xen 4.4.0-0ubuntu6 source package in Ubuntu RTM

Changelog

xen (4.4.0-0ubuntu6) utopic; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-2599 / XSA-89
      * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
    - CVE-2014-3125 / XSA-91
      * xen/arm: Correctly save/restore CNTKCTL_EL1
    - CVE-2014-3124 / XSA-92
      * x86/HVM: restrict HVMOP_set_mem_type
    - CVE-2014-2915 / XSA-93
      * xen/arm: Inject an undefined instruction when the coproc/sysreg
                 is not handled
      * xen/arm: Don't let the guest access the coprocessors registers
      * xen/arm: Upgrade DCISW into DCCISW
      * xen/arm: Trap cache and TCM lockdown registers
      * xen/arm: Don't expose implementation defined registers (Cp15 c15)
                 to the guest
      * xen/arm: Don't let guess access to Debug and Performance Monitor
                 registers
    - CVE-2014-2986 / XSA-94
      * xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking
    - CVE-2014-3714, CVE-2014-3715,  CVE-2014-3716, CVE-2014-3717 / XSA-95
      * tools: arm: remove code to check for a DTB appended to the kernel
    - CVE-2014-3967,CVE-2014-3968 / XSA-96
      * x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
    - CVE-2014-3969 / XSA-98
      * xen: arm: check permissions when copying to/from guest virtual
                  addresses
      * xen: arm: ensure we hold a reference to guest pages while we copy
                  to/from them
    - CVE-2014-4021 / XSA-100
      * AMD IOMMU: don't free page table prematurely
      * page-alloc: scrub pages used by hypervisor upon freeing
    - CVE-2014-4022 / XSA-101
      * xen: arm: initialise the grant_table_gpfn array on allocation
 -- Stefan Bader <email address hidden>   Mon, 23 Jun 2014 15:40:16 +0200

Upload details

Uploaded by:
Stefan Bader
Sponsored by:
Marc Deslauriers
Uploaded to:
Utopic
Original maintainer:
Ubuntu Developers
Architectures:
amd64 i386 armhf arm64 all
Section:
kernel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
14.09-factory release main kernel
14.09 release main kernel

Downloads

File Size SHA-256 Checksum
xen_4.4.0.orig-qemu.tar.gz 3.6 MiB e89a59f2e9d6d528b25b546c3fd9be6766bfa1941aa5d5ba6343add51dcb1192
xen_4.4.0.orig.tar.gz 5.2 MiB 77bce3389c14215eab53167ac765d93e43c9aa19c62ed29450175489693f3cf0
xen_4.4.0-0ubuntu6.debian.tar.xz 72.7 KiB 78622127e8e6d9a914110349b5b5a9ea5d773aa4a7e7ddd93b35825fd730f9af
xen_4.4.0-0ubuntu6.dsc 3.7 KiB 22dcb49c9b84275d74f3827d36abdb99abd66ed16c7c168dd17bce42bce78c7e

Available diffs

View changes file

Binary packages built by this source

libxen-4.4: Public libs for Xen

 This package contains the shared libraries for Xen.

libxen-dev: Public headers and libs for Xen

 This package contains the public headers and static libraries for Xen.

libxen-ocaml: OCaml libraries for controlling Xen

 This package contains the runtime libraries required for the ocaml
 bindings to the Xen control libraries.

libxen-ocaml-dev: OCaml libraries for controlling Xen (devel package)

 This package contains the ocaml findlib packages for compiling
 applications that are designed to control the Xen hypervisor.

libxenstore3.0: Xenstore communications library for Xen

 This package contains the public libxenstore.

xen-hypervisor-4.1-amd64: Transitional package for upgrade
xen-hypervisor-4.3-amd64: Transitional package for upgrade
xen-hypervisor-4.3-armhf: Transitional package for upgrade
xen-hypervisor-4.4-amd64: Xen Hypervisor on AMD64

 The hypervisor is the "core" for XEN itself. It gets booted by the boot
 loader and controls cpu and memory, sharing them between your
 administrative domain (Domain 0) and the virtual guest systems.
 .
 In order to boot a XEN system along with this package you also need a
 kernel specifically crafted to work as the Domain 0, mediating hardware
 access for XEN itself.

xen-hypervisor-4.4-armhf: Xen Hypervisor on Arm v7/v8

 The hypervisor is the "core" for XEN itself. It gets booted by the boot
 loader and controls cpu and memory, sharing them between your
 administrative domain (Domain 0) and the virtual guest systems.
 .
 In order to boot a XEN system along with this package you also need a
 kernel specifically crafted to work as the Domain 0, mediating hardware
 access for XEN itself.

xen-system-amd64: Xen System on AMD64 (meta-package)

 This package depends on the latest Xen hypervisor for use on AMD64 and the
 Xen utils.

xen-system-armhf: Xen System on Arm v7/v8 (meta-package)

 This package depends on the latest Xen hypervisor for use on armhf and the
 Xen utils.

xen-utils-4.4: XEN administrative tools

 The userspace tools to manage a system virtualized through the XEN virtual
 machine monitor.

xen-utils-common: Xen administrative tools - common files

 The userspace tools to manage a system virtualized through the Xen virtual
 machine monitor.

xenstore-utils: Xenstore utilities for Xen

 This package contains the Xenstore utilities.