[ubuntu/yakkety-proposed] xen 4.7.0-0ubuntu2 (Accepted)

Stefan Bader stefan.bader at canonical.com
Fri Oct 7 19:23:23 UTC 2016


xen (4.7.0-0ubuntu2) yakkety; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2016-6258 / XSA-182
      * x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath
    - CVE-2016-6259 / XSA-183
      * x86/entry: Avoid SMAP violation in compat_create_bounce_frame()
    - CVE-2016-7092 / XSA-185
      * x86/32on64: don't allow recursive page tables from L3
    - CVE-2016-7093 / XSA-186
      * x86/emulate: Correct boundary interactions of emulated instructions
      * hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual
        boundary
    - CVE-2016-7094 / XSA-187
      * x86/shadow: Avoid overflowing sh_ctxt->seg_reg[]
      * x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]
    - CVE-2016-7777 / XSA-190
      * x86emul: honor guest CR0.TS and CR0.EM

Date: Thu, 06 Oct 2016 15:24:46 +0200
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.7.0-0ubuntu2
-------------- next part --------------
Format: 1.8
Date: Thu, 06 Oct 2016 15:24:46 +0200
Source: xen
Binary: libxen-4.7 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.7 xen-hypervisor-4.7-amd64 xen-system-amd64 xen-hypervisor-4.7-arm64 xen-system-arm64 xen-hypervisor-4.7-armhf xen-system-armhf xen-hypervisor-4.6-amd64 xen-hypervisor-4.6-armhf xen-hypervisor-4.6-arm64
Architecture: source
Version: 4.7.0-0ubuntu2
Distribution: yakkety
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Stefan Bader <stefan.bader at canonical.com>
Description:
 libxen-4.7 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.6-amd64 - Transitional package for upgrade
 xen-hypervisor-4.6-arm64 - Transitional package for upgrade
 xen-hypervisor-4.6-armhf - Transitional package for upgrade
 xen-hypervisor-4.7-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.7-arm64 - Xen Hypervisor on ARM64
 xen-hypervisor-4.7-armhf - Xen Hypervisor on ARMHF
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-arm64 - Xen System on ARM64 (meta-package)
 xen-system-armhf - Xen System on ARMHF (meta-package)
 xen-utils-4.7 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Changes:
 xen (4.7.0-0ubuntu2) yakkety; urgency=low
 .
   * Applying Xen Security Advisories:
     - CVE-2016-6258 / XSA-182
       * x86/pv: Remove unsafe bits from the mod_l?_entry() fastpath
     - CVE-2016-6259 / XSA-183
       * x86/entry: Avoid SMAP violation in compat_create_bounce_frame()
     - CVE-2016-7092 / XSA-185
       * x86/32on64: don't allow recursive page tables from L3
     - CVE-2016-7093 / XSA-186
       * x86/emulate: Correct boundary interactions of emulated instructions
       * hvm/fep: Allow testing of instructions crossing the -1 -> 0 virtual
         boundary
     - CVE-2016-7094 / XSA-187
       * x86/shadow: Avoid overflowing sh_ctxt->seg_reg[]
       * x86/segment: Bounds check accesses to emulation ctxt->seg_reg[]
     - CVE-2016-7777 / XSA-190
       * x86emul: honor guest CR0.TS and CR0.EM
Checksums-Sha1:
 779c000b7f0009f282bb0abe67dc46986cfe0e91 3327 xen_4.7.0-0ubuntu2.dsc
 7bfe1624ce93f878b700309c2a3fb85881821686 70008 xen_4.7.0-0ubuntu2.debian.tar.xz
Checksums-Sha256:
 7196c82ec48cb72fc6914116db2a432eeabe907e45701ca26b2c1c3401523251 3327 xen_4.7.0-0ubuntu2.dsc
 e3300cc0159775e3ef5a1dd661feeffd104be87f2fadb33aaf2ffff59177a939 70008 xen_4.7.0-0ubuntu2.debian.tar.xz
Files:
 82800a733251a45f712a2620fe5d81f6 3327 kernel optional xen_4.7.0-0ubuntu2.dsc
 3296cacebefd1c3c3a144e97380f90b0 70008 kernel optional xen_4.7.0-0ubuntu2.debian.tar.xz
Original-Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>


More information about the Yakkety-changes mailing list