xen (4.1.6.1-0ubuntu0.12.04.3) precise-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-7154 / XSA-104
      * x86/shadow: fix race condition sampling the dirty vram state
    - CVE-2014-7155 / XSA-105
      * x86/emulate: check cpl for all privileged instructions
    - CVE-2014-7156 / XSA-106
      * x86emul: only emulate software interrupt injection for real mode
    - CVE-2014-7188 / XSA-108
      * x86/HVM: properly bound x2APIC MSR range

Date: 2014-09-30 19:11:13.533945+00:00
Changed-By: Stefan Bader <[email protected]>
Signed-By: Marc Deslauriers <[email protected]>
https://launchpad.net/ubuntu/precise/+source/xen/4.1.6.1-0ubuntu0.12.04.3
Sorry, changesfile not available.
-- 
Precise-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/precise-changes

Reply via email to