xen (4.6.0-1ubuntu3) xenial; urgency=low

  * Fix unmount error message on shutdown and init script ordering issues:
    - d/xen-utils-common.xenstored.init: Introduce new init script which only
      starts xenstored (but also shuts it down on stop). Prevent this one to
      be run on upgrade.
    - d/xen-utils-common.xen.init:
      * Add X-Start-Before/X-Stop-After dependencies on libvirt-bin
      * Remove xenstored related code
  * d/scripts/xen-init-list: Revert back to unmodified version from Debian.
    With the ordering fixed, libvirt guests should be handled by its own
    script before xendomains is run.
  * d/control, d/libxen-dev.install and d/rules.real:
    Add xenlight.pc and xlutil.pc to be packaged as part of libxen-dev in
    multi-arch suitable location. Also declare libxen-dev as multi-arch
    same.
  * Additional Security Patches:
    - CVE-2016-2270 / XSA-154
      * x86: enforce consistent cachability of MMIO mappings
    - CVE-2016-1570 / XSA-167
      * x86/mm: PV superpage handling lacks sanity checks
    - CVE-2016-1571 / XSA-168
      * x86/VMX: prevent INVVPID failure due to non-canonical guest address
    - CVE-2015-8615 / XSA-169
      * x86: make debug output consistent in hvm_set_callback_via
    - CVE-2016-2271 / XSA-170
      * x86/VMX: sanitize rIP before re-entering guest

Date: Thu, 18 Feb 2016 18:20:38 +0100
Changed-By: Stefan Bader <stefan.ba...@canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.6.0-1ubuntu3
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 18 Feb 2016 18:20:38 +0100
Source: xen
Binary: libxen-4.6 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common 
xen-utils-4.6 xen-hypervisor-4.6-amd64 xen-system-amd64 
xen-hypervisor-4.6-arm64 xen-system-arm64 xen-hypervisor-4.6-armhf 
xen-system-armhf xen-hypervisor-4.4-amd64 xen-hypervisor-4.4-armhf 
xen-hypervisor-4.4-arm64 xen-hypervisor-4.5-amd64 xen-hypervisor-4.5-armhf 
xen-hypervisor-4.5-arm64
Architecture: source
Version: 4.6.0-1ubuntu3
Distribution: xenial
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.ba...@canonical.com>
Description:
 libxen-4.6 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.4-amd64 - Transitional package for upgrade
 xen-hypervisor-4.4-arm64 - Transitional package for upgrade
 xen-hypervisor-4.4-armhf - Transitional package for upgrade
 xen-hypervisor-4.5-amd64 - Transitional package for upgrade
 xen-hypervisor-4.5-arm64 - Transitional package for upgrade
 xen-hypervisor-4.5-armhf - Transitional package for upgrade
 xen-hypervisor-4.6-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.6-arm64 - Xen Hypervisor on ARM64
 xen-hypervisor-4.6-armhf - Xen Hypervisor on ARMHF
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-arm64 - Xen System on ARM64 (meta-package)
 xen-system-armhf - Xen System on ARMHF (meta-package)
 xen-utils-4.6 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Changes:
 xen (4.6.0-1ubuntu3) xenial; urgency=low
 .
   * Fix unmount error message on shutdown and init script ordering issues:
     - d/xen-utils-common.xenstored.init: Introduce new init script which only
       starts xenstored (but also shuts it down on stop). Prevent this one to
       be run on upgrade.
     - d/xen-utils-common.xen.init:
       * Add X-Start-Before/X-Stop-After dependencies on libvirt-bin
       * Remove xenstored related code
   * d/scripts/xen-init-list: Revert back to unmodified version from Debian.
     With the ordering fixed, libvirt guests should be handled by its own
     script before xendomains is run.
   * d/control, d/libxen-dev.install and d/rules.real:
     Add xenlight.pc and xlutil.pc to be packaged as part of libxen-dev in
     multi-arch suitable location. Also declare libxen-dev as multi-arch
     same.
   * Additional Security Patches:
     - CVE-2016-2270 / XSA-154
       * x86: enforce consistent cachability of MMIO mappings
     - CVE-2016-1570 / XSA-167
       * x86/mm: PV superpage handling lacks sanity checks
     - CVE-2016-1571 / XSA-168
       * x86/VMX: prevent INVVPID failure due to non-canonical guest address
     - CVE-2015-8615 / XSA-169
       * x86: make debug output consistent in hvm_set_callback_via
     - CVE-2016-2271 / XSA-170
       * x86/VMX: sanitize rIP before re-entering guest
Checksums-Sha1:
 9be71fb2e0b29eabf7ab7a15784c7790e6e147da 3584 xen_4.6.0-1ubuntu3.dsc
 0ccbb09eca9c36146c31c28ef163b04cb3f870d2 80324 xen_4.6.0-1ubuntu3.debian.tar.xz
Checksums-Sha256:
 3ea88069d9b240931614f4c9fadad121f7a4a3deeb5659cfdc4cc206a2c25b74 3584 
xen_4.6.0-1ubuntu3.dsc
 e5bfb909c78168db13e250fb661df817e28741975a6a774342e4c44b8391a53e 80324 
xen_4.6.0-1ubuntu3.debian.tar.xz
Files:
 8ade648a9e996a6ded3e6c12237fbf06 3584 kernel optional xen_4.6.0-1ubuntu3.dsc
 7c20ccf4bdfe1a768f2ec6967973ff77 80324 kernel optional 
xen_4.6.0-1ubuntu3.debian.tar.xz
Original-Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=/eVG
-----END PGP SIGNATURE-----
-- 
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/xenial-changes

Reply via email to