[ubuntu/saucy-proposed] xen 4.2.1-2ubuntu2 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Tue Jun 25 13:10:15 UTC 2013
xen (4.2.1-2ubuntu2) saucy; urgency=low
* Applying Xen Security Advisories:
- CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
* libelf: abolish libelf-relocate.c
* libxc: introduce xc_dom_seg_to_ptr_pages
* libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
* libelf: add `struct elf_binary*' parameter to elf_load_image
* libelf: abolish elf_sval and elf_access_signed
* libelf: move include of <asm/guest_access.h> to top of file
* libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
* libelf: introduce macros for memory access and pointer handling
* tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
* libelf: check nul-terminated strings properly
* libelf: check all pointer accesses
* libelf: Check pointer references in elf_is_elfbinary
* libelf: Make all callers call elf_check_broken
* libelf: use C99 bool for booleans
* libelf: use only unsigned integers
* libelf: check loops for running away
* libelf: abolish obsolete macros
* libxc: Add range checking to xc_dom_binloader
* libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
* libxc: check return values from malloc
* libxc: range checks in xc_dom_p2m_host and _guest
* libxc: check blob size before proceeding in xc_dom_check_gzip
* libxc: Better range check in xc_dom_alloc_segment
- CVE-XXXX-XXXX / XSA57
* libxl: Restrict permissions on PV console device xenstore nodes
Date: Fri, 21 Jun 2013 14:23:14 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/saucy/+source/xen/4.2.1-2ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 21 Jun 2013 14:23:14 +0200
Source: xen
Binary: xen-docs-4.2 libxen-4.2 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.2 xen-hypervisor-4.2-amd64 xen-system-amd64 xen-hypervisor-4.2-i386 xen-system-i386
Architecture: source
Version: 4.2.1-2ubuntu2
Distribution: saucy
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.2 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxen-ocaml - OCaml libraries for controlling Xen
libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
libxenstore3.0 - Xenstore communications library for Xen
xen-docs-4.2 - Documentation for Xen
xen-hypervisor-4.2-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.2-i386 - Xen Hypervisor on i386
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-i386 - Xen System on i386 (meta-package)
xen-utils-4.2 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore utilities for Xen
Changes:
xen (4.2.1-2ubuntu2) saucy; urgency=low
.
* Applying Xen Security Advisories:
- CVE-2013-2194, CVE-2013-2195, CVE-2013-2196 / XSA55
* libelf: abolish libelf-relocate.c
* libxc: introduce xc_dom_seg_to_ptr_pages
* libxc: Fix range checking in xc_dom_pfn_to_ptr etc.
* libelf: add `struct elf_binary*' parameter to elf_load_image
* libelf: abolish elf_sval and elf_access_signed
* libelf: move include of <asm/guest_access.h> to top of file
* libelf/xc_dom_load_elf_symtab: Do not use "syms" uninitialised
* libelf: introduce macros for memory access and pointer handling
* tools/xcutils/readnotes: adjust print_l1_mfn_valid_note
* libelf: check nul-terminated strings properly
* libelf: check all pointer accesses
* libelf: Check pointer references in elf_is_elfbinary
* libelf: Make all callers call elf_check_broken
* libelf: use C99 bool for booleans
* libelf: use only unsigned integers
* libelf: check loops for running away
* libelf: abolish obsolete macros
* libxc: Add range checking to xc_dom_binloader
* libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
* libxc: check return values from malloc
* libxc: range checks in xc_dom_p2m_host and _guest
* libxc: check blob size before proceeding in xc_dom_check_gzip
* libxc: Better range check in xc_dom_alloc_segment
- CVE-XXXX-XXXX / XSA57
* libxl: Restrict permissions on PV console device xenstore nodes
Checksums-Sha1:
bd8ae3158f8845dd8e78b5c857ee24af12c7e9b3 3186 xen_4.2.1-2ubuntu2.dsc
8b0f226b3ddec11c59a87f958fe0fe255949de10 170093 xen_4.2.1-2ubuntu2.debian.tar.gz
Checksums-Sha256:
a83eb0f1c6e5cecb44db154052a35b401865d86f0d6d1b45a14a4246d9fe5088 3186 xen_4.2.1-2ubuntu2.dsc
1d73689c754dc5d389bd917dc94cca1b1dce754af9d46591831a9d2bdb9671ed 170093 xen_4.2.1-2ubuntu2.debian.tar.gz
Files:
cd4420cc8b7d7f3e87aa6e44b1c0e6fb 3186 kernel optional xen_4.2.1-2ubuntu2.dsc
ad46cfe321d817fdcc31be76979b217d 170093 kernel optional xen_4.2.1-2ubuntu2.debian.tar.gz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=3mqL
-----END PGP SIGNATURE-----
More information about the Saucy-changes
mailing list