Change logs for xen source package in Utopic

  • xen (4.4.1-0ubuntu0.14.10.6) utopic-security; urgency=low
    
      * Applying Xen Security Advisories:
        - CVE-2015-3340 / XSA-132
          * domctl/sysctl: don't leak hypervisor stack to toolstacks
        - CVE-2015-3456 / XSA-133
          * qemut: fdc: force the fifo access to be in bounds of the
            allocated buffer
    
     -- Stefan Bader <email address hidden>  Wed, 13 May 2015 16:33:47 +0200
  • xen (4.4.1-0ubuntu0.14.10.5) utopic-security; urgency=low
    
      * Applying Xen Security Advisories:
        * CVE-2014-5146 / XSA-97 (HAP, reworked)
          - x86/paging: make log-dirty operations preemptible
        * CVE-2015-2752 / XSA-125
          - Limit XEN_DOMCTL_memory_mapping hypercall to only process up
            to 64 GFNs (or less)
        * CVE-2015-2756 / XSA-126 (qemu-dm)
          - xen: limit guest control of PCI command register
        * CVE-2015-2751 / XSA-127
          - domctl: don't allow a toolstack domain to call domain_pause() on
            itself
     -- Stefan Bader <email address hidden>   Tue, 07 Apr 2015 14:32:08 +0200
  • xen (4.4.1-0ubuntu0.14.10.4) utopic-security; urgency=low
    
      * Applying Xen Security Advisories:
        - CVE-2014-9065, CVE-2014-9066 / XSA-114
          * switch to write-biased r/w locks
        - CVE-2015-0361 / XSA-116
          * x86/HVM: prevent use-after-free when destroying a domain
        - CVE-2015-1563 / XSA-118
          * xen/arm: vgic: message in the emulation code should be
            rate-limited
        - CVE-2015-2152 / XSA-119
          * tools: libxl: Explicitly disable graphics backends on qemu
            cmdline
        - CVE-2015-2044 / XSA-121
          * x86/HVM: return all ones on wrong-sized reads of system device I/O
            ports
        - CVE-2015-2045 / XSA-122
          * pre-fill structures for certain HYPERVISOR_xen_version sub-ops
        - CVE-2015-2151 / XSA-123
          * x86emul: fully ignore segment override for register-only operations
     -- Stefan Bader <email address hidden>   Wed, 04 Mar 2015 12:20:04 +0100
  • xen (4.4.1-0ubuntu0.14.10.3) utopic; urgency=low
    
      * d/xen-utils-common.xen.init: Update script to start a QEMU process for
        dom0. (LP: #1396068)
     -- Stefan Bader <email address hidden>   Thu, 11 Dec 2014 18:23:20 +0100
  • xen (4.4.1-0ubuntu0.14.10.2) utopic-security; urgency=low
    
      * Applying Xen Security Advisories:
        - CVE-2013-3495 / XSA-59
          * VT-d: suppress UR signaling for further desktop chipsets
        - CVE-2014-8594 / XSA-109
          * x86: don't allow page table updates on non-PV page tables in
            do_mmu_update()
        - CVE-2014-8595 / XSA-110
          * x86emul: enforce privilege level restrictions when loading CS
        - CVE-2014-8866 / XSA-111
          * x86: limit checks in hypercall_xlat_continuation() to actual arguments
        - CVE-2014-8867 / XSA-112
          * x86/HVM: confine internally handled MMIO to solitary regions
        - CVE-2014-9030 / XSA-113
          * x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
     -- Stefan Bader <email address hidden>   Wed, 19 Nov 2014 14:22:02 +0100
  • xen (4.4.1-0ubuntu0.14.10.1) utopic; urgency=low
    
      * Updating to lastest upstream stable release 4.4.1 (LP: #1390352)
        - Replacing the following security changes by upstream versions:
          * CVE-2013-3495 / XSA-59 (additional work-around),
            CVE-2014-2599 / XSA-89, CVE-2014-3125 / XSA-91,
            CVE-2014-3124 / XSA-92, CVE-2014-2915 / XSA-93,
            CVE-2014-2986 / XSA-94,
            CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717 / XSA-95,
            CVE-2014-3967,CVE-2014-3968 / XSA-96, CVE-2014-3969 / XSA-98,
            CVE-2014-4021 / XSA-100, CVE-2014-4022 / XSA-101,
            CVE-2014-5147 / XSA-102, CVE-2014-5148 / XSA-103
        - Dropped patches:
          * d/p/debian/patches/ubuntu-arm64-enablement.patch (fixed by stable)
          * upstream-25290:7a6dcecb1781-rework (stale)
          * tools-flask-prefix.diff (stale)
          * ubuntu-tools-hotplug-disable-xend-socket.patch (stale, duplicate)
     -- Stefan Bader <email address hidden>   Wed, 05 Nov 2014 11:45:51 +0100
  • xen (4.4.0-0ubuntu9) utopic; urgency=low
    
      * debian/scripts/xen-init-list: Modify code to only list domains started
        by the xl command (when using libxl). Also working around a bug in the
        "list -l" command of the xl toolstack which causes it to fail if there
        are domains running which are not created by xl (like via libvirt)
        (LP: #1377960).
     -- Stefan Bader <email address hidden>   Tue, 07 Oct 2014 11:05:44 +0200
  • xen (4.4.0-0ubuntu8) utopic; urgency=low
    
      * Applying Xen Security Advisories:
        - CVE-2014-5147 / XSA-102
          * xen: arm: handle AArch32 userspace when dumping 64-bit guest state.
          * xen: arm: Correctly handle exception injection from userspace on
            64-bit.
          * xen: arm: Handle traps from 32-bit userspace on 64-bit kernel as undef
        - CVE-2014-5148 / XSA-103
          * xen: arm: Correctly handle do_sysreg exception injection from 64-bit
            userspace
        - CVE-2014-7154 / XSA-104
          * x86/shadow: fix race condition sampling the dirty vram state
        - CVE-2014-7155 / XSA-105
          * x86/emulate: check cpl for all privileged instructions
        - CVE-2014-7156 / XSA-106
          * x86emul: only emulate software interrupt injection for real mode
        - CVE-2014-6268 / XSA-107
          * evtchn: check control block exists when using FIFO-based events
        - CVE-2014-7188 / XSA-108
          * x86/HVM: properly bound x2APIC MSR range
     -- Stefan Bader <email address hidden>   Fri, 26 Sep 2014 09:55:15 +0200
  • xen (4.4.0-0ubuntu7) utopic; urgency=low
    
      * d/xen-utils-<version>.postinst: Remove xend config conversion script.
      * d/p/ubuntu-use-seabios-256.patch: Pick the 256K seabios image for
        hvmloader because the 128K default image dropped Xen support.
        (LP: #1370123)
     -- Stefan Bader <email address hidden>   Tue, 16 Sep 2014 17:35:24 +0200
  • xen (4.4.0-0ubuntu6) utopic; urgency=low
    
      * Applying Xen Security Advisories:
        - CVE-2014-2599 / XSA-89
          * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
        - CVE-2014-3125 / XSA-91
          * xen/arm: Correctly save/restore CNTKCTL_EL1
        - CVE-2014-3124 / XSA-92
          * x86/HVM: restrict HVMOP_set_mem_type
        - CVE-2014-2915 / XSA-93
          * xen/arm: Inject an undefined instruction when the coproc/sysreg
                     is not handled
          * xen/arm: Don't let the guest access the coprocessors registers
          * xen/arm: Upgrade DCISW into DCCISW
          * xen/arm: Trap cache and TCM lockdown registers
          * xen/arm: Don't expose implementation defined registers (Cp15 c15)
                     to the guest
          * xen/arm: Don't let guess access to Debug and Performance Monitor
                     registers
        - CVE-2014-2986 / XSA-94
          * xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking
        - CVE-2014-3714, CVE-2014-3715,  CVE-2014-3716, CVE-2014-3717 / XSA-95
          * tools: arm: remove code to check for a DTB appended to the kernel
        - CVE-2014-3967,CVE-2014-3968 / XSA-96
          * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
        - CVE-2014-3969 / XSA-98
          * xen: arm: check permissions when copying to/from guest virtual
                      addresses
          * xen: arm: ensure we hold a reference to guest pages while we copy
                      to/from them
        - CVE-2014-4021 / XSA-100
          * AMD IOMMU: don't free page table prematurely
          * page-alloc: scrub pages used by hypervisor upon freeing
        - CVE-2014-4022 / XSA-101
          * xen: arm: initialise the grant_table_gpfn array on allocation
     -- Stefan Bader <email address hidden>   Mon, 23 Jun 2014 15:40:16 +0200
  • xen (4.4.0-0ubuntu5) trusty; urgency=low
    
      * Minimal changes to make arm64 build. It produces packages, whatever
        can be done with those is somebody elses problem.
     -- Stefan Bader <email address hidden>   Fri, 11 Apr 2014 15:12:47 +0200