[ubuntu/xenial-proposed] xen 4.6.0-1ubuntu3 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Thu Feb 18 17:22:25 UTC 2016
xen (4.6.0-1ubuntu3) xenial; urgency=low
* Fix unmount error message on shutdown and init script ordering issues:
- d/xen-utils-common.xenstored.init: Introduce new init script which only
starts xenstored (but also shuts it down on stop). Prevent this one to
be run on upgrade.
- d/xen-utils-common.xen.init:
* Add X-Start-Before/X-Stop-After dependencies on libvirt-bin
* Remove xenstored related code
* d/scripts/xen-init-list: Revert back to unmodified version from Debian.
With the ordering fixed, libvirt guests should be handled by its own
script before xendomains is run.
* d/control, d/libxen-dev.install and d/rules.real:
Add xenlight.pc and xlutil.pc to be packaged as part of libxen-dev in
multi-arch suitable location. Also declare libxen-dev as multi-arch
same.
* Additional Security Patches:
- CVE-2016-2270 / XSA-154
* x86: enforce consistent cachability of MMIO mappings
- CVE-2016-1570 / XSA-167
* x86/mm: PV superpage handling lacks sanity checks
- CVE-2016-1571 / XSA-168
* x86/VMX: prevent INVVPID failure due to non-canonical guest address
- CVE-2015-8615 / XSA-169
* x86: make debug output consistent in hvm_set_callback_via
- CVE-2016-2271 / XSA-170
* x86/VMX: sanitize rIP before re-entering guest
Date: Thu, 18 Feb 2016 18:20:38 +0100
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.6.0-1ubuntu3
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 18 Feb 2016 18:20:38 +0100
Source: xen
Binary: libxen-4.6 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.6 xen-hypervisor-4.6-amd64 xen-system-amd64 xen-hypervisor-4.6-arm64 xen-system-arm64 xen-hypervisor-4.6-armhf xen-system-armhf xen-hypervisor-4.4-amd64 xen-hypervisor-4.4-armhf xen-hypervisor-4.4-arm64 xen-hypervisor-4.5-amd64 xen-hypervisor-4.5-armhf xen-hypervisor-4.5-arm64
Architecture: source
Version: 4.6.0-1ubuntu3
Distribution: xenial
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.6 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxenstore3.0 - Xenstore communications library for Xen
xen-hypervisor-4.4-amd64 - Transitional package for upgrade
xen-hypervisor-4.4-arm64 - Transitional package for upgrade
xen-hypervisor-4.4-armhf - Transitional package for upgrade
xen-hypervisor-4.5-amd64 - Transitional package for upgrade
xen-hypervisor-4.5-arm64 - Transitional package for upgrade
xen-hypervisor-4.5-armhf - Transitional package for upgrade
xen-hypervisor-4.6-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.6-arm64 - Xen Hypervisor on ARM64
xen-hypervisor-4.6-armhf - Xen Hypervisor on ARMHF
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-arm64 - Xen System on ARM64 (meta-package)
xen-system-armhf - Xen System on ARMHF (meta-package)
xen-utils-4.6 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Changes:
xen (4.6.0-1ubuntu3) xenial; urgency=low
.
* Fix unmount error message on shutdown and init script ordering issues:
- d/xen-utils-common.xenstored.init: Introduce new init script which only
starts xenstored (but also shuts it down on stop). Prevent this one to
be run on upgrade.
- d/xen-utils-common.xen.init:
* Add X-Start-Before/X-Stop-After dependencies on libvirt-bin
* Remove xenstored related code
* d/scripts/xen-init-list: Revert back to unmodified version from Debian.
With the ordering fixed, libvirt guests should be handled by its own
script before xendomains is run.
* d/control, d/libxen-dev.install and d/rules.real:
Add xenlight.pc and xlutil.pc to be packaged as part of libxen-dev in
multi-arch suitable location. Also declare libxen-dev as multi-arch
same.
* Additional Security Patches:
- CVE-2016-2270 / XSA-154
* x86: enforce consistent cachability of MMIO mappings
- CVE-2016-1570 / XSA-167
* x86/mm: PV superpage handling lacks sanity checks
- CVE-2016-1571 / XSA-168
* x86/VMX: prevent INVVPID failure due to non-canonical guest address
- CVE-2015-8615 / XSA-169
* x86: make debug output consistent in hvm_set_callback_via
- CVE-2016-2271 / XSA-170
* x86/VMX: sanitize rIP before re-entering guest
Checksums-Sha1:
9be71fb2e0b29eabf7ab7a15784c7790e6e147da 3584 xen_4.6.0-1ubuntu3.dsc
0ccbb09eca9c36146c31c28ef163b04cb3f870d2 80324 xen_4.6.0-1ubuntu3.debian.tar.xz
Checksums-Sha256:
3ea88069d9b240931614f4c9fadad121f7a4a3deeb5659cfdc4cc206a2c25b74 3584 xen_4.6.0-1ubuntu3.dsc
e5bfb909c78168db13e250fb661df817e28741975a6a774342e4c44b8391a53e 80324 xen_4.6.0-1ubuntu3.debian.tar.xz
Files:
8ade648a9e996a6ded3e6c12237fbf06 3584 kernel optional xen_4.6.0-1ubuntu3.dsc
7c20ccf4bdfe1a768f2ec6967973ff77 80324 kernel optional xen_4.6.0-1ubuntu3.debian.tar.xz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJWxf2oAAoJEOhnXe7L7s6jHcYP/2CSxwHbghvoNw2bREi8kpHB
M31bblwlWIgbmEerdYR/ETB5rkk3pyd6J3p14XAhLIQym3RlZPNrlw3CH5EfYWjq
aQjT3Q/8sRCZz7Nd74ENFynO5u3S9pNyc3M+/yp7YzWR0ku4iRwdtOG/QfhdsNOd
HwzqnWw57qKleEsiO7lYoR+MGMHEWJ6efJ2nXU3gx5zUFN4+6A9DyRdUb0hcEaMl
iBxOVPm2cUImx2O4QhJuoEBFBf6wgdGrQARkyDlb0t2S8XGA//+S/GW00J57m+se
rRHqrMJXk4p7uOz6oENpS+2bGG5QXvoZ/MWVUxmLGH2KoUp6av0Kb1GpjDCaKtCb
wNuQKMLhWOAGR9FvTyeJi0Wj/7pnQcndOrcBSwmXRwMWsANqr7T5YC21CJKb/3I/
LTXx+GA/IZNAljaXHv+bLvNLqBaTyd/ZTI79I0RpjQfB2OoJ1ize+vyNuSgTdWbO
kQzqr0HK4WXQdxNYJhfzbIHpkA+ltCWwwHObqGtE1szLMSQEqmzERdS+77cku/ym
P8wDjno1Zu+4u5UPBRmnsOdvSmj2+fCwNJVQyxIjQSwD9c0F+kGt4ph5RBdpZqPn
y8UC/gMq6yuzU+8ErhSNCwg8YLMVnapIbz7JuiK4V/bOCsAZ/tFpr0NG8XMq/7KE
VI1sG3gVq4wc/Z6WCVkB
=/eVG
-----END PGP SIGNATURE-----
More information about the Xenial-changes
mailing list