xen (4.2.1-0ubuntu3.2) raring-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2013-1918 / XSA-45
* x86: make vcpu_destroy_pagetables() preemptible
* x86: make new_guest_cr3() preemptible
* x86: make MMUEXT_NEW_USER_BASEPTR preemptible
* x86: make vcpu_reset() preemptible
* x86: make arch_set_info_guest() preemptible
* x86: make page table unpinning preemptible
* x86: make page table handling error paths preemptible
- CVE-2013-1952 / XSA-49
* VT-d: don't permit SVT_NO_VERIFY entries for known device types
- CVE-2013-2076 / XSA-52
* x86/xsave: fix information leak on AMD CPUs
- CVE-2013-2077 / XSA-53
* x86/xsave: recover from faults on XRSTOR
- CVE-2013-2078 / XSA-54
* x86/xsave: properly check guest input to XSETBV
- CVE-2013-2072 / XSA-56
* libxc: limit cpu values when setting vcpu affinity
Date: 2013-06-10 15:15:17.129197+00:00
Changed-By: Stefan Bader <[email protected]>
Signed-By: Marc Deslauriers <[email protected]>
https://launchpad.net/ubuntu/raring/+source/xen/4.2.1-0ubuntu3.2
Sorry, changesfile not available.
--
Raring-changes mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/raring-changes