[ubuntu/precise-security] xen 4.1.6.1-0ubuntu0.12.04.13 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Jan 12 18:39:33 UTC 2017
xen (4.1.6.1-0ubuntu0.12.04.13) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2016-9386 / XSA-191
* x86/hvm: Fix the handling of non-present segments
- CVE-2016-9382 / XSA-192
* x86/HVM: don't load LDTR with VM86 mode attrs during task switch
- CVE-2016-9383 / XSA-195
* x86emul: fix huge bit offset handling
- CVE-2016-9381 / XSA-197
* xen: fix ioreq handling
- CVE-2016-9379, CVE-2016-9380 / XSA-198
* pygrub: Properly quote results, when returning them to the caller
- CVE-2016-9637 / XSA-199
* qemu: ioport_read, ioport_write: be defensive about 32-bit addresses
- CVE-2016-9932 / XSA-200
* x86/emulator: add feature checks for newer instructions
* x86emul: CMPXCHG8B ignores operand size prefix
- CVE-2016-10024 / XSA-202
* x86: use MOV instead of PUSH/POP when saving/restoring register state
* x86: force EFLAGS.IF on when exiting to PV guests
- CVE-2016-10013 / XSA-204
* x86/emul: Correct the handling of eflags with SYSCALL
Date: 2017-01-12 14:47:17.741343+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/xen/4.1.6.1-0ubuntu0.12.04.13
-------------- next part --------------
Sorry, changesfile not available.
More information about the Precise-changes
mailing list