[ubuntu/saucy-proposed] xen 4.2.1-2ubuntu2 (Accepted)

Stefan Bader stefan.bader at canonical.com
Tue Jun 25 13:10:15 UTC 2013


xen (4.2.1-2ubuntu2) saucy; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
      * libelf: abolish libelf-relocate.c
      * libxc: introduce xc_dom_seg_to_ptr_pages
      * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
      * libelf: add `struct elf_binary*' parameter to elf_load_image
      * libelf: abolish elf_sval and elf_access_signed
      * libelf: move include of <asm/guest_access.h> to top of file
      * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
      * libelf: introduce macros for memory access and pointer handling
      * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
      * libelf: check nul-terminated strings properly
      * libelf: check all pointer accesses
      * libelf: Check pointer references in elf_is_elfbinary
      * libelf: Make all callers call elf_check_broken
      * libelf: use C99 bool for booleans
      * libelf: use only unsigned integers
      * libelf: check loops for running away
      * libelf: abolish obsolete macros
      * libxc: Add range checking to xc_dom_binloader
      * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
      * libxc: check return values from malloc
      * libxc: range checks in xc_dom_p2m_host and _guest
      * libxc: check blob size before proceeding in xc_dom_check_gzip
      * libxc: Better range check in xc_dom_alloc_segment
    - CVE-XXXX-XXXX / XSA57
      * libxl: Restrict permissions on PV console device xenstore nodes

Date: Fri, 21 Jun 2013 14:23:14 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/saucy/+source/xen/4.2.1-2ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 21 Jun 2013 14:23:14 +0200
Source: xen
Binary: xen-docs-4.2 libxen-4.2 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.2 xen-hypervisor-4.2-amd64 xen-system-amd64 xen-hypervisor-4.2-i386 xen-system-i386
Architecture: source
Version: 4.2.1-2ubuntu2
Distribution: saucy
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description: 
 libxen-4.2 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxen-ocaml - OCaml libraries for controlling Xen
 libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
 libxenstore3.0 - Xenstore communications library for Xen
 xen-docs-4.2 - Documentation for Xen
 xen-hypervisor-4.2-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.2-i386 - Xen Hypervisor on i386
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-i386 - Xen System on i386 (meta-package)
 xen-utils-4.2 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore utilities for Xen
Changes: 
 xen (4.2.1-2ubuntu2) saucy; urgency=low
 .
   * Applying Xen Security Advisories:
     - CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
       * libelf: abolish libelf-relocate.c
       * libxc: introduce xc_dom_seg_to_ptr_pages
       * libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
       * libelf: add `struct elf_binary*' parameter to elf_load_image
       * libelf: abolish elf_sval and elf_access_signed
       * libelf: move include of <asm/guest_access.h> to top of file
       * libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
       * libelf: introduce macros for memory access and pointer handling
       * tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
       * libelf: check nul-terminated strings properly
       * libelf: check all pointer accesses
       * libelf: Check pointer references in elf_is_elfbinary
       * libelf: Make all callers call elf_check_broken
       * libelf: use C99 bool for booleans
       * libelf: use only unsigned integers
       * libelf: check loops for running away
       * libelf: abolish obsolete macros
       * libxc: Add range checking to xc_dom_binloader
       * libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
       * libxc: check return values from malloc
       * libxc: range checks in xc_dom_p2m_host and _guest
       * libxc: check blob size before proceeding in xc_dom_check_gzip
       * libxc: Better range check in xc_dom_alloc_segment
     - CVE-XXXX-XXXX / XSA57
       * libxl: Restrict permissions on PV console device xenstore nodes
Checksums-Sha1: 
 bd8ae3158f8845dd8e78b5c857ee24af12c7e9b3 3186 xen_4.2.1-2ubuntu2.dsc
 8b0f226b3ddec11c59a87f958fe0fe255949de10 170093 xen_4.2.1-2ubuntu2.debian.tar.gz
Checksums-Sha256: 
 a83eb0f1c6e5cecb44db154052a35b401865d86f0d6d1b45a14a4246d9fe5088 3186 xen_4.2.1-2ubuntu2.dsc
 1d73689c754dc5d389bd917dc94cca1b1dce754af9d46591831a9d2bdb9671ed 170093 xen_4.2.1-2ubuntu2.debian.tar.gz
Files: 
 cd4420cc8b7d7f3e87aa6e44b1c0e6fb 3186 kernel optional xen_4.2.1-2ubuntu2.dsc
 ad46cfe321d817fdcc31be76979b217d 170093 kernel optional xen_4.2.1-2ubuntu2.debian.tar.gz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=3mqL
-----END PGP SIGNATURE-----


More information about the Saucy-changes mailing list