Format: 1.8 Date: Tue, 14 Mar 2017 16:08:39 +0100 Source: xen Binary: libxen-4.6 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.6 xen-hypervisor-4.6-amd64 xen-system-amd64 xen-hypervisor-4.6-arm64 xen-system-arm64 xen-hypervisor-4.6-armhf xen-system-armhf xen-hypervisor-4.4-amd64 xen-hypervisor-4.4-armhf xen-hypervisor-4.4-arm64 xen-hypervisor-4.5-amd64 xen-hypervisor-4.5-armhf xen-hypervisor-4.5-arm64 Architecture: i386 Version: 4.6.5-0ubuntu1 Distribution: xenial-proposed Urgency: medium Maintainer: Launchpad Build Daemon Changed-By: Stefan Bader Description: libxen-4.6 - Public libs for Xen libxen-dev - Public headers and libs for Xen libxenstore3.0 - Xenstore communications library for Xen xen-hypervisor-4.4-amd64 - Transitional package for upgrade xen-hypervisor-4.4-arm64 - Transitional package for upgrade xen-hypervisor-4.4-armhf - Transitional package for upgrade xen-hypervisor-4.5-amd64 - Transitional package for upgrade xen-hypervisor-4.5-arm64 - Transitional package for upgrade xen-hypervisor-4.5-armhf - Transitional package for upgrade xen-hypervisor-4.6-amd64 - Xen Hypervisor on AMD64 xen-hypervisor-4.6-arm64 - Xen Hypervisor on ARM64 xen-hypervisor-4.6-armhf - Xen Hypervisor on ARMHF xen-system-amd64 - Xen System on AMD64 (meta-package) xen-system-arm64 - Xen System on ARM64 (meta-package) xen-system-armhf - Xen System on ARMHF (meta-package) xen-utils-4.6 - XEN administrative tools xen-utils-common - Xen administrative tools - common files xenstore-utils - Xenstore command line utilities for Xen Launchpad-Bugs-Fixed: 1671760 1671864 Changes: xen (4.6.5-0ubuntu1) xenial; urgency=medium . * Rebasing to upstream stable release 4.6.5 (LP: #1671864) https://www.xenproject.org/downloads/xen-archives/xen-46-series.html - Includes fix for booting 4.10 Linux kernels in HVM guests on Intel hosts which support the TSC_ADJUST MSR (LP: #1671760) - Additional security relevant changes: * CVE-2013-2076 / XSA-052 (update) - Information leak on XSAVE/XRSTOR capable AMD CPUs * CVE-2016-7093 / XSA-186 (4.6.3 became vulnerable) - x86: Mishandling of instruction pointer truncation during emulation * XSA-207 - memory leak when destroying guest without PT devices - Replacing the following security fixes with the versions from the stable update: * CVE-2015-7812 / XSA-145 - arm: Host crash when preempting a multicall * CVE-2015-7813 / XSA-146 - arm: various unimplemented hypercalls log without rate limiting * CVE-2015-7814 / XSA-147 - arm: Race between domain destruction and memory allocation decrease * CVE-2015-7835 / XSA-148 - x86: Uncontrolled creation of large page mappings by PV guests * CVE-2015-7969 / XSA-149, XSA-151 - leak of main per-domain vcpu pointer array - x86: leak of per-domain profiling-related vcpu pointer array * CVE-2015-7970 / XSA-150 - x86: Long latency populate-on-demand operation is not preemptible * CVE-2015-7971 / XSA-152 - x86: some pmu and profiling hypercalls log without rate limiting * CVE-2015-7972 / XSA-153 - x86: populate-on-demand balloon size inaccuracy can crash guests * CVE-2016-2270 / XSA-154 - x86: inconsistent cachability flags on guest mappings * CVE-2015-8550 / XSA-155 - paravirtualized drivers incautious about shared memory contents * CVE-2015-5307, CVE-2015-8104 / XSA-156 - x86: CPU lockup during exception delivery * CVE-2015-8338 / XSA-158 - long running memory operations on ARM * CVE-2015-8339, CVE-2015-8340 / XSA-159 XENMEM_exchange error handling issues * CVE-2015-8341 / XSA-160 - libxl leak of pv kernel and initrd on error * CVE-2015-8555 / XSA-165 - information leak in legacy x86 FPU/XMM initialization * XSA-166 - ioreq handling possibly susceptible to multiple read issue * CVE-2016-1570 / XSA-167 - PV superpage functionality missing sanity checks * CVE-2016-1571 / XSA-168 - VMX: intercept issue with INVLPG on non-canonical address * CVE-2015-8615 / XSA-169 - x86: unintentional logging upon guest changing callback method * CVE-2016-2271 / XSA-170 - VMX: guest user mode may crash guest with non-canonical RIP * CVE-2016-3158, CVE-2016-3159 / XSA-172 - broken AMD FPU FIP/FDP/FOP leak workaround * CVE-2016-3960 / XSA-173 - x86 shadow pagetables: address width overflow * CVE-2016-4962 / XSA-175 - Unsanitised guest input in libxl device handling code * CVE-2016-4480 / XSA-176 - x86 software guest page walk PS bit handling flaw * CVE-2016-4963 / XSA-178 - Unsanitised driver domain input in libxl device handling * CVE-2016-5242 / XSA-181 - arm: Host crash caused by VMID exhaustion * CVE-2016-6258 / XSA-182 - x86: Privilege escalation in PV guests * CVE-2016-6259 / XSA-183 - x86: Missing SMAP whitelisting in 32-bit exception / event delivery * CVE-2016-7092 / XSA-185 - x86: Disallow L3 recursive pagetable for 32-bit PV guests * CVE-2016-7094 / XSA-187 - x86 HVM: Overflow of sh_ctxt->seg_reg[] * CVE-2016-7777 / XSA-190 - CR0.TS and CR0.EM not always honored for x86 HVM guests * CVE-2016-9386 / XSA-191 - x86 null segments not always treated as unusable * CVE-2016-9382 / XSA-192 - x86 task switch to VM86 mode mis-handled * CVE-2016-9385 / XSA-193 - x86 segment base write emulation lacking canonical address checks * CVE-2016-9383 / XSA-195 - x86 64-bit bit test instruction emulation broken * CVE-2016-9377, CVE-2016-9378 / XSA-196 - x86 software interrupt injection mis-handled * CVE-2016-9379, CVE-2016-9380 / XSA-198 - delimiter injection vulnerabilities in pygrub * CVE-2016-9932 / XSA-200 - x86 CMPXCHG8B emulation fails to ignore operand size override * CVE-2016-9815, CVE-2016-9816, CVE-2016-9817, CVE-2016-9818 / XSA-201 - ARM guests may induce host asynchronous abort * CVE-2016-10024 / XSA-202 - x86 PV guests may be able to mask interrupts * CVE-2016-10025 / XSA-203 - x86: missing NULL pointer check in VMFUNC emulation * CVE-2016-10013 / XSA-204 - x86: Mishandling of SYSCALL singlestep during emulation Checksums-Sha1: a2910b39f16309455472c92e2cfefb959a7f790a 866538 libxen-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb a64d0426390154fe0731efc9447a7e95a9e80596 374660 libxen-4.6_4.6.5-0ubuntu1_i386.deb 6a50a74637df218645a77eb2ca6cd8c82b27dec0 591048 libxen-dev_4.6.5-0ubuntu1_i386.deb 2e5ebaa97b5beb504b1d199ef779fe17753aac6c 21744 libxenstore3.0-dbgsym_4.6.5-0ubuntu1_i386.ddeb f29d25f64fce5974dece38731c0c7798e91e5fbb 22232 libxenstore3.0_4.6.5-0ubuntu1_i386.deb 28ec2ce42367a725d5d803e3bade6bfc32f39bc1 5144 xen-hypervisor-4.4-amd64_4.6.5-0ubuntu1_i386.deb 51c67da4e5710285ff953ce7e7ded059051353a6 5146 xen-hypervisor-4.5-amd64_4.6.5-0ubuntu1_i386.deb d28ceef12e994e79c28a0be8d95e6b9eb69fb64b 768382 xen-hypervisor-4.6-amd64_4.6.5-0ubuntu1_i386.deb ced38b596c7e62bd71fc78e142a3a54cb48c2e00 5214 xen-system-amd64_4.6.5-0ubuntu1_i386.deb e976ac89056bed67f46970f60aceb62dd41d9b2e 662008 xen-utils-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb 0bb7ba4c27355c15383dff4a8de61999d5f1fa7f 470988 xen-utils-4.6_4.6.5-0ubuntu1_i386.deb 8fb3433bf09b9b624a23610c8460b2a51e99f8c6 12010 xenstore-utils-dbgsym_4.6.5-0ubuntu1_i386.ddeb a4229df4b00d31c9a1655bca6be3e08890adea9e 11654 xenstore-utils_4.6.5-0ubuntu1_i386.deb Checksums-Sha256: 0d9213844c30a6b0d45eff4b7ef36a132414b964c7be376b22214f337c75b219 866538 libxen-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb 0f10dd727c9390f13329c9ac84bc52c455832375115983a7df27c1ec8ff62e8a 374660 libxen-4.6_4.6.5-0ubuntu1_i386.deb c0378d9dcc1cf42a5dafd13a8e715e3bdfd7017d4ea547d863117f37d9a31803 591048 libxen-dev_4.6.5-0ubuntu1_i386.deb 6f8e768b38a5205d7d7c59c929083acf1794603a5a49b2674fad9ff9acb709cb 21744 libxenstore3.0-dbgsym_4.6.5-0ubuntu1_i386.ddeb 7b930e3186dbcf147d956bc579d0b5d294c0a02449ed5e01c2bf43c6c0d5148c 22232 libxenstore3.0_4.6.5-0ubuntu1_i386.deb 3c279195d631d36ad276fcc8eebc38e0a0e0d67dd1120f65a6001454391a9a19 5144 xen-hypervisor-4.4-amd64_4.6.5-0ubuntu1_i386.deb 70c78688270ef6d63c6d409ba535a7a946643d525443aa1ce37853a06fb8c100 5146 xen-hypervisor-4.5-amd64_4.6.5-0ubuntu1_i386.deb 494b583111dacc56dca393ec0b9e59ef768384e4bddf60aa00aeb87e778623ee 768382 xen-hypervisor-4.6-amd64_4.6.5-0ubuntu1_i386.deb 0816b95aa7b56eeeb05cf630cc8c5ed9be3725fac48b999375a8a7031f34f664 5214 xen-system-amd64_4.6.5-0ubuntu1_i386.deb e973f03c7ce36579b503865da1b5bedad4b6575aa24686f746ad50bcc254cf36 662008 xen-utils-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb c7f79853613c151217e5c956bd723807987f24c51e1d8f72d793b24c346985ad 470988 xen-utils-4.6_4.6.5-0ubuntu1_i386.deb 1f1d0f8ab7ee41b48fdcabb3411454698c92f05c2d07de004382d561393f9428 12010 xenstore-utils-dbgsym_4.6.5-0ubuntu1_i386.ddeb c28132d098448ad29289daded8a157fc3c597797c3d899e4dd1efd3a9af8fb01 11654 xenstore-utils_4.6.5-0ubuntu1_i386.deb Files: f8ba3f9b67b09307ac4537b13a29ab06 866538 libs extra libxen-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb f02e6461b1802db05ade06d8c8851177 374660 libs optional libxen-4.6_4.6.5-0ubuntu1_i386.deb 3a52afed9e82ccb9357a63a8e888da07 591048 libdevel optional libxen-dev_4.6.5-0ubuntu1_i386.deb ea06f3fcea87a5a863e11c66864d41e2 21744 libs extra libxenstore3.0-dbgsym_4.6.5-0ubuntu1_i386.ddeb a15e15e3956b74135b317a73bce8b28b 22232 libs optional libxenstore3.0_4.6.5-0ubuntu1_i386.deb fb97d40cd2d23f92acf4e19f7b9d2067 5144 oldlibs optional xen-hypervisor-4.4-amd64_4.6.5-0ubuntu1_i386.deb 314f5e8b3eafe467ff67219ae4e00319 5146 oldlibs optional xen-hypervisor-4.5-amd64_4.6.5-0ubuntu1_i386.deb f34fdc50a559e0ef63afb512556f272b 768382 kernel optional xen-hypervisor-4.6-amd64_4.6.5-0ubuntu1_i386.deb 17247d6011ca4b742595500a30f43e53 5214 kernel optional xen-system-amd64_4.6.5-0ubuntu1_i386.deb ad63dd24dc6e3de380935ca949a9e698 662008 kernel extra xen-utils-4.6-dbgsym_4.6.5-0ubuntu1_i386.ddeb ebfe093ca618190328ae0a89663683a8 470988 kernel optional xen-utils-4.6_4.6.5-0ubuntu1_i386.deb 967087149cacc21a761487ec80c27105 12010 admin extra xenstore-utils-dbgsym_4.6.5-0ubuntu1_i386.ddeb ad19ec408cee3c33d0312e9019d781c3 11654 admin optional xenstore-utils_4.6.5-0ubuntu1_i386.deb Original-Maintainer: Debian Xen Team