[ubuntu/saucy-updates] xen 4.3.0-1ubuntu1.3 (Accepted)
Ubuntu Archive Robot
cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk
Wed Feb 19 19:03:56 UTC 2014
xen (4.3.0-1ubuntu1.3) saucy-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-1642 / XSA-83
* x86/irq: avoid use-after-free on error path in pirq_guest_bind()
- CVE-2014-1891 / XSA-84
* flask: fix reading strings from guest memory
- CVE-2014-1895 / XSA-85
* xsm/flask: correct off-by-one in flask_security_avc_cachestats
cpu id check
- CVE-2014-1896 / XSA-86
* libvchan: Fix handling of invalid ring buffer indices
- CVE-2014-1666 / XSA-87
* x86: PHYSDEVOP_{prepare,release}_msix are privileged
- CVE-2014-1950 / XSA-88
* libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()
Date: 2014-02-19 15:21:12.032228+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Ubuntu Archive Robot <cjwatson+ubuntu-archive-robot at chiark.greenend.org.uk>
https://launchpad.net/ubuntu/saucy/+source/xen/4.3.0-1ubuntu1.3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Saucy-changes
mailing list