in Xen mapping code
       XSA-345 CVE-2020-27672
     - lack of preemption in evtchn_reset() / evtchn_destroy()
       XSA-344 CVE-2020-25601
     - races with evtchn_reset()
       XSA-343 CVE-2020-25599
     - out of bounds event channels available to 32-bit x86 domains
       XSA-342 CVE-2020-25600
     - Missing memory barriers when accessing/allocating an event channel
       XSA-340 CVE-2020-25603
     - x86 pv guest kernel DoS via SYSENTER
       XSA-339 CVE-2020-25596
     - once valid event channels may not turn invalid
       XSA-338 CVE-2020-25597
     - PCI passthrough code reading back hardware registers
       XSA-337 CVE-2020-25595
     - race when migrating timers between x86 HVM vCPU-s
       XSA-336 CVE-2020-25604
     - Missing unlock in XENMEM_acquire_resource error path
       XSA-334 CVE-2020-25598
     - x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
       XSA-333 CVE-2020-25602
   * Updating to the most recent upstream stable-4.14 branch also fixes
     additional compiling issues with gcc 10 that we were running into. These
     were: upstream commit 5d45ecabe3c0 ("xen/arm64: force gcc 10+ to always
     inline generic atomics helpers") to fix a FTBFS at mem_access.c and
     upstream commit 0dfddb2116e3 ("tools/xenpmd: Fix gcc10 snprintf warning")
     to fix a FTBFS on armhf. (Closes: #970802)
   * Drop upstream commits d25cc3ec93eb ("libxl: workaround gcc 10.2
     maybe-uninitialized warning") and fff1b7f50e75 ("libxl: fix
     -Werror=stringop-truncation in libxl__prepare_sockaddr_un") from our patch
     pile because these gcc 10 related fixes are in the upstream stable branch
     now.
   * Partially revert "debian/rules: Combine shared Make args" since it caused
     a FTBFS on i386.
   * Revert upstream commit a516bddbd3 ("tools/firmware/Makefile:
     CONFIG_PV_SHIM: enable only on x86_64") and cherry-pick our previous
     commits 0b898ccc2 ("tools/firmware/Makfile: Respect caller's
     CONFIG_PV_SHIM") and a516bddbd3 ("tools/firmware/Makefile: CONFIG_PV_SHIM:
     enable only on x86_64") again to work around a FTBFS where the shim would
     not be built during the i386 package build.
   * Now all FTBFS issues should be resolved, so we can do (Closes: #968965)
 .
   Packaging minor fixes and improvements:
   * d/xen-utils-common.xen.init: Actually *really* include the change to
     disable oom killer for xenstored. It inadvertently got lost in
     4.14.0-1~exp1. (Closes: #961511)
 .
   Lintian related fixes:
   * debian/changelog: fix a typo in the previous changelog entry
 .
 xen (4.14.0-1~exp1) experimental; urgency=medium
 .
   Significant changes:
   * Update to new upstream version 4.14.0.
     (Closes: #866380) about removal of broken xen-bugtool
   * debian/{rules,control}: switch to python 3
     (Closes: #938843) about python 2 removal in bullseye
   * debian/control: Fix python dependency to use python3-dev:any and
     libpython3-dev  [Elliott Mitchell]
 .
   Changes related to upgrading to Xen 4.14:
   * debian/control: adjust to 4.14
   * debian/rules: remove install commands for pkgconfig files, since those
     files are not present any more
   * debian/: Follow fsimage -> xenfsimage renaming
   * debian/xen-utils-V.*: Use @version@ instead of hardcoded version
   * debian/control: add flex, bison
   * debian/control: add libxenhypfs[1]  [Ian Jackson]
   * debian/libxenstore3.0.symbols: drop xprintf
     (Closes: #968965)  [Ian Jackson; also reported by Gianfranco Costamagna]
   * d/scripts/xen-init-name, d/scripts/xen-init-list: rewrite these two
     scripts, hugely simplify them and make them use python 3
   * Pick upstream commits d25cc3ec93eb ("libxl: workaround gcc 10.2
     maybe-uninitialized warning") and fff1b7f50e75 ("libxl: fix
     -Werror=stringop-truncation in libxl__prepare_sockaddr_un") to fix gcc 10
     FTBFS
   * tools: don't build/ship xenmon, it can't work with python 3
 .
   Packaging minor fixes and improvements:
   * debian/rules: Set DEB_BUILD_MAINT_OPTIONS in shell
     (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
   * debian/rules: Improve comment about hardening options
     (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
   * debian/rules: Drop redundant sequence numbers in dh_installinit
     (Closes: #939560)  [Ian Jackson; report from Guillem Jover]
   * d/xen-utils-common.xen.init: add important notes to keep in mind when
     changing this script, related to multi-version handling
   * debian/control: cleanup Uploaders and add myself
   * debian/control: s/libncurses5-dev/libncurses-dev/
   * xen-utils-V scripts: remove update-alternatives command
   * xen-utils-V.postinst.vsn-in: whitespace cosmetics
   * d/xen-utils-common.xen.init: disable oom killer for xenstored
     (Closes: #961511)
   * debian/rules: Combine shared Make args  [Elliott Mitchell]
 .
   Fixes and improvements for cross-compiling  [Elliott Mitchell]:
   * debian/rules: Add --host to tools configure target
   * Pick upstream commit 69953e285638 ('tools: Partially revert
     "Cross-compilation fixes."')
 .
   Lintian related fixes:
   * debian/changelog: trim trailing whitespace.  [Debian Janitor]
   * debian/pycompat: remove obsolete file.  [Debian Janitor]
   * debian/rules: Avoid using $(PWD) variable.  [Debian Janitor]
   * debian/control: hardcode xen-utils-4.14 python3 dependency because
     dh_python can't figure out how to add it
   * debian/control: xen-doc: add ${misc:Depends}
   * d/xen-hypervisor-V-F.lintian-overrides.vsn-in: fix override to use the
     newer debug-suffix-not-dbg tag and correct the file path used so it
     matches again
   * debian/control: remove XS-Python-Version which is deprecated
   * debian/control: drop autotools-dev build dependency because debhelper
     already takes care of this
   * d/xen-utils-V.lintian-overrides.vsn-in: fix rpath override because the
     xenfsimage python .so filename changed from xenfsimage.so into
     xenfsimage.cpython-38-x86_64-linux-gnu.so now, make it match again
   * d/xen-utils-V.lintian-overrides.vsn-in: s/fsimage/xenfsimage/ which is a
     left over change from the rename in some comment lines
   * d/xen-utils-common.xen.init: use /run instead of /var/run because we don't
     expect anyone on a pre-stretch system to build and use these packages
   * debian/control: update Standards-Version to 4.5.0
 .
 xen (4.11.4+24-gddaaccbbab-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.11.4+24-gddaaccbbab, which also contains
     security fixes for the following issues:
     - inverted code paths in x86 dirty VRAM tracking
       XSA-319 CVE-2020-15563
     - Special Register Buffer speculative side channel
       XSA-320 CVE-2020-0543
       N.B: To mitigate this issue, new cpu microcode is required. The changes
       in Xen provide a workaround for affected hardware that is not receiving
       a vendor microcode update. Please refer to the upstream XSA-320 Advisory
       text for more details.
     - insufficient cache write-back under VT-d
       XSA-321 CVE-2020-15565
     - Missing alignment check in VCPUOP_register_vcpu_info
       XSA-327 CVE-2020-15564
     - non-atomic modification of live EPT PTE
       XSA-328 CVE-2020-15567
Checksums-Sha1:
 777772426b1e3445e1e4b2faacdf9d67aba03203 4033 xen_4.16.0-1~ubuntu2.dsc
 390665ca4f658b15788e8c93eead4dae74bf7ee6 5284299 xen_4.16.0.orig.tar.bz2
 e66768a73f769dc94396d9b45d391b6d7cb51cf0 142000 xen_4.16.0-1~ubuntu2.debian.tar.xz
 312e197cce1bc3ec028445ccdd238700207fefa6 9094 xen_4.16.0-1~ubuntu2_source.buildinfo
Checksums-Sha256:
 68d77547ecd62c0e7abe497110e85e92f1010a6dafbe8740c5966f2edb9f406b 4033 xen_4.16.0-1~ubuntu2.dsc
 d65162a095bcd59e0bf3c8f6f3276d5158af0404d1d17201007b65f5f66cd59d 5284299 xen_4.16.0.orig.tar.bz2
 85d45a76941d52d792411765e590a3d72630834f95238c149d27778e40cdec3a 142000 xen_4.16.0-1~ubuntu2.debian.tar.xz
 92842868b574bb4862779b1d366fbb81d73b9bc4d89ac8f06b332a0bf3ae3ef3 9094 xen_4.16.0-1~ubuntu2_source.buildinfo
Files:
 7a7b57b65744867f6e7b11fc4bfbbaf1 4033 admin optional xen_4.16.0-1~ubuntu2.dsc
 6f0096fa72af81f0fb9cb7f6a3f654d7 5284299 admin optional xen_4.16.0.orig.tar.bz2
 0bee6b13f3a44076286152812f2651e2 142000 admin optional xen_4.16.0-1~ubuntu2.debian.tar.xz
 ef057c45e96c0d8e27afc81cc5a233fb 9094 admin optional xen_4.16.0-1~ubuntu2_source.buildinfo
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>


More information about the jammy-changes mailing list