This bug was fixed in the package xen - 4.4.2-0ubuntu0.14.04.1

---------------
xen (4.4.2-0ubuntu0.14.04.1) trusty; urgency=low

  * Updating to lastest upstream stable release 4.4.2 (LP: #1476666)
    - Replacing the following security changes by upstream versions:
      * CVE-2014-5146, CVE-2014-5149 / XSA-97,
        CVE-2014-3969, CVE-2015-2290 / XSA-98 (additional fix),
        CVE-2014-7154 / XSA-104, CVE-2014-7155 / XSA-105,
        CVE-2014-7156 / XSA-106, CVE-2014-6268 / XSA-107,
        CVE-2014-7188 / XSA-108, CVE-2014-8594 / XSA-109,
        CVE-2014-8595 / XSA-110, CVE-2014-8866 / XSA-111,
        CVE-2014-8867 / XSA-112, CVE-2014-9030 / XSA-113,
        CVE-2014-9065, CVE-2014-9066 / XSA-114,
        CVE-2015-0361 / XSA-116, CVE-2015-1563 / XSA-118,
        CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121,
        CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123
  * Refreshed d/p/version.patch to fix some fuzz when applying. No
    functional change.

 -- Stefan Bader <stefan.ba...@canonical.com>  Mon, 20 Jul 2015 11:34:38
+0200

** Changed in: xen (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3969

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5146

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5149

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-6268

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7154

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7155

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7156

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-7188

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8594

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8595

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8866

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8867

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9030

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9065

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9066

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-0361

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-1563

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2044

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2045

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2151

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2152

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2290

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to xen in Ubuntu.
https://bugs.launchpad.net/bugs/1476666

Title:
  [MRE] Rebase Xen-4.4 to upstream stable 4.4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1476666/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to