[ubuntu/trusty-security] linux-keystone 3.13.0-44.69 (Accepted)

Chris J Arges chris.j.arges at canonical.com
Sat Dec 19 11:45:28 UTC 2015


linux-keystone (3.13.0-44.69) trusty; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
    - LP: #1527466
  * Rebase to Ubuntu-3.13.0-74.118

  [ Ubuntu: 3.13.0-74.118 ]

  * Release Tracking Bug
    - LP: #1527404
  * ptrace: being capable wrt a process requires mapped uids/gids
    - LP: #1527374

  [ Ubuntu: 3.13.0-74.117 ]

  * xen: Add RING_COPY_REQUEST()
    - CVE-2015-8550
  * xen-netback: don't use last request to determine minimum Tx credit
    - CVE-2015-8550
  * xen-netback: use RING_COPY_REQUEST() throughout
    - CVE-2015-8550
  * xen-blkback: only read request operation from shared ring once
    - CVE-2015-8550
  * xen-blkback: read from indirect descriptors only once
    - CVE-2015-8550
  * xen/pciback: Save xen_pci_op commands before processing it
    - CVE-2015-8550
  * xen/pciback: Return error on XEN_PCI_OP_enable_msi when device has MSI
    or MSI-X enabled
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Return error on XEN_PCI_OP_enable_msix when device has MSI
    or MSI-X enabled
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Do not install an IRQ handler for MSI interrupts.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has
    MSI(X) enabled.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553
  * xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
    - CVE-2015-8551, CVE-2015-8552, CVE-2015-8553

Date: 2015-12-18 13:51:13.314721+00:00
Changed-By: Ike Panhc <ike.pan at canonical.com>
Signed-By: Chris J Arges <chris.j.arges at canonical.com>
https://launchpad.net/ubuntu/+source/linux-keystone/3.13.0-44.69
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list