[Bug 1180396] Re: Xen stable update to 4.1.5
Launchpad Bug Tracker
1180396 at bugs.launchpad.net
Tue Dec 10 08:57:30 UTC 2013
This bug was fixed in the package xen - 4.1.5-0ubuntu0.12.04.1
---------------
xen (4.1.5-0ubuntu0.12.04.1) precise-proposed; urgency=low
* Updating to lastest upstream stable release (LP: #1180396).
* Update to upstream 4.1.5:
- Replacing the following security changes by upstream versions:
* CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
- Bug fixes:
* ACPI APEI/ERST finally working on production systems
* Bug fixes for other low level system state handling
* Support for xz compressed Dom0 and DomU kernels
* Update to upstream 4.1.4:
- Replacing the following security changes by upstream versions:
* CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
CVE-2012-5515 / XSA-31
- Bug fixes:
* A fix for a long standing time management issue
* Bug fixes for S3 (suspend to RAM) handling
* Bug fixes for other low level system state handling
* Update to upstream 4.1.3:
- Replacing the following security changes by upstream versions:
* CVE-2012-0217 / XSA-7, CVE-2012-0218 / XSA-8,
CVE-2012-2934 / XSA-9, CVE-2012-3432 / XSA-10,
CVE-2012-3433 / XSA-11
- Bug fixes:
* Updates for the latest Intel/AMD CPU revisions
* Bug fixes and improvements to the libxl tool stack
* Bug fixes for IOMMU handling (device passthrough to HVM guests)
* Bug fixes for host kexec/kdump
* Dropping the following patches previously added as they are included
in the upstream stable release:
- upstream-24883-adcd6ab160fa.patch
- xen-introduce-xzalloc.patch
- xen-backport-per-device-vector-map.patch
- 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
- 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
- 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
* Fix translation import problem caused by duplicate message ID
(LP: #1176209).
- tools-xm-fix-duplicate-msgid.patch
-- Stefan Bader <stefan.bader at canonical.com> Fri, 21 Jun 2013 14:55:54 +0200
** Changed in: xen (Ubuntu Precise)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-0217
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-0218
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2625
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2934
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3432
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3433
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3494
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3495
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3496
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3498
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3515
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4411
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4535
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4536
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4537
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4538
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4539
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4544
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5510
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5511
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5512
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5513
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5514
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5515
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5634
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6075
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0153
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0215
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1917
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1919
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1920
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1964
** Changed in: xen (Ubuntu Quantal)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to xen in Ubuntu.
https://bugs.launchpad.net/bugs/1180396
Title:
Xen stable update to 4.1.5
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1180396/+subscriptions
More information about the Ubuntu-server-bugs
mailing list