UbuntuUpdates.org

Package "xen"




Name: xen

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Transitional package for upgrade
  • Xen Hypervisor on AMD64
  • Xen Hypervisor on AMD64
  • Xen System on AMD64 (meta-package)

Latest version: *DELETED*
Release: trusty (14.04)
Level: proposed
Repository: universe

Links



Other versions of "xen" in Trusty

Repository Area Version
base universe 4.4.0-0ubuntu5
base main 4.4.0-0ubuntu5
security universe 4.4.2-0ubuntu0.14.04.14
security main 4.4.2-0ubuntu0.14.04.14
updates main 4.4.2-0ubuntu0.14.04.14
updates universe 4.4.2-0ubuntu0.14.04.14

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 4.4.1-0ubuntu0.14.04.3 2014-12-16 15:06:24 UTC

  xen (4.4.1-0ubuntu0.14.04.3) trusty; urgency=low

  * d/xen-utils-common.xen.init: Update script to start a QEMU process for
    dom0. (LP: #1396068)
 -- Stefan Bader <email address hidden> Thu, 11 Dec 2014 18:36:54 +0100

1396068 [Xen/xl] dom0 needs to run qemu for qcow access

Version: *DELETED* 2014-11-25 13:06:58 UTC
No changelog for deleted or moved packages.

Version: 4.4.1-0ubuntu0.14.04.1 2014-11-12 16:06:32 UTC

  xen (4.4.1-0ubuntu0.14.04.1) trusty; urgency=low

  * Updating to lastest upstream stable release 4.4.1 (LP: #1390352)
    - Replacing the following security changes by upstream versions:
      * CVE-2013-3495 / XSA-59 (additional work-around),
        CVE-2014-2599 / XSA-89, CVE-2014-3125 / XSA-91,
        CVE-2014-3124 / XSA-92, CVE-2014-2915 / XSA-93,
        CVE-2014-2986 / XSA-94,
        CVE-2014-3714,CVE-2014-3715,CVE-2014-3716,CVE-2014-3717 / XSA-95,
        CVE-2014-3967,CVE-2014-3968 / XSA-96, CVE-2014-3969 / XSA-98,
        CVE-2014-4021 / XSA-100, CVE-2014-4022 / XSA-101,
        CVE-2014-5147 / XSA-102, CVE-2014-5148 / XSA-103
    - Dropped patches:
      * upstream-25290:7a6dcecb1781-rework (stale)
      * tools-flask-prefix.diff (stale)
      * ubuntu-tools-hotplug-disable-xend-socket.patch (stale, duplicate)
    - Refreshed patches:
      * d/p/debian/patches/ubuntu-arm64-enablement.patch
        Configure part fixed in Xen code. Duplicate defines for arm64 seem
        to be avoided by later libc, so need to keep that worked-around in
        Xen.
 -- Stefan Bader <email address hidden> Mon, 10 Nov 2014 11:34:26 +0100

1390352 [MRE] Rebase Xen-4.4 to upstream stable 4.4.1
CVE-2013-3495 The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed
CVE-2014-2599 The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for ...
CVE-2014-3125 Xen 4.4.x, when running on an ARM system, does not properly context ...
CVE-2014-3124 The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local ...
CVE-2014-2915 Xen 4.4.x, when running on ARM systems, does not properly restrict ...
CVE-2014-2986 The vgic_distr_mmio_write function in the virtual guest interrupt ...
CVE-2014-3714 The ARM image loading functionality in Xen 4.4.x does not properly ...
CVE-2014-3715 Buffer overflow in Xen 4.4.x allows local users to read system memory ...
CVE-2014-3716 Xen 4.4.x does not properly check alignment, which allows local users ...
CVE-2014-3717 Xen 4.4.x does not properly validate the load address for 64-bit ARM ...
CVE-2014-3967 The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x does not ...
CVE-2014-3968 The HVMOP_inject_msi function in Xen 4.2.x, 4.3.x, and 4.4.x allows ...
CVE-2014-3969 Xen 4.4.x, when running on an ARM system, does not properly check ...
CVE-2014-4021 Xen 3.2.x through 4.4.x does not properly clean memory pages recovered ...
CVE-2014-4022 XSA-101
CVE-2014-5147 Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, wh
CVE-2014-5148 XSA-103

Version: *DELETED* 2014-04-14 20:07:48 UTC
No changelog for deleted or moved packages.

Version: 4.4.0-0ubuntu5 2014-04-14 19:07:10 UTC

  xen (4.4.0-0ubuntu5) trusty; urgency=low

  * Minimal changes to make arm64 build. It produces packages, whatever
    can be done with those is somebody elses problem.
 -- Stefan Bader <email address hidden> Fri, 11 Apr 2014 15:12:47 +0200




About   -   Send Feedback to @ubuntu_updates