[kernel-xen] xen-4.4.0-0.4 released to testing repo
Gordan Bobic
gordan at bobich.net
Wed Aug 6 19:23:40 EST 2014
Great, thanks for this. Any chance of including this
backported patch series?
http://lists.xen.org/archives/html/xen-devel/2014-07/msg03536.html
http://lists.xen.org/archives/html/xen-devel/2014-07/msg03534.html
http://lists.xen.org/archives/html/xen-devel/2014-07/msg03535.html
Gordan
On 2014-08-06 08:35, Steven Haigh wrote:
> Hi guys,
>
> I've just pushed Xen 4.4.0-0.4 to the testing repo.
>
> Current changelog:
> * Wed Aug 06 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.4
> - Attempt to use qemu from upstream vs EL6
>
> * Sat Jul 19 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.3
> - XSA-100 (CVE-2014-4021) Hypervisor heap contents leaked to guests
>
> * Fri Jun 06 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.0-0.2
> - Rebase for Xen 4.4.0 release
> - XSA-89 (CVE-2014-2599) x86: enforce preemption in HVM_set_mem_access
> /
> p2m_set_mem_access()
> - XSA-92 (CVE-2014-3124) x86/HVM: restrict HVMOP_set_mem_type
> - XSA-96 (CVE-2014-3967,CVE-2014-3968) x86/HVM: eliminate
> vulnerabilities from hvm_inject_msi()
>
> Seeing as 4.2.5 will be the last release of the 4.2 series (and
> possibly
> XSA fixes), it would be prudent for people to start testing these
> packages.
>
> NOTE: With the massive changes in API, if you have running DomUs when
> upgrading, you will not be able to manage the DomUs after the upgrade.
> The workaround is to stop all DomUs first, upgrade, then reboot.
>
> Feedback is welcome.
>
> _______________________________________________
> kernel-xen mailing list
> kernel-xen at lists.wireless.org.au
> https://lists.wireless.org.au/mailman/listinfo/kernel-xen
More information about the kernel-xen
mailing list