xen (4.1.6.1-0ubuntu0.12.04.3) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-7154 / XSA-104
* x86/shadow: fix race condition sampling the dirty vram state
- CVE-2014-7155 / XSA-105
* x86/emulate: check cpl for all privileged instructions
- CVE-2014-7156 / XSA-106
* x86emul: only emulate software interrupt injection for real mode
- CVE-2014-7188 / XSA-108
* x86/HVM: properly bound x2APIC MSR range
Date: 2014-09-30 19:11:13.533945+00:00
Changed-By: Stefan Bader <[email protected]>
Signed-By: Marc Deslauriers <[email protected]>
https://launchpad.net/ubuntu/precise/+source/xen/4.1.6.1-0ubuntu0.12.04.3
Sorry, changesfile not available.
--
Precise-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/precise-changes