On 01/04/2021 15:13, George Dunlap wrote:
>
>> On Apr 1, 2021, at 3:00 PM, Andrew Cooper <andrew.coop...@citrix.com> wrote:
>>
>> On 01/04/2021 14:38, George Dunlap wrote:
>>> ...grouped by submitters / maintainers
>>>
>>> Signed-off-by: George Dunlap <george.dun...@citrix.com>
>>> ---
>>> CC: Juergen Gross <jgr...@suse.com>
>>> CC: Jan Beulich <jbeul...@suse.com>
>>> CC: Ian Jackson <ian.jack...@citrix.com>
>>> ---
>>> CHANGELOG.md | 3 +++
>>> 1 file changed, 3 insertions(+)
>>>
>>> diff --git a/CHANGELOG.md b/CHANGELOG.md
>>> index 2f26cd5c87..9c272a0113 100644
>>> --- a/CHANGELOG.md
>>> +++ b/CHANGELOG.md
>>> @@ -28,8 +28,11 @@ The format is based on [Keep a 
>>> Changelog](https://keepachangelog.com/en/1.0.0/)
>>>  - Factored out HVM-specific shadow code, improving code clarity and 
>>> reducing the size of PV-only hypervisor builds
>>>  - Added XEN_SCRIPT_DIR configuration option to specify location for Xen 
>>> scripts, rather than hard-coding /etc/xen/scripts
>>>  - xennet: Documented a way for the backend (or toolstack) to specify MTU 
>>> to the frontend
>>> + - Fix permissions for watches on @introduceDomain and @releaseDomain: By 
>>> default, only privileged domains can set watches; but specific domains can 
>>> be given permission in order to allow disaggregation.
>> This is XSA-115, and isn't something new in 4.15 vs 4.14.  (I think?)
> XSA-115 went public during the 4.15 development window.
>
> So on the one hand, it’s certainly effort that happened during the window, 
> which it would be good to highlight.   On the other hand, it was backported 
> to all security supported trees (?), so it’s not something you need to update 
> to 4.15 to get.
>
> Honestly not sure the best thing to suggest here.

We either want all XSAs discussed, or none of them.  Possibly as simple
as "the following XSAs {...} where developed and released" ?

I recall Lars making this part of the release notes in the past.

>
>>> + - xenstore can now be live-updated on a running system.
>> This needs to be very clear that it is tech preview.  It does not
>> currently work cleanly if a malicious VM deliberately holds a
>> transaction open.
> OK, I’ll add (tech preview) at the end.

SGTM.

~Andrew

Reply via email to