This bug was fixed in the package xen - 4.1.5-0ubuntu0.12.04.1

---------------
xen (4.1.5-0ubuntu0.12.04.1) precise-proposed; urgency=low

  * Updating to lastest upstream stable release (LP: #1180396).
  * Update to upstream 4.1.5:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-5634 / XSA-33, CVE-2013-0153 / XSA-36,
        CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
        CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
        CVE-2013-1920 / XSA-47, CVE-2013-1964 / XSA-50
    - Bug fixes:
      * ACPI APEI/ERST finally working on production systems
      * Bug fixes for other low level system state handling
      * Support for xz compressed Dom0 and DomU kernels
  * Update to upstream 4.1.4:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-3494 / XSA-12, CVE-2012-3495 / XSA-13,
        CVE-2012-3496 / XSA-14, CVE-2012-3498 / XSA-16,
        CVE-2012-3515 / XSA-17, CVE-2012-4411 / XSA-19,
        CVE-2012-4535 / XSA-20, CVE-2012-4536 / XSA-21,
        CVE-2012-4537 / XSA-22, CVE-2012-4538 / XSA-23,
        CVE-2012-4539 / XSA-24, CVE-2012-4544 / XSA-25,
        CVE-2012-2625 / XSA-25, CVE-2012-5510 / XSA-26,
        CVE-2012-5511 / XSA-27, CVE-2012-5512 / XSA-28,
        CVE-2012-5513 / XSA-29, CVE-2012-5514 / XSA-30,
        CVE-2012-5515 / XSA-31
    - Bug fixes:
      * A fix for a long standing time management issue
      * Bug fixes for S3 (suspend to RAM) handling
      * Bug fixes for other low level system state handling
  * Update to upstream 4.1.3:
    - Replacing the following security changes by upstream versions:
      * CVE-2012-0217 / XSA-7,  CVE-2012-0218 / XSA-8,
        CVE-2012-2934 / XSA-9,  CVE-2012-3432 / XSA-10,
        CVE-2012-3433 / XSA-11
    - Bug fixes:
      * Updates for the latest Intel/AMD CPU revisions
      * Bug fixes and improvements to the libxl tool stack
      * Bug fixes for IOMMU handling (device passthrough to HVM guests)
      * Bug fixes for host kexec/kdump
  * Dropping the following patches previously added as they are included
    in the upstream stable release:
    - upstream-24883-adcd6ab160fa.patch
    - xen-introduce-xzalloc.patch
    - xen-backport-per-device-vector-map.patch
    - 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
    - 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
    - 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
  * Fix translation import problem caused by duplicate message ID
    (LP: #1176209).
    - tools-xm-fix-duplicate-msgid.patch
 -- Stefan Bader <stefan.ba...@canonical.com>   Fri, 21 Jun 2013 14:55:54 +0200

** Changed in: xen (Ubuntu Precise)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-0217

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-0218

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2625

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2934

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3432

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3433

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3494

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3495

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3496

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3498

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-3515

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4411

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4535

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4536

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4537

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4538

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4539

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4544

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5510

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5511

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5512

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5513

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5514

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5515

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5634

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6075

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0153

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0215

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1917

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1919

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1920

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1964

** Changed in: xen (Ubuntu Quantal)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to xen in Ubuntu.
https://bugs.launchpad.net/bugs/1180396

Title:
  Xen stable update to 4.1.5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1180396/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to