xen (4.4.1-0ubuntu0.14.04.4) trusty-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-9065, CVE-2014-9066 / XSA-114
      * switch to write-biased r/w locks
    - CVE-2015-0361 / XSA-116
      * x86/HVM: prevent use-after-free when destroying a domain
    - CVE-2015-1563 / XSA-118
      * xen/arm: vgic: message in the emulation code should be
        rate-limited
    - CVE-2015-2152 / XSA-119
      * tools: libxl: Explicitly disable graphics backends on qemu
        cmdline
    - CVE-2015-2044 / XSA-121
      * x86/HVM: return all ones on wrong-sized reads of system device I/O
        ports
    - CVE-2015-2045 / XSA-122
      * pre-fill structures for certain HYPERVISOR_xen_version sub-ops
    - CVE-2015-2151 / XSA-123
      * x86emul: fully ignore segment override for register-only operations

xen (4.4.1-0ubuntu0.14.04.3) trusty; urgency=low

  * d/xen-utils-common.xen.init: Update script to start a QEMU process for
    dom0. (LP: #1396068)

Date: 2015-03-11 14:51:13.329892+00:00
Changed-By: Stefan Bader <[email protected]>
Signed-By: Marc Deslauriers <[email protected]>
https://launchpad.net/ubuntu/+source/xen/4.4.1-0ubuntu0.14.04.4
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to