xen (4.4.1-0ubuntu0.14.10.4) utopic-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-9065, CVE-2014-9066 / XSA-114
* switch to write-biased r/w locks
- CVE-2015-0361 / XSA-116
* x86/HVM: prevent use-after-free when destroying a domain
- CVE-2015-1563 / XSA-118
* xen/arm: vgic: message in the emulation code should be
rate-limited
- CVE-2015-2152 / XSA-119
* tools: libxl: Explicitly disable graphics backends on qemu
cmdline
- CVE-2015-2044 / XSA-121
* x86/HVM: return all ones on wrong-sized reads of system device I/O
ports
- CVE-2015-2045 / XSA-122
* pre-fill structures for certain HYPERVISOR_xen_version sub-ops
- CVE-2015-2151 / XSA-123
* x86emul: fully ignore segment override for register-only operations
Date: 2015-03-11 14:56:13.384312+00:00
Changed-By: Stefan Bader <[email protected]>
Signed-By: Ubuntu Archive Robot
<[email protected]>
https://launchpad.net/ubuntu/+source/xen/4.4.1-0ubuntu0.14.10.4
Sorry, changesfile not available.
--
Utopic-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.canonical.com/mailman/listinfo/utopic-changes