This bug was fixed in the package xen - 4.2.2-0ubuntu0.13.04.1
---------------
xen (4.2.2-0ubuntu0.13.04.1) raring-proposed; urgency=low
* Updating to latest upstream stable release (LP: #1180397).
- Security patches included which replace existing changes:
* CVE-2012-5634 / XSA-33, CVE-2013-0151 / XSA-34,
CVE-2013-0152 / XSA-35, CVE-2013-0153 / XSA-36,
CVE-2013-0215 / XSA-38, CVE-2012-6075 / XSA-41,
CVE-2013-1917 / XSA-44, CVE-2013-1919 / XSA-46,
CVE-2013-1920 / XSA-47
- Additional security related changes, not included before:
* CVE-2013-0154 / XSA-37: Hypervisor crash due to incorrect ASSERT
(debug build only)
* CVE-2013-1922 / XSA-48: qemu-nbd format-guessing due to missing
format specification
- Bug fixes
* ACPI APEI/ERST finally working on production systems
* Bug fixes for other low level system state handling
* Bug fixes and improvements to the libxl tool stack
* Bug fixes to nested virtualization
- Dropping the following patches previously added as they are included
in the upstream stable release:
* 0008-vmx-Simplify-cr0-update-handling-by-deferring-cr4-ch.patch
* 0009-VMX-disable-SMEP-feature-when-guest-is-in-non-paging.patch
* 0010-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-.patch
-- Stefan Bader <[email protected]> Tue, 06 Aug 2013 13:26:05 +0100
** Changed in: xen (Ubuntu Raring)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5634
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6075
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0151
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0152
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0153
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0154
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0215
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1917
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1919
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1920
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-1922
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1180397
Title:
[MRE] Xen stable update to 4.2.2
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1180397/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs