xen (4.4.2-0ubuntu0.14.04.3) trusty-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2015-7311 / XSA-142
* libxl: handle read-only drives with qemu-xen
- CVE-2015-7812 / XSA-145
* xen/arm: Support hypercall_create_continuation for multicall
- CVE-2015-7813 / XSA-146
* xen: arm: rate-limit logging from unimplemented PHYSDEVOP and HVMOP.
- CVE-2015-7814 / XSA-147
* xen: arm: handle races between relinquish_memory and
free_domheap_pages
- CVE-2015-7835 / XSA-148
* x86: guard against undue super page PTE creation
- CVE-2015-7969 / XSA-149
* xen: free domain's vcpu array
- CVE-2015-7970 / XSA-150
* x86/PoD: Eager sweep for zeroed pages
- CVE-2015-7969 / XSA-151
* xenoprof: free domain's vcpu array
- CVE-2015-7971 / XSA-152
* x86: rate-limit logging in do_xen{oprof,pmu}_op()
- CVE-2015-7972 / XSA-153
* libxl: adjust PoD target by memory fudge, too
- CVE-2015-5307 / XSA-156
* x86/HVM: always intercept #AC and #DB
Date: 2015-11-06 22:56:12.725840+00:00
Changed-By: Stefan Bader <stefan.ba...@canonical.com>
Signed-By: Steve Beattie <sbeat...@ubuntu.com>
https://launchpad.net/ubuntu/+source/xen/4.4.2-0ubuntu0.14.04.3
Sorry, changesfile not available.
--
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/trusty-changes