[ubuntu/trusty-proposed] xen 4.3.0-1ubuntu3 (Accepted)

Stefan Bader stefan.bader at canonical.com
Tue Dec 17 15:26:15 UTC 2013


xen (4.3.0-1ubuntu3) trusty; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2013-4553 / XSA-74
      * Lock order reversal between page_alloc_lock and mm_rwlock
    - CVE-2013-4551 / XSA-75
      * Host crash due to guest VMX instruction execution
    - CVE-2013-4554 / XSA-76
      * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
    - CVE-????-???? / XSA-77
      * Disaggregated domain management security status
    - CVE-2013-6375 / XSA-78
      * Insufficient TLB flushing in VT-d (iommu) code
    - CVE-2013-6400 / XSA-80
      * IOMMU TLB flushing may be inadvertently suppressed
    - CVE-2013-6885 / XSA-82
      * Guest triggerable AMD CPU erratum may cause host hang

Date: Fri, 06 Dec 2013 17:51:24 +0100
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/trusty/+source/xen/4.3.0-1ubuntu3
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 06 Dec 2013 17:51:24 +0100
Source: xen
Binary: libxen-4.3 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.3 xen-hypervisor-4.3-amd64 xen-system-amd64 xen-hypervisor-4.3-armhf xen-system-armhf
Architecture: source
Version: 4.3.0-1ubuntu3
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description: 
 libxen-4.3 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxen-ocaml - OCaml libraries for controlling Xen
 libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.3-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.3-armhf - Xen Hypervisor on Arm v7/v8
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-armhf - Xen System on Arm  v7/v8 (meta-package)
 xen-utils-4.3 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore utilities for Xen
Changes: 
 xen (4.3.0-1ubuntu3) trusty; urgency=low
 .
   * Applying Xen Security Advisories:
     - CVE-2013-4553 / XSA-74
       * Lock order reversal between page_alloc_lock and mm_rwlock
     - CVE-2013-4551 / XSA-75
       * Host crash due to guest VMX instruction execution
     - CVE-2013-4554 / XSA-76
       * Hypercalls exposed to privilege rings 1 and 2 of HVM guests
     - CVE-????-???? / XSA-77
       * Disaggregated domain management security status
     - CVE-2013-6375 / XSA-78
       * Insufficient TLB flushing in VT-d (iommu) code
     - CVE-2013-6400 / XSA-80
       * IOMMU TLB flushing may be inadvertently suppressed
     - CVE-2013-6885 / XSA-82
       * Guest triggerable AMD CPU erratum may cause host hang
Checksums-Sha1: 
 210b57564bd02fa402c670cb3dfad6332792879b 3031 xen_4.3.0-1ubuntu3.dsc
 9e12f9b47b6d62b8856da4c6131ad5632ab09e39 80474 xen_4.3.0-1ubuntu3.debian.tar.gz
Checksums-Sha256: 
 e6c3b040d4bd326d6954c332ada0f0882185983a86c7add078c2b95a2ae65439 3031 xen_4.3.0-1ubuntu3.dsc
 9883a7a7a66926b30adf98a14ed75247bfcae7b4ea01b7c07671de9d42e27263 80474 xen_4.3.0-1ubuntu3.debian.tar.gz
Files: 
 7f4c5dddb570bbafbb3aacf8bd28db1f 3031 kernel optional xen_4.3.0-1ubuntu3.dsc
 4b2756b8b2d2543cfefeb1a1e45335da 80474 kernel optional xen_4.3.0-1ubuntu3.debian.tar.gz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQIcBAEBCgAGBQJSsGyfAAoJEGVp2FWnRL6TI6MP/jx0QnpYbk978WDkxb3DHsRC
zlk1MqHTGzMa9imK1UIQdD2J3j5oblt/yuc9u9lUy3hMc3bKA8yXZ8iAF18cOgJr
JIvk64fLGmECEDTYlRTADNTwx9il50TUvtH/5uaUSavNSJQXYzgmE41QBz8ww+0/
coeuZ+kKoa+W0Ni78CVHrI6U7MhchJR7XEIFSBeTdW/8v4BRQANW4XPVbU9+/EDy
sTi0e+MHcPWYxHZJdNR/9KKZeOKHlEeDirJF6ROu+W8f/pUgm8jQBZcG6yjHm+Bp
vRlB+TivoslmiHd5KhNjk2mgfZqBGHGuzQit/qzdGa0dcz/qYIcAX9ne3WjUjqxq
EYtEHavYaKqZb0QVOY0fUVG8My7dn7tR6iWW+MtFoLJ+flt4/zvL3J/cp5O/bb9c
RDwaG9wM6/jnxa14Uia59HkR7UOHzgSfCR0LfOUB1fphrgWwNKfIv973SFTqxmV8
nj8/4AA/BKvBcn0LmgQWcczAcHn3DDD2WVphijF0rfZWfAUX2D92s3O1ygnifOBR
XT4NcdvHL+j5UaE0WBVOZf9U0oFIrc5DpC3qWq0ncl2f8bsTnbQFEttmLXcw2GAc
2WsSiPnlOowvc9NyB7HYLvKFJ01rgi97iGeAHBK9BE1gMH+WAPZp0UWN283fWp0E
jHc//pWGQI5/nrVDopJ+
=rKAr
-----END PGP SIGNATURE-----


More information about the Trusty-changes mailing list