[ubuntu/trusty-security] xen 4.4.0-0ubuntu5.2 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Wed Oct 1 12:07:45 UTC 2014
xen (4.4.0-0ubuntu5.2) trusty-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-5147 / XSA-102
* xen: arm: handle AArch32 userspace when dumping 64-bit guest state.
* xen: arm: Correctly handle exception injection from userspace on
64-bit.
* xen: arm: Handle traps from 32-bit userspace on 64-bit kernel as undef
- CVE-2014-5148 / XSA-103
* xen: arm: Correctly handle do_sysreg exception injection from 64-bit
userspace
- CVE-2014-7154 / XSA-104
* x86/shadow: fix race condition sampling the dirty vram state
- CVE-2014-7155 / XSA-105
* x86/emulate: check cpl for all privileged instructions
- CVE-2014-7156 / XSA-106
* x86emul: only emulate software interrupt injection for real mode
- CVE-2014-6268 / XSA-107
* evtchn: check control block exists when using FIFO-based events
- CVE-2014-7188 / XSA-108
* x86/HVM: properly bound x2APIC MSR range
Date: 2014-09-30 19:12:12.538816+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/trusty/+source/xen/4.4.0-0ubuntu5.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list