Format: 1.8 Date: Mon, 23 Jun 2014 16:06:27 +0200 Source: xen Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-armhf xen-system-armhf xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.1-amd64 xen-hypervisor-4.1-i386 xen-hypervisor-4.3-amd64 xen-hypervisor-4.3-armhf Architecture: armhf Version: 4.4.0-0ubuntu5.1 Distribution: trusty Urgency: low Maintainer: Ubuntu/armhf Build Daemon Changed-By: Stefan Bader Description: libxen-4.4 - Public libs for Xen libxen-dev - Public headers and libs for Xen libxen-ocaml - OCaml libraries for controlling Xen libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package) libxenstore3.0 - Xenstore communications library for Xen xen-hypervisor-4.1-amd64 - Transitional package for upgrade xen-hypervisor-4.1-i386 - Transitional package for upgrade xen-hypervisor-4.3-amd64 - Transitional package for upgrade xen-hypervisor-4.3-armhf - Transitional package for upgrade xen-hypervisor-4.4-amd64 - Xen Hypervisor on AMD64 xen-hypervisor-4.4-arm64 - Xen Hypervisor on Arm64 xen-hypervisor-4.4-armhf - Xen Hypervisor on Arm v7/v8 xen-system-amd64 - Xen System on AMD64 (meta-package) xen-system-arm64 - Xen System on Arm64 (meta-package) xen-system-armhf - Xen System on Arm v7/v8 (meta-package) xen-utils-4.4 - XEN administrative tools xen-utils-common - Xen administrative tools - common files xenstore-utils - Xenstore utilities for Xen Changes: xen (4.4.0-0ubuntu5.1) trusty-security; urgency=low . * Applying Xen Security Advisories: - CVE-2014-2599 / XSA-89 * x86: enforce preemption in HVM_set_mem_access / p2m_set_mem_access() - CVE-2014-3125 / XSA-91 * xen/arm: Correctly save/restore CNTKCTL_EL1 - CVE-2014-3124 / XSA-92 * x86/HVM: restrict HVMOP_set_mem_type - CVE-2014-2915 / XSA-93 * xen/arm: Inject an undefined instruction when the coproc/sysreg is not handled * xen/arm: Don't let the guest access the coprocessors registers * xen/arm: Upgrade DCISW into DCCISW * xen/arm: Trap cache and TCM lockdown registers * xen/arm: Don't expose implementation defined registers (Cp15 c15) to the guest * xen/arm: Don't let guess access to Debug and Performance Monitor registers - CVE-2014-2986 / XSA-94 * xen/arm: vgic: Check rank in GICD_ICFGR* emulation before locking - CVE-2014-3714, CVE-2014-3715, CVE-2014-3716, CVE-2014-3717 / XSA-95 * tools: arm: remove code to check for a DTB appended to the kernel - CVE-2014-3967,CVE-2014-3968 / XSA-96 * x86/HVM: eliminate vulnerabilities from hvm_inject_msi() - CVE-2014-3969 / XSA-98 * xen: arm: check permissions when copying to/from guest virtual addresses * xen: arm: ensure we hold a reference to guest pages while we copy to/from them - CVE-2014-4021 / XSA-100 * AMD IOMMU: don't free page table prematurely * page-alloc: scrub pages used by hypervisor upon freeing - CVE-2014-4022 / XSA-101 * xen: arm: initialise the grant_table_gpfn array on allocation Checksums-Sha1: a9216708aae1ec37796aceb4ddbb0642b70d70d4 177426 xen-hypervisor-4.4-armhf_4.4.0-0ubuntu5.1_armhf.deb bf81b0390c2d88cf2cf919872e7004a0ef12c7ca 4954 xen-system-armhf_4.4.0-0ubuntu5.1_armhf.deb 971f6907e581fb5711ed834d781345f111fbaba8 4888 xen-hypervisor-4.3-armhf_4.4.0-0ubuntu5.1_armhf.deb 38dd00fbbe9af836f1955f7c90879471b2d0488c 16242 libxenstore3.0_4.4.0-0ubuntu5.1_armhf.deb f560ce65cc8106f7ab8098cf7eb1885467d8b118 201516 libxen-4.4_4.4.0-0ubuntu5.1_armhf.deb 6681918f6dfcb153bf3867bf53d6ca26f2bcabb9 388278 libxen-dev_4.4.0-0ubuntu5.1_armhf.deb eff61dab69db868447366f627412873cf4166ba7 541144 xen-utils-4.4_4.4.0-0ubuntu5.1_armhf.deb 6ae2dbc10e5e8a6ef85a2b5e32c61167a05e313a 10808 xenstore-utils_4.4.0-0ubuntu5.1_armhf.deb Checksums-Sha256: 5148f1e4de2377991189d34b86bbbba85fcb5b1ca324e33973cd827ec7fa7f07 177426 xen-hypervisor-4.4-armhf_4.4.0-0ubuntu5.1_armhf.deb 6ddb29ddfc1a59bfa9310e819e2cfcefc735d5b441303dbca50a3f191d2f1a6c 4954 xen-system-armhf_4.4.0-0ubuntu5.1_armhf.deb 8e1f71c0a995e96469a54e46a5665a06f9bbefa08eb5983e6a5615797b293ed2 4888 xen-hypervisor-4.3-armhf_4.4.0-0ubuntu5.1_armhf.deb 56586453d2b3efa938155e13215fbde8a6d869c76aeef0d6aa5e9a22c141cacc 16242 libxenstore3.0_4.4.0-0ubuntu5.1_armhf.deb e2a2b4ac8e29f01d4f24352cf829e39c955a30360a45a342b164b7fa2ff605c0 201516 libxen-4.4_4.4.0-0ubuntu5.1_armhf.deb 61250aa36371ec50aca06d527b01f1e1a9a3ffaf0c559f0d47a7888bcbad8f37 388278 libxen-dev_4.4.0-0ubuntu5.1_armhf.deb 0c7582de1a924b9728a7939a51af381b59b59ca4388dc79ab67315dabd3c36a0 541144 xen-utils-4.4_4.4.0-0ubuntu5.1_armhf.deb 7a660c29cfdf76cfdc36725128c4936767dcd0bde9813f85946047ea083158ca 10808 xenstore-utils_4.4.0-0ubuntu5.1_armhf.deb Files: d83924b120d76dec5e1e30b59e49ce02 177426 kernel optional xen-hypervisor-4.4-armhf_4.4.0-0ubuntu5.1_armhf.deb 79e6529d6351eee4100ebe72fda66de1 4954 kernel optional xen-system-armhf_4.4.0-0ubuntu5.1_armhf.deb e0ff7aee1c40189ca86557765470ebca 4888 oldlibs optional xen-hypervisor-4.3-armhf_4.4.0-0ubuntu5.1_armhf.deb 78dbadbe94bccaea3f5638a4ed144f28 16242 libs optional libxenstore3.0_4.4.0-0ubuntu5.1_armhf.deb 74440ff5cb13044fbef298e38f8ae608 201516 libs optional libxen-4.4_4.4.0-0ubuntu5.1_armhf.deb 50cc3f3c7c7d372c3ea30f4d9720abd2 388278 libdevel optional libxen-dev_4.4.0-0ubuntu5.1_armhf.deb 1f14aef479ba6f209cdf0568b8a2b2d6 541144 kernel optional xen-utils-4.4_4.4.0-0ubuntu5.1_armhf.deb 8f61c6287ba140191fd96d1da8c77683 10808 admin optional xenstore-utils_4.4.0-0ubuntu5.1_armhf.deb Original-Maintainer: Debian Xen Team