[ubuntu/trusty-security] xen 4.4.2-0ubuntu0.14.04.7 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Oct 11 18:11:19 UTC 2016
xen (4.4.2-0ubuntu0.14.04.7) trusty-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2016-6258 / XSA-182
* x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath
- CVE-2016-5403 / XSA-184
* virtio: error out if guest exceeds virtqueue size
- CVE-2016-7092 / XSA-185
* x86/32on64: don't allow recursive page tables from L3
- CVE-2016-7094 / XSA-187
* x86/shadow: Avoid overflowing sh_ctxt->seg_reg[]
* x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]
- CVE-2016-7154 / XSA-188
* evtchn-fifo: prevent use after free
- CVE-2016-7777 / XSA-190
* x86emul: honor guest CR0.TS and CR0.EM
Date: 2016-10-11 17:02:20.937417+00:00
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/xen/4.4.2-0ubuntu0.14.04.7
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list