[Bug 1517161] Re: virtualbox SRU for CVE
LocutusOfBorg
costamagnagianfranco at yahoo.it
Sat Nov 21 17:58:08 UTC 2015
Hi Tyler, well, I would like if possible to trash the ubuntu changelog,
and start from the exact debian security changelog + the ubuntu change.
e.g. for vivid I started from the trusty changelog, but vivid has an
ubuntu1 and ubuntu2 delta (that is already part of Debian changelogs)
I would appreciate if the above fixes can start from the debian virtualbox.git (jessie and wheezy branches)
http://anonscm.debian.org/cgit/pkg-virtualbox/virtualbox.git
but they are nitpicks, I'm not sure about how ubuntu likes rewriting changelogs of previous releases :)
(I'm an ubuntu vivid user x64 at this moment, I didn't upgrade to wily
yet).
So I did:
download the last trusty from ubuntu.com
install trusty x64 on a virtual machine
install virtualbox (the current one) inside
--fail because of the too new kernel (the dkms doesn't run successfully anymore)
installed virtualbox from my ppa
installed a trusty 32 bit inside my trusty VM,
upgraded everything, rebooted them both
everything was still running
(I also installed the guest-* modules IIRC)
for precise I did mostly the same
install precise in a VM
install the current virtualbox
install trusty 32 bit inside the virtualbox
poweroff the trusty VM inside the VM
upgraded virtualbox to the ppa version
rebooted the trusty VM
checked that everything was still running fine after the upgrade.
The problem about upgrades is that sometimes machines doesn't start anymore, but it should happen
only between major releases, not minor.
For me it is safe to update, but well, it is an huge piece of software,
it might break on obscure operating systems, architectures, CPU, kernels
and so on...
So far the Debian work has been a complete success, so I think the Ubuntu same work will be too.
(and I have to say, upstream is really good at testing minor releases and keep the work done correctly, with no regressions)
--
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1517161
Title:
virtualbox SRU for CVE
Status in virtualbox package in Ubuntu:
Confirmed
Bug description:
SRU updates for Virtualbox,
- fix all CVEs around the package (upstream refuses to give targeted fixes) cfr: debian #794466
- ship kernel modules compatible with latest kernels (fixing e.g.
1457780 1358157 and the hundred of duplicates)
- port the new virtualbox kernel modules features (from Adam Conrad) also to trusty, because now the kernel module is also provided by the kernel itself
SRU:
1) wily: update SRU to xenial 5.0.10-dfsg-2 (sync ongoing)
No regression potential, just security fixes and bug fixes
(upstream takes care of auto testing, and I usually test deeply virtualbox prior to release)
2) vivid: is this needed? let me know, I can update it without issues
(same update as the trusty one)
3) trusty:
update from 4.3.10 to 4.3.34
I started from the Debian version that landed in -security some time
ago, and I rebased with the ubuntu changelogs.
no notable differences a part of the changelog.
testing has been fine, except for the part that I couldn't install the current virtualbox-dkms because of the build failures
(now trusty images comes with shipped 3.19 that makes the dkms build fail).
so, directly installed the 4.3.34 and everything was fine.
4) precise:
update from 4.1.12 to 4.1.44
I started from the Debian version that landed in -security some time
ago, and I rebased with the ubuntu changelogs.
differences between debian for precise:
changelog, version (debian has 4.1.42 ubuntu has 4.1.44, but this is a really minor difference)
2 patches:
- fix a build failure because LIBVNCSERVER_IPv6 is defined but there is no ipv6port exposed (this shouldn't be a problem to comment that part)
- fix a runtime dkms build failure, because newer kernel such as
trusty-lts has CONFIG_X86_SMAP defined, and virtualbox 4.1.x is known
to *not* work with it.
this is a "*regression*" in the kernel and virtualbox doesn't work also in 4.1.12 anymore with it
(it affects broadwell/skylake cpus only).
the real fix would be to upgrade to virtualbox 4.2, but since nobody
so far complained about this problem, I guess we can avoid this major
upgrade
testing has been successful, I installed trusty on a vm, upgraded
virtualbox to 4.1.44, and trusty was still starting ok, even with the
old precise kernel, and the lts-trusty one.
packages uploaded here
https://launchpad.net/~costamagnagianfranco/+archive/ubuntu/costamagnagianfranco-ppa/+packages
I'm not happy with this request, but well, I monitor for bugs, and I guess I'll continue doing my best in keeping virtualbox working correctly (I couldn't before because I was forced by the MRE updates impossibility)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1517161/+subscriptions
More information about the Ubuntu-sponsors
mailing list