Publishing details
-
Removed from disk
.
-
Removal requested
.
-
Superseded
by xen - 4.7.2-0ubuntu1
-
Published
-
Copied from
ubuntu yakkety in
Private PPA for Ubuntu Security Team
by Ubuntu Archive Robot
Changelog
xen (4.7.0-0ubuntu2.1) yakkety-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2016-9386 / XSA-191
* x86/hvm: Fix the handling of non-present segments
- CVE-2016-9382 / XSA-192
* x86/HVM: don't load LDTR with VM86 mode attrs during task switch
- CVE-2016-9385 / XSA-193
* x86/PV: writes of %fs and %gs base MSRs require canonical addresses
- CVE-2016-9384 / XSA-194
* libelf: fix stack memory leak when loading 32 bit symbol tables
- CVE-2016-9383 / XSA-195
* x86emul: fix huge bit offset handling
- CVE-2016-9377, CVE-2016-9378 / XSA-196
* x86/emul: Correct the IDT entry calculation in inject_swint()
* x86/svm: Fix injection of software interrupts
- CVE-2016-9379, CVE-2016-9380 / XSA-198
* pygrub: Properly quote results, when returning them to the caller
- CVE-2016-9932 / XSA-200
* x86emul: CMPXCHG8B ignores operand size prefix
- CVE-2016-9815, CVE-2016-9816, CVE-2016-9817, CVE-2016-9818 / XSA.201
* arm64: handle guest-generated EL1 asynchronous abort
* arm64: handle async aborts delivered while at EL2
* arm: crash the guest when it traps on external abort
* arm32: handle async aborts delivered while at HYP
- CVE-2016-10024 / XSA-202
* x86: force EFLAGS.IF on when exiting to PV guests
- CVE-2016-10025 / XSA-203
* x86/HVM: add missing NULL check before using VMFUNC hook
- CVE-2016-10013 / XSA-204
* x86/emul: Correct the handling of eflags with SYSCALL
-- Stefan Bader <email address hidden> Mon, 09 Jan 2017 17:29:33 +0100
Builds
Package files