Xen stable update to 4.1.5

Bug #1180396 reported by Stefan Bader on 2013-05-15
14
This bug affects 2 people
Affects Status Importance Assigned to Milestone
xen (Ubuntu)
Low
Stefan Bader
Precise
Medium
Stefan Bader
Quantal
Medium
Stefan Bader

Bug Description

SRU Justification:

Impact: Upstream Xen has released a stable update to 4.1.5. Since Precise and Quantal are based on 4.1 it would be gaining us bug fixes without waiting for people to run into them. Like we do with upstream stable on the kernel.

Fix: Replaced the orig tarballs with the contents of the upstream stable release. Dropping patches we have picked up already.

Testcase: Basic regression testing after upgrading.

MRE discussion: http://irclogs.ubuntu.com/2013/07/22/%23ubuntu-meeting.html#t20:33

Revision history for this message
Stefan Bader (smb) wrote :
Revision history for this message
Stefan Bader (smb) wrote :
Stefan Bader (smb) on 2013-05-15
description: updated
tags: added: patch
Revision history for this message
Heiko Sieger (h-sieger) wrote :

I understand that the upstream stable release fixes bugs such as inability to use PCI / VGA passthrough (error 22 - invalid argument). This bug has been bothering quite a number of people for some time now.

When is the upgrade going to be released? (Needless to say I'm in favor of it!!!)

Thanks.

Revision history for this message
Stefan Bader (smb) wrote :

Right now I have to get updates like this approved by the Ubuntu technical-board before any further progress can be made. I'll update the bug when I know more.

Andy Whitcroft (apw) on 2013-11-11
Changed in xen (Ubuntu Precise):
assignee: nobody → Stefan Bader (smb)
Changed in xen (Ubuntu Quantal):
assignee: nobody → Stefan Bader (smb)
Stefan Bader (smb) on 2013-11-11
Changed in xen (Ubuntu):
status: In Progress → Invalid
Changed in xen (Ubuntu Precise):
status: New → In Progress
Andy Whitcroft (apw) on 2013-11-11
Changed in xen (Ubuntu Quantal):
status: New → Fix Committed
importance: Undecided → Medium
Changed in xen (Ubuntu Precise):
importance: Undecided → Medium
Stefan Bader (smb) on 2013-11-11
description: updated
Revision history for this message
Andy Whitcroft (apw) wrote :

Note that the MRE discussions and decision are linked from the discription above.

Revision history for this message
Adam Conrad (adconrad) wrote :

These updates have both been copied to -proposed, please verify each separately and alter the tags as required.

Changed in xen (Ubuntu Precise):
status: In Progress → Fix Committed
tags: added: verification-needed-precise verification-needed-quantal
Revision history for this message
Stefan Bader (smb) wrote :

Tested Quantal for regressions. None found.

tags: added: verification-done-quantal
removed: verification-needed-quantal
Revision history for this message
Stefan Bader (smb) wrote :

Tested Precise for regressions. None found.

tags: added: verification-done-precise
removed: verification-needed-precise
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package xen - 4.1.5-0ubuntu0.12.04.1

---------------
xen (4.1.5-0ubuntu0.12.04.1) precise-proposed; urgency=low

  * Updating to lastest upstream stable release (LP: #1180396).
  * Update to upstream 4.1.5:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
    - Bug fixes:
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Support for xz compressed Dom0 and DomU kernels
  * Update to upstream 4.1.4:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
        CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
        CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
        CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
        CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
        CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
        CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
        CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
        CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
        CVE-2012-5515 / XSA-31
    - Bug fixes:
      * A fix for a long standing time management issue
      * Bug fixes for S3 (suspend to RAM) handling
      * Bug fixes for other low level system state handling
  * Update to upstream 4.1.3:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8,
        CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10,
        CVE-2012-3433 / XSA-11
    - Bug fixes:
      * Updates for the latest Intel/AMD CPU revisions
      * Bug fixes and improvements to the libxl tool stack
      * Bug fixes for IOMMU handling (device passthrough to HVM guests)
      * Bug fixes for host kexec/kdump
  * Dropping the following patches previously added as they are included
    in the upstream stable release:
    - upstream-24883-adcd6ab160fa.patch
    - xen-introduce-xzalloc.patch
    - xen-backport-per-device-vector-map.patch
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
  * Fix translation import problem caused by duplicate message ID
    (LP: #1176209).
    - tools-xm-fix-duplicate-msgid.patch
 -- Stefan Bader <email address hidden> Fri, 21 Jun 2013 14:55:54 +0200

Changed in xen (Ubuntu Precise):
status: Fix Committed → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package xen - 4.1.5-0ubuntu0.12.10.1

---------------
xen (4.1.5-0ubuntu0.12.10.1) quantal-proposed; urgency=low

  * Updating to lastest upstream stable release (LP: #1180396).
  * Update to upstream 4.1.5:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
    - Bug fixes:
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Support for xz compressed Dom0 and DomU kernels
  * Update to upstream 4.1.4:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
        CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
        CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
        CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
        CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
        CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
        CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
        CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
        CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
        CVE-2012-5515 / XSA-31
    - Bug fixes:
      * A fix for a long standing time management issue
      * Bug fixes for S3 (suspend to RAM) handling
      * Bug fixes for other low level system state handling
  * Dropping the following patches previously added as they are included
    in the upstream stable release:
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
  * Fix translation import problem caused by duplicate message ID
    (LP: #1176209).
    - tools-xm-fix-duplicate-msgid.patch
 -- Stefan Bader <email address hidden> Thu, 02 May 2013 13:14:43 -0700

Changed in xen (Ubuntu Quantal):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers

Bug attachments