[ubuntu/utopic-proposed] xen 4.4.0-0ubuntu6 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Wed Jul 9 11:59:15 UTC 2014
xen (4.4.0-0ubuntu6) utopic; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-2599 / XSA-89
* x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
- CVE-2014-3125 / XSA-91
* xen/arm: Correctly save/restore CNTKCTL_EL1
- CVE-2014-3124 / XSA-92
* x86/HVM: restrict HVMOP_set_mem_type
- CVE-2014-2915 / XSA-93
* xen/arm: Inject an undefined instruction when the coproc/sysreg
is not handled
* xen/arm: Don't let the guest access the coprocessors registers
* xen/arm: Upgrade DCISW into DCCISW
* xen/arm: Trap cache and TCM lockdown registers
* xen/arm: Don't expose implementation defined registers (Cp15 c15)
to the guest
* xen/arm: Don't let guess access to Debug and Performance Monitor
registers
- CVE-2014-2986 / XSA-94
* xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking
- CVE-2014-3714, CVE-2014-3715, CVE-2014-3716, CVE-2014-3717 / XSA-95
* tools: arm: remove code to check for a DTB appended to the kernel
- CVE-2014-3967,CVE-2014-3968 / XSA-96
* x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
- CVE-2014-3969 / XSA-98
* xen: arm: check permissions when copying to/from guest virtual
addresses
* xen: arm: ensure we hold a reference to guest pages while we copy
to/from them
- CVE-2014-4021 / XSA-100
* AMD IOMMU: don't free page table prematurely
* page-alloc: scrub pages used by hypervisor upon freeing
- CVE-2014-4022 / XSA-101
* xen: arm: initialise the grant_table_gpfn array on allocation
Date: Mon, 23 Jun 2014 15:40:16 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/utopic/+source/xen/4.4.0-0ubuntu6
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 23 Jun 2014 15:40:16 +0200
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-armhf xen-system-armhf xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.1-amd64 xen-hypervisor-4.1-i386 xen-hypervisor-4.3-amd64 xen-hypervisor-4.3-armhf
Architecture: source
Version: 4.4.0-0ubuntu6
Distribution: utopic
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.4 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxen-ocaml - OCaml libraries for controlling Xen
libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
libxenstore3.0 - Xenstore communications library for Xen
xen-hypervisor-4.1-amd64 - Transitional package for upgrade
xen-hypervisor-4.1-i386 - Transitional package for upgrade
xen-hypervisor-4.3-amd64 - Transitional package for upgrade
xen-hypervisor-4.3-armhf - Transitional package for upgrade
xen-hypervisor-4.4-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.4-arm64 - Xen Hypervisor on Arm64
xen-hypervisor-4.4-armhf - Xen Hypervisor on Arm v7/v8
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-arm64 - Xen System on Arm64 (meta-package)
xen-system-armhf - Xen System on Arm v7/v8 (meta-package)
xen-utils-4.4 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore utilities for Xen
Changes:
xen (4.4.0-0ubuntu6) utopic; urgency=low
.
* Applying Xen Security Advisories:
- CVE-2014-2599 / XSA-89
* x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access()
- CVE-2014-3125 / XSA-91
* xen/arm: Correctly save/restore CNTKCTL_EL1
- CVE-2014-3124 / XSA-92
* x86/HVM: restrict HVMOP_set_mem_type
- CVE-2014-2915 / XSA-93
* xen/arm: Inject an undefined instruction when the coproc/sysreg
is not handled
* xen/arm: Don't let the guest access the coprocessors registers
* xen/arm: Upgrade DCISW into DCCISW
* xen/arm: Trap cache and TCM lockdown registers
* xen/arm: Don't expose implementation defined registers (Cp15 c15)
to the guest
* xen/arm: Don't let guess access to Debug and Performance Monitor
registers
- CVE-2014-2986 / XSA-94
* xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking
- CVE-2014-3714, CVE-2014-3715, CVE-2014-3716, CVE-2014-3717 / XSA-95
* tools: arm: remove code to check for a DTB appended to the kernel
- CVE-2014-3967,CVE-2014-3968 / XSA-96
* x86/HVM: eliminate vulnerabilities from hvm_inject_msi()
- CVE-2014-3969 / XSA-98
* xen: arm: check permissions when copying to/from guest virtual
addresses
* xen: arm: ensure we hold a reference to guest pages while we copy
to/from them
- CVE-2014-4021 / XSA-100
* AMD IOMMU: don't free page table prematurely
* page-alloc: scrub pages used by hypervisor upon freeing
- CVE-2014-4022 / XSA-101
* xen: arm: initialise the grant_table_gpfn array on allocation
Checksums-Sha1:
37a50082fe90899ffa5fdb1e917fa96d81408d32 3779 xen_4.4.0-0ubuntu6.dsc
38c38ea0e6799d4f1112baf81bd8b99a739e6481 74476 xen_4.4.0-0ubuntu6.debian.tar.xz
Checksums-Sha256:
22dcb49c9b84275d74f3827d36abdb99abd66ed16c7c168dd17bce42bce78c7e 3779 xen_4.4.0-0ubuntu6.dsc
78622127e8e6d9a914110349b5b5a9ea5d773aa4a7e7ddd93b35825fd730f9af 74476 xen_4.4.0-0ubuntu6.debian.tar.xz
Files:
02aa354b70b98f7368a29b35b1976ec0 3779 kernel optional xen_4.4.0-0ubuntu6.dsc
1b5288c293f06e53f5076d9abb72aa5f 74476 kernel optional xen_4.4.0-0ubuntu6.debian.tar.xz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=rA+b
-----END PGP SIGNATURE-----
More information about the Utopic-changes
mailing list