[ubuntu/vivid-proposed] xen 4.4.1-3ubuntu2 (Accepted)
Stefan Bader
stefan.bader at canonical.com
Fri Nov 28 13:52:14 UTC 2014
xen (4.4.1-3ubuntu2) vivid; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-8594 / XSA-109
* x86: don't allow page table updates on non-PV page tables in
do_mmu_update()
- CVE-2014-8595 / XSA-110
* x86emul: enforce privilege level restrictions when loading CS
- CVE-2014-8866 / XSA-111
* x86: limit checks in hypercall_xlat_continuation() to actual arguments
- CVE-2014-8867 / XSA-112
* x86/HVM: confine internally handled MMIO to solitary regions
- CVE-2014-9030 / XSA-113
* x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
* Pulling in Debian change to start qemu in dom0 (LP: #1396068)
* Picking up Debian change to recommend grub-xen-host from xen-utils.
* Picking up Debian change to really include xen-init-name.
Date: Wed, 19 Nov 2014 13:47:12 +0100
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.4.1-3ubuntu2
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 19 Nov 2014 13:47:12 +0100
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture: source
Version: 4.4.1-3ubuntu2
Distribution: vivid
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
libxen-4.4 - Public libs for Xen
libxen-dev - Public headers and libs for Xen
libxenstore3.0 - Xenstore communications library for Xen
xen-hypervisor-4.4-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-4.4-arm64 - Xen Hypervisor on ARM64
xen-hypervisor-4.4-armhf - Xen Hypervisor on ARMHF
xen-system-amd64 - Xen System on AMD64 (meta-package)
xen-system-arm64 - Xen System on ARM64 (meta-package)
xen-system-armhf - Xen System on ARMHF (meta-package)
xen-utils-4.4 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Launchpad-Bugs-Fixed: 1396068
Changes:
xen (4.4.1-3ubuntu2) vivid; urgency=low
.
* Applying Xen Security Advisories:
- CVE-2014-8594 / XSA-109
* x86: don't allow page table updates on non-PV page tables in
do_mmu_update()
- CVE-2014-8595 / XSA-110
* x86emul: enforce privilege level restrictions when loading CS
- CVE-2014-8866 / XSA-111
* x86: limit checks in hypercall_xlat_continuation() to actual arguments
- CVE-2014-8867 / XSA-112
* x86/HVM: confine internally handled MMIO to solitary regions
- CVE-2014-9030 / XSA-113
* x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
* Pulling in Debian change to start qemu in dom0 (LP: #1396068)
* Picking up Debian change to recommend grub-xen-host from xen-utils.
* Picking up Debian change to really include xen-init-name.
Checksums-Sha1:
3bc5e6e0480c15d6ca983c79da3e8adade71a0d1 3053 xen_4.4.1-3ubuntu2.dsc
5f2f74eb5fe1234d8aaf5b843893d1328d2f56f5 66328 xen_4.4.1-3ubuntu2.debian.tar.xz
Checksums-Sha256:
a96e5a6b9b2dfa20897e6dc1d5f59923814f645185d0655cad11292880b74253 3053 xen_4.4.1-3ubuntu2.dsc
5cf578901a789693eb60e8d27767a924893287f9a947956d79d17b6b8b6747ec 66328 xen_4.4.1-3ubuntu2.debian.tar.xz
Files:
92ac57325107090c9eebd84ac68e6bf8 3053 kernel optional xen_4.4.1-3ubuntu2.dsc
d2bc32af196cb96bbec759a78cfc729e 66328 kernel optional xen_4.4.1-3ubuntu2.debian.tar.xz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=QNWJ
-----END PGP SIGNATURE-----
More information about the Vivid-changes
mailing list