[ubuntu/trusty-security] xen 4.4.1-0ubuntu0.14.04.4 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Mar 12 13:52:24 UTC 2015


xen (4.4.1-0ubuntu0.14.04.4) trusty-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-9065, CVE-2014-9066 / XSA-114
      * switch to write-biased r/w locks
    - CVE-2015-0361 / XSA-116
      * x86/HVM: prevent use-after-free when destroying a domain
    - CVE-2015-1563 / XSA-118
      * xen/arm: vgic: message in the emulation code should be
        rate-limited
    - CVE-2015-2152 / XSA-119
      * tools: libxl: Explicitly disable graphics backends on qemu
        cmdline
    - CVE-2015-2044 / XSA-121
      * x86/HVM: return all ones on wrong-sized reads of system device I/O
        ports
    - CVE-2015-2045 / XSA-122
      * pre-fill structures for certain HYPERVISOR_xen_version sub-ops
    - CVE-2015-2151 / XSA-123
      * x86emul: fully ignore segment override for register-only operations

xen (4.4.1-0ubuntu0.14.04.3) trusty; urgency=low

  * d/xen-utils-common.xen.init: Update script to start a QEMU process for
    dom0. (LP: #1396068)

Date: 2015-03-11 14:51:13.329892+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/xen/4.4.1-0ubuntu0.14.04.4
-------------- next part --------------
Sorry, changesfile not available.


More information about the Trusty-changes mailing list