[ubuntu/trusty-proposed] xen 4.3.0-1ubuntu5 (Accepted)

Stefan Bader stefan.bader at canonical.com
Wed Feb 19 16:33:15 UTC 2014


xen (4.3.0-1ubuntu5) trusty; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-1642 / XSA-83
      * x86/irq: avoid use-after-free on error path in pirq_guest_bind()
    - CVE-2014-1891 / XSA-84
      * flask: fix reading strings from guest memory
    - CVE-2014-1895 / XSA-85
      * xsm/flask: correct off-by-one in flask_security_avc_cachestats
        cpu id check
    - CVE-2014-1896 / XSA-86
      * libvchan: Fix handling of invalid ring buffer indices
    - CVE-2014-1666 / XSA-87
      * x86: PHYSDEVOP_{prepare,release}_msix are privileged
    - CVE-2014-1950 / XSA-88
      * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()

Date: Mon, 17 Feb 2014 13:54:15 +0100
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/trusty/+source/xen/4.3.0-1ubuntu5
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 17 Feb 2014 13:54:15 +0100
Source: xen
Binary: libxen-4.3 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.3 xen-hypervisor-4.3-amd64 xen-system-amd64 xen-hypervisor-4.3-armhf xen-system-armhf
Architecture: source
Version: 4.3.0-1ubuntu5
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description: 
 libxen-4.3 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxen-ocaml - OCaml libraries for controlling Xen
 libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.3-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.3-armhf - Xen Hypervisor on Arm v7/v8
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-armhf - Xen System on Arm  v7/v8 (meta-package)
 xen-utils-4.3 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore utilities for Xen
Changes: 
 xen (4.3.0-1ubuntu5) trusty; urgency=low
 .
   * Applying Xen Security Advisories:
     - CVE-2014-1642 / XSA-83
       * x86/irq: avoid use-after-free on error path in pirq_guest_bind()
     - CVE-2014-1891 / XSA-84
       * flask: fix reading strings from guest memory
     - CVE-2014-1895 / XSA-85
       * xsm/flask: correct off-by-one in flask_security_avc_cachestats
         cpu id check
     - CVE-2014-1896 / XSA-86
       * libvchan: Fix handling of invalid ring buffer indices
     - CVE-2014-1666 / XSA-87
       * x86: PHYSDEVOP_{prepare,release}_msix are privileged
     - CVE-2014-1950 / XSA-88
       * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()
Checksums-Sha1: 
 b3b428c5e83b57bedb4c1bbf2fa28f4531f8c2af 3014 xen_4.3.0-1ubuntu5.dsc
 0e9bc45dea93581d7ef3d73f2596edb7b330f986 84680 xen_4.3.0-1ubuntu5.debian.tar.gz
Checksums-Sha256: 
 d9367547763a777534fa3849fe758e32cf54e88a6740c0214278d277026d91d6 3014 xen_4.3.0-1ubuntu5.dsc
 f93cbd3d6489c68d356cefed351019392d620d7384e93a70bff006c6c64f8945 84680 xen_4.3.0-1ubuntu5.debian.tar.gz
Files: 
 d02faf70e76dcc1276ac298c0e621810 3014 kernel optional xen_4.3.0-1ubuntu5.dsc
 a8c4b4f3c2607aeb881899dd95e46644 84680 kernel optional xen_4.3.0-1ubuntu5.debian.tar.gz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=PQN5
-----END PGP SIGNATURE-----


More information about the Trusty-changes mailing list