xen 4.4.0-0ubuntu5.1 source package in Ubuntu
Changelog
xen (4.4.0-0ubuntu5.1) trusty-security; urgency=low * Applying Xen Security Advisories: - CVE-2014-2599 / XSA-89 * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access() - CVE-2014-3125 / XSA-91 * xen/arm: Correctly save/restore CNTKCTL_EL1 - CVE-2014-3124 / XSA-92 * x86/HVM: restrict HVMOP_set_mem_type - CVE-2014-2915 / XSA-93 * xen/arm: Inject an undefined instruction when the coproc/sysreg is not handled * xen/arm: Don't let the guest access the coprocessors registers * xen/arm: Upgrade DCISW into DCCISW * xen/arm: Trap cache and TCM lockdown registers * xen/arm: Don't expose implementation defined registers (Cp15 c15) to the guest * xen/arm: Don't let guess access to Debug and Performance Monitor registers - CVE-2014-2986 / XSA-94 * xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking - CVE-2014-3714, CVE-2014-3715, CVE-2014-3716, CVE-2014-3717 / XSA-95 * tools: arm: remove code to check for a DTB appended to the kernel - CVE-2014-3967,CVE-2014-3968 / XSA-96 * x86/HVM: eliminate vulnerabilities from hvm_inject_msi() - CVE-2014-3969 / XSA-98 * xen: arm: check permissions when copying to/from guest virtual addresses * xen: arm: ensure we hold a reference to guest pages while we copy to/from them - CVE-2014-4021 / XSA-100 * AMD IOMMU: don't free page table prematurely * page-alloc: scrub pages used by hypervisor upon freeing - CVE-2014-4022 / XSA-101 * xen: arm: initialise the grant_table_gpfn array on allocation -- Stefan Bader <email address hidden> Mon, 23 Jun 2014 16:06:27 +0200
Upload details
- Uploaded by:
- Stefan Bader
- Sponsored by:
- Marc Deslauriers
- Uploaded to:
- Trusty
- Original maintainer:
- Ubuntu Developers
- Architectures:
- amd64 i386 armhf arm64 all
- Section:
- kernel
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
xen_4.4.0.orig-qemu.tar.gz | 3.6 MiB | e89a59f2e9d6d528b25b546c3fd9be6766bfa1941aa5d5ba6343add51dcb1192 |
xen_4.4.0.orig.tar.gz | 5.2 MiB | 77bce3389c14215eab53167ac765d93e43c9aa19c62ed29450175489693f3cf0 |
xen_4.4.0-0ubuntu5.1.debian.tar.gz | 91.9 KiB | 76d93db96cd1532917d9ee8407c1bd9d5b45b2f4d115e58d4d7da5fbf9f66f40 |
xen_4.4.0-0ubuntu5.1.dsc | 3.4 KiB | 32f37b9e74053282657793d3fff0b66f14ff35b97a732a69a80cde590eb4dff3 |
Available diffs
Binary packages built by this source
- libxen-4.4: Public libs for Xen
This package contains the shared libraries for Xen.
- libxen-dev: Public headers and libs for Xen
This package contains the public headers and static libraries for Xen.
- libxen-ocaml: OCaml libraries for controlling Xen
This package contains the runtime libraries required for the ocaml
bindings to the Xen control libraries.
- libxen-ocaml-dev: OCaml libraries for controlling Xen (devel package)
This package contains the ocaml findlib packages for compiling
applications that are designed to control the Xen hypervisor.
- libxenstore3.0: Xenstore communications library for Xen
This package contains the public libxenstore.
- xen-hypervisor-4.1-amd64: Transitional package for upgrade
- xen-hypervisor-4.3-amd64: Transitional package for upgrade
- xen-hypervisor-4.3-armhf: Transitional package for upgrade
- xen-hypervisor-4.4-amd64: Xen Hypervisor on AMD64
The hypervisor is the "core" for XEN itself. It gets booted by the boot
loader and controls cpu and memory, sharing them between your
administrative domain (Domain 0) and the virtual guest systems.
.
In order to boot a XEN system along with this package you also need a
kernel specifically crafted to work as the Domain 0, mediating hardware
access for XEN itself.
- xen-hypervisor-4.4-arm64: Xen Hypervisor on Arm64
The hypervisor is the "core" for XEN itself. It gets booted by the boot
loader and controls cpu and memory, sharing them between your
administrative domain (Domain 0) and the virtual guest systems.
.
In order to boot a XEN system along with this package you also need a
kernel specifically crafted to work as the Domain 0, mediating hardware
access for XEN itself.
- xen-hypervisor-4.4-armhf: Xen Hypervisor on Arm v7/v8
The hypervisor is the "core" for XEN itself. It gets booted by the boot
loader and controls cpu and memory, sharing them between your
administrative domain (Domain 0) and the virtual guest systems.
.
In order to boot a XEN system along with this package you also need a
kernel specifically crafted to work as the Domain 0, mediating hardware
access for XEN itself.
- xen-system-amd64: Xen System on AMD64 (meta-package)
This package depends on the latest Xen hypervisor for use on AMD64 and the
Xen utils.
- xen-system-arm64: Xen System on Arm64 (meta-package)
This package depends on the latest Xen hypervisor for use on armhf and the
Xen utils.
- xen-system-armhf: Xen System on Arm v7/v8 (meta-package)
This package depends on the latest Xen hypervisor for use on armhf and the
Xen utils.
- xen-utils-4.4: XEN administrative tools
The userspace tools to manage a system virtualized through the XEN virtual
machine monitor.
- xen-utils-common: Xen administrative tools - common files
The userspace tools to manage a system virtualized through the Xen virtual
machine monitor.
- xenstore-utils: Xenstore utilities for Xen
This package contains the Xenstore utilities.