xen (4.3.0-1ubuntu5) trusty; urgency=low * Applying Xen Security Advisories: - CVE-2014-1642 / XSA-83 * x86/irq: avoid use-after-free on error path in pirq_guest_bind() - CVE-2014-1891 / XSA-84 * flask: fix reading strings from guest memory - CVE-2014-1895 / XSA-85 * xsm/flask: correct off-by-one in flask_security_avc_cachestats cpu id check - CVE-2014-1896 / XSA-86 * libvchan: Fix handling of invalid ring buffer indices - CVE-2014-1666 / XSA-87 * x86: PHYSDEVOP_{prepare,release}_msix are privileged - CVE-2014-1950 / XSA-88 * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo()
Date: Mon, 17 Feb 2014 13:54:15 +0100 Changed-By: Stefan Bader <stefan.ba...@canonical.com> Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> Signed-By: Marc Deslauriers <marc.deslauri...@canonical.com> https://launchpad.net/ubuntu/trusty/+source/xen/4.3.0-1ubuntu5
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 17 Feb 2014 13:54:15 +0100 Source: xen Binary: libxen-4.3 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.3 xen-hypervisor-4.3-amd64 xen-system-amd64 xen-hypervisor-4.3-armhf xen-system-armhf Architecture: source Version: 4.3.0-1ubuntu5 Distribution: trusty Urgency: low Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com> Changed-By: Stefan Bader <stefan.ba...@canonical.com> Description: libxen-4.3 - Public libs for Xen libxen-dev - Public headers and libs for Xen libxen-ocaml - OCaml libraries for controlling Xen libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package) libxenstore3.0 - Xenstore communications library for Xen xen-hypervisor-4.3-amd64 - Xen Hypervisor on AMD64 xen-hypervisor-4.3-armhf - Xen Hypervisor on Arm v7/v8 xen-system-amd64 - Xen System on AMD64 (meta-package) xen-system-armhf - Xen System on Arm v7/v8 (meta-package) xen-utils-4.3 - XEN administrative tools xen-utils-common - Xen administrative tools - common files xenstore-utils - Xenstore utilities for Xen Changes: xen (4.3.0-1ubuntu5) trusty; urgency=low . * Applying Xen Security Advisories: - CVE-2014-1642 / XSA-83 * x86/irq: avoid use-after-free on error path in pirq_guest_bind() - CVE-2014-1891 / XSA-84 * flask: fix reading strings from guest memory - CVE-2014-1895 / XSA-85 * xsm/flask: correct off-by-one in flask_security_avc_cachestats cpu id check - CVE-2014-1896 / XSA-86 * libvchan: Fix handling of invalid ring buffer indices - CVE-2014-1666 / XSA-87 * x86: PHYSDEVOP_{prepare,release}_msix are privileged - CVE-2014-1950 / XSA-88 * libxc: Fix out-of-memory error handling in xc_cpupool_getinfo() Checksums-Sha1: b3b428c5e83b57bedb4c1bbf2fa28f4531f8c2af 3014 xen_4.3.0-1ubuntu5.dsc 0e9bc45dea93581d7ef3d73f2596edb7b330f986 84680 xen_4.3.0-1ubuntu5.debian.tar.gz Checksums-Sha256: d9367547763a777534fa3849fe758e32cf54e88a6740c0214278d277026d91d6 3014 xen_4.3.0-1ubuntu5.dsc f93cbd3d6489c68d356cefed351019392d620d7384e93a70bff006c6c64f8945 84680 xen_4.3.0-1ubuntu5.debian.tar.gz Files: d02faf70e76dcc1276ac298c0e621810 3014 kernel optional xen_4.3.0-1ubuntu5.dsc a8c4b4f3c2607aeb881899dd95e46644 84680 kernel optional xen_4.3.0-1ubuntu5.debian.tar.gz Original-Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJTBMwVAAoJEGVp2FWnRL6TcdYP/jwQJdZzeGJHlRZQPYGUgtJT 8uSkVCYFMn3t8r98v6GJJRzOxnz+NDM3xgFinS6p10LYMRmPd6QG2J44PUPQKEl7 HbL/rZf+IoVmRDy23hCZxdHiffIeGGRF4zMI72effrYmsw4lR0422+5RVZ1R5Np7 rp3iWhgRfLRJK7MihO2q4Z0AHbFrcydp9Esq9JZ3KIOwxCY+Dj1xVthWhjDlcnzi KHRhPEFAdv3YxjCilPywpQs9E8Cthnkhk4EIttRJBeZJg01/DGGdWn8gwgRFfpFh QHthk98J9MSanWsiW1UKDMwHNvfYS3L+TwwOO1P1lFfGnFLDWMoHtgWcegluqu/P 5IWjFK5sFw3ZuPeT8dFBkpk0OXDa5+/Kiws9lofuwUuuAdoBxN02Ozw/mi+KVvJk vrazAfy8+4kG4bPrIUMTB1zymgCckdOOcjb20KFOU83GaKXQaapmYKmgxOR+z3rC KJOWekPaME7gQJwGU1syQoH3qsqfqjEY+gHXm9GAwsvdJqV0y2aorNbdSYAmOCsB AJrqt9GmbL9xG3kuFZRTa74YGxAtKpCCX+h2xM1XnEr55G2fZ3I2XfntG+0gTBxQ 8QioZUguAmEe2podKvclGeqOKXKw3DILGpSkQEjYk3J2INSQ+pG+zRpCN5asf7Bz 9dlEQqgzV8kEwgyuF8Yx =PQN5 -----END PGP SIGNATURE-----
-- Trusty-changes mailing list Trusty-changes@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/trusty-changes