[ubuntu/precise-security] xen 4.1.2-2ubuntu2.3 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Dec 6 19:36:28 UTC 2012


xen (4.1.2-2ubuntu2.3) precise-security; urgency=low

  * Applying Xen Security fixes (LP: #1086801, #1086875)
    - VCPU/timers: Prevent overflow in calculations, leading to DoS
      vulnerability
      CVE-2012-4535
    - x86/physdev: Range check pirq parameter from guests
      CVE-2012-4536
    - x86/physmap: Prevent incorrect updates of m2p mappings
      CVE-2012-4537
    - xen/mm/shadow: check toplevel pagetables are present before unhooking 
      them
      CVE-2012-4538
    - compat/gnttab: Prevent infinite loop in compat code
      CVE-2012-4539
    - libxc: builder: limit maximum size of kernel/ramdisk
      CVE-2012-4544
    - gnttab: fix releasing of memory upon switches between versions
      CVE-2012-5510
    - hvm: Limit the size of large HVM op batches
      CVE-2012-5511
    - x86/HVM: range check xen_hvm_set_mem_access.hvmmem_access before use
      CVE-2012-5512
    - xen: add missing guest address range checks to XENMEM_exchange handlers
      CVE-2012-5513
    - xen: fix error handling of guest_physmap_mark_populate_on_demand()
      CVE-2012-5514
    - memop: limit guest specified extent order
      CVE-2012-5515

xen (4.1.2-2ubuntu2.2) precise-proposed; urgency=low

  * upstream-24883:adcd6ab160fa
    x86/mm: Don't check for invalid bits in non-present PTEs.
    Cherry-pick from xen-4.1 unstable to fix corrupted page table issues
    observed on 32 bit guests (LP: #1023365).

Date: 2012-12-06 14:35:19.013364+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/precise/+source/xen/4.1.2-2ubuntu2.3
-------------- next part --------------
Sorry, changesfile not available.


More information about the Precise-changes mailing list