[kernel-xen] xen-4.4.0-0.4 released to testing repo

Steven Haigh netwiz at crc.id.au
Wed Aug 6 23:16:37 EST 2014


I *believe* that this will be included in 4.4.1 - which from what I
understand is just around the corner...

If you can, put this in the bug tracker and we'll take a look at it to
make sure they are included with 4.4.1.

At this stage, my main concern is that the packages actually work as
intended. (ie with PV, HVM, and HVM+PV). I have tested purely PV and it
seems to work well - however I obviously can't test against all
different possible configurations.

On 6/08/2014 7:23 PM, Gordan Bobic wrote:
> Great, thanks for this. Any chance of including this
> backported patch series?
> 
> http://lists.xen.org/archives/html/xen-devel/2014-07/msg03536.html
> http://lists.xen.org/archives/html/xen-devel/2014-07/msg03534.html
> http://lists.xen.org/archives/html/xen-devel/2014-07/msg03535.html
> 
> Gordan
> 
> On 2014-08-06 08:35, Steven Haigh wrote:
>> Hi guys,
>>
>> I've just pushed Xen 4.4.0-0.4 to the testing repo.
>>
>> Current changelog:
>> * Wed Aug 06 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.4
>> - Attempt to use qemu from upstream vs EL6
>>
>> * Sat Jul 19 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.3
>> - XSA-100 (CVE-2014-4021) Hypervisor heap contents leaked to guests
>>
>> * Fri Jun 06 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.2
>> - Rebase for Xen 4.4.0 release
>> - XSA-89 (CVE-2014-2599) x86: enforce preemption in HVM_set_mem_access /
>> p2m_set_mem_access()
>> - XSA-92 (CVE-2014-3124) x86/HVM: restrict HVMOP_set_mem_type
>> - XSA-96 (CVE-2014-3967,CVE-2014-3968) x86/HVM: eliminate
>> vulnerabilities from hvm_inject_msi()
>>
>> Seeing as 4.2.5 will be the last release of the 4.2 series (and possibly
>> XSA fixes), it would be prudent for people to start testing these
>> packages.
>>
>> NOTE: With the massive changes in API, if you have running DomUs when
>> upgrading, you will not be able to manage the DomUs after the upgrade.
>> The workaround is to stop all DomUs first, upgrade, then reboot.
>>
>> Feedback is welcome.
>>
>> _______________________________________________
>> kernel-xen mailing list
>> kernel-xen at lists.wireless.org.au
>> https://lists.wireless.org.au/mailman/listinfo/kernel-xen
> _______________________________________________
> kernel-xen mailing list
> kernel-xen at lists.wireless.org.au
> https://lists.wireless.org.au/mailman/listinfo/kernel-xen

-- 
Steven Haigh

Email: netwiz at crc.id.au
Web: http://www.crc.id.au
Phone: (03) 9001 6090 - 0412 935 897
Fax: (03) 8338 0299

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 834 bytes
Desc: OpenPGP digital signature
URL: <https://lists.wireless.org.au/pipermail/kernel-xen/attachments/20140806/3499b134/attachment.sig>


More information about the kernel-xen mailing list