[Bug 1763354] Re: Xen stable update to 4.9.2

2020-02-10 Thread Stefan Bader
Artful is EOL for long time.

** Changed in: xen (Ubuntu Artful)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1763354

Title:
  Xen stable update to 4.9.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1763354/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1763354] Re: Xen stable update to 4.9.2

2018-04-16 Thread Stefan Bader
** Changed in: xen (Ubuntu Artful)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1763354

Title:
  Xen stable update to 4.9.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1763354/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1763354] Re: Xen stable update to 4.9.2

2018-04-16 Thread Launchpad Bug Tracker
This bug was fixed in the package xen - 4.9.2-0ubuntu1

---
xen (4.9.2-0ubuntu1) bionic; urgency=medium

  * Update to upstream 4.9.2 release (LP: #1763354).
Changes include numerous bugfixes, including security fixes/updates.
4.9.0 -> 4.9.1:
- XSA-226 / CVE-2017-12135 (replacement)
- XSA-227 / CVE-2017-12137 (replacement)
- XSA-228 / CVE-2017-12136 (replacement)
- XSA-230 / CVE-2017-12855 (replacement)
- XSA-231 / CVE-2017-14316 (replacement)
- XSA-232 / CVE-2017-14318 (replacement)
- XSA-233 / CVE-2017-14317 (replacement)
- XSA-234 / CVE-2017-14319 (replacement)
- XSA-235 / CVE-2017-15596 (replacement)
- XSA-236 / CVE-2017-15597 (new)
- XSA-237 / CVE-2017-15590 (replacement)
- XSA-238 / CVE-2017-15591 (replacement)
- XSA-239 / CVE-2017-15589 (replacement)
- XSA-240 / CVE-2017-15595 (update)
- XSA-241 / CVE-2017-15588 (replacement)
- XSA-242 / CVE-2017-15593 (replacement)
- XSA-243 / CVE-2017-15592 (replacement)
- XSA-244 / CVE-2017-15594 (replacement)
- XSA-245 / CVE-2017-17046 (replacement)
4.9.1 -> 4.9.2:
- XSA-246 / CVE-2017-17044 (new)
- XSA-247 / CVE-2017-17045 (new)
- XSA-248 / CVE-2017-17566 (new)
- XSA-249 / CVE-2017-17563 (new)
- XSA-250 / CVE-2017-17564 (new)
- XSA-251 / CVE-2017-17565 (new)
- XSA-252 / CVE-2018-7540  (new)
- XSA-254 / CVE-2017-5754  (new / XPTI Meltdown mitigation)
- XSA-255 / CVE-2018-7541  (new)
- XSA-256 / CVE-2018-7542  (new)
  * Dropped:
d/p/ubuntu/tools-fix-ftbs-arm.patch (upstream)

 -- Stefan Bader   Thu, 12 Apr 2018 11:54:57
+0200

** Changed in: xen (Ubuntu)
   Status: In Progress => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12135

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12136

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12137

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12855

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14316

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14317

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14318

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-14319

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15588

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15589

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15590

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15591

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15592

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15593

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15594

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15595

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15596

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15597

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17044

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17045

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17046

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17563

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17564

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17565

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17566

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7540

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7541

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7542

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1763354

Title:
  Xen stable update to 4.9.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1763354/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1763354] Re: Xen stable update to 4.9.2

2018-04-13 Thread Stefan Bader
Regression test results on Bionic/18.04:

Starting on Xen 4.9.2 (Thu Apr 12 12:44:14 UTC 2018) on AMD
===
dom0 tests
===
* 10-dom0/12-setupPASS
===
PV Guest tests (using xen xl toolstack)
===
* 20-pvm/10-guest-bootPASS
* 20-pvm/15-updatePASS
* 20-pvm/20-rebootPASS
* 20-pvm/21-recover-rebootPASS
* 20-pvm/25-security-qrt  PASS
* 20-pvm/30-rebootPASS
* 20-pvm/31-recover-rebootPASS
* 20-pvm/35-pgslamPASS
* 20-pvm/40-save-restore  PASS
* 20-pvm/45-pgslamPASS
* 20-pvm/90-guest-shutdownPASS
===
HVM Guest tests (using libvirt / xl driver)
===
* 30-hvm/10-guest-bootPASS
* 30-hvm/15-updatePASS
* 30-hvm/20-rebootPASS
* 30-hvm/21-recover-rebootPASS
* 30-hvm/25-security-qrt  PASS
* 30-hvm/30-rebootPASS
* 30-hvm/31-recover-rebootPASS
* 30-hvm/35-pgslamPASS
* 30-hvm/40-save-restore  PASS
* 30-hvm/45-pgslamPASS
* 30-hvm/90-shutdown  PASS
Finished all testcases. Overall status:
PASS

Starting on Xen 4.9.2 (Thu Apr 12 12:44:14 UTC 2018) on Intel
===
dom0 tests
===
* 10-dom0/12-setupPASS
===
PV Guest tests (using xen xl toolstack)
===
* 20-pvm/10-guest-bootPASS
* 20-pvm/15-updatePASS
* 20-pvm/20-rebootPASS
* 20-pvm/21-recover-rebootPASS
* 20-pvm/25-security-qrt  PASS
* 20-pvm/30-rebootPASS
* 20-pvm/31-recover-rebootPASS
* 20-pvm/35-pgslamPASS
* 20-pvm/40-save-restore  PASS
* 20-pvm/45-pgslamPASS
* 20-pvm/90-guest-shutdownPASS
===
HVM Guest tests (using libvirt / xl driver)
===
* 30-hvm/10-guest-bootPASS
* 30-hvm/15-updatePASS
* 30-hvm/20-rebootPASS
* 30-hvm/21-recover-rebootPASS
* 30-hvm/25-security-qrt  PASS
* 30-hvm/30-rebootPASS
* 30-hvm/31-recover-rebootPASS
* 30-hvm/35-pgslamPASS
* 30-hvm/40-save-restore  PASS
* 30-hvm/45-pgslamPASS
* 30-hvm/90-shutdown  PASS
Finished all testcases. Overall status:
PASS

** Changed in: xen (Ubuntu)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1763354

Title:
  Xen stable update to 4.9.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1763354/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs