xen 4.4.0-0ubuntu5.1 source package in Ubuntu

Changelog

xen (4.4.0-0ubuntu5.1) trusty-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3125 / XSA-91
      * xen/arm: Correctly save/restore CNTKCTL_EL1
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-2915 / XSA-93
      * xen/arm: Inject an undefined instruction when the coproc/sysreg
                 is not handled
      * xen/arm: Don't let the guest access the coprocessors registers
      * xen/arm: Upgrade DCISW into DCCISW
      * xen/arm: Trap cache and TCM lockdown registers
      * xen/arm: Don't expose implementation defined registers (Cp15 c15)
                 to the guest
      * xen/arm: Don't let guess access to Debug and Performance Monitor
                 registers
    - CVE-2014-2986 / XSA-94
      * xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking
    - CVE-2014-3714, CVE-2014-3715,  CVE-2014-3716, CVE-2014-3717 / XSA-95
      * tools: arm: remove code to check for a DTB appended to the kernel
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-3969 / XSA-98
      * xen: arm: check permissions when copying to/from guest virtual
                  addresses
      * xen: arm: ensure we hold a reference to guest pages while we copy
                  to/from them
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing
    - CVE-2014-4022 / XSA-101
      * xen: arm: initialise the grant_table_gpfn array on allocation
 -- Stefan Bader <email address hidden>   Mon, 23 Jun 2014 16:06:27 +0200

Upload details

Uploaded by:
Stefan Bader
Sponsored by:
Marc Deslauriers
Uploaded to:
Trusty
Original maintainer:
Ubuntu Developers
Architectures:
amd64 i386 armhf arm64 all
Section:
kernel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
xen_4.4.0.orig-qemu.tar.gz 3.6 MiB e89a59f2e9d6d528b25b546c3fd9be6766bfa1941aa5d5ba6343add51dcb1192
xen_4.4.0.orig.tar.gz 5.2 MiB 77bce3389c14215eab53167ac765d93e43c9aa19c62ed29450175489693f3cf0
xen_4.4.0-0ubuntu5.1.debian.tar.gz 91.9 KiB 76d93db96cd1532917d9ee8407c1bd9d5b45b2f4d115e58d4d7da5fbf9f66f40
xen_4.4.0-0ubuntu5.1.dsc 3.4 KiB 32f37b9e74053282657793d3fff0b66f14ff35b97a732a69a80cde590eb4dff3

View changes file

Binary packages built by this source

libxen-4.4: Public libs for Xen

 This package contains the shared libraries for Xen.

libxen-dev: Public headers and libs for Xen

 This package contains the public headers and static libraries for Xen.

libxen-ocaml: OCaml libraries for controlling Xen

 This package contains the runtime libraries required for the ocaml
 bindings to the Xen control libraries.

libxen-ocaml-dev: OCaml libraries for controlling Xen (devel package)

 This package contains the ocaml findlib packages for compiling
 applications that are designed to control the Xen hypervisor.

libxenstore3.0: Xenstore communications library for Xen

 This package contains the public libxenstore.

xen-hypervisor-4.1-amd64: Transitional package for upgrade
xen-hypervisor-4.3-amd64: Transitional package for upgrade
xen-hypervisor-4.3-armhf: Transitional package for upgrade
xen-hypervisor-4.4-amd64: Xen Hypervisor on AMD64

 The hypervisor is the "core" for XEN itself. It gets booted by the boot
 loader and controls cpu and memory, sharing them between your
 administrative domain (Domain 0) and the virtual guest systems.
 .
 In order to boot a XEN system along with this package you also need a
 kernel specifically crafted to work as the Domain 0, mediating hardware
 access for XEN itself.

xen-hypervisor-4.4-arm64: Xen Hypervisor on Arm64

 The hypervisor is the "core" for XEN itself. It gets booted by the boot
 loader and controls cpu and memory, sharing them between your
 administrative domain (Domain 0) and the virtual guest systems.
 .
 In order to boot a XEN system along with this package you also need a
 kernel specifically crafted to work as the Domain 0, mediating hardware
 access for XEN itself.

xen-hypervisor-4.4-armhf: Xen Hypervisor on Arm v7/v8

 The hypervisor is the "core" for XEN itself. It gets booted by the boot
 loader and controls cpu and memory, sharing them between your
 administrative domain (Domain 0) and the virtual guest systems.
 .
 In order to boot a XEN system along with this package you also need a
 kernel specifically crafted to work as the Domain 0, mediating hardware
 access for XEN itself.

xen-system-amd64: Xen System on AMD64 (meta-package)

 This package depends on the latest Xen hypervisor for use on AMD64 and the
 Xen utils.

xen-system-arm64: Xen System on Arm64 (meta-package)

 This package depends on the latest Xen hypervisor for use on armhf and the
 Xen utils.

xen-system-armhf: Xen System on Arm v7/v8 (meta-package)

 This package depends on the latest Xen hypervisor for use on armhf and the
 Xen utils.

xen-utils-4.4: XEN administrative tools

 The userspace tools to manage a system virtualized through the XEN virtual
 machine monitor.

xen-utils-common: Xen administrative tools - common files

 The userspace tools to manage a system virtualized through the Xen virtual
 machine monitor.

xenstore-utils: Xenstore utilities for Xen

 This package contains the Xenstore utilities.