xen 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 source package in Debian

Changelog

xen (4.1.3~rc1+hg-20120614.a9c0a89c08f2-1) unstable; urgency=low


  * New upstream snapshot.
    - Fix privilege escalation and syscall/sysenter DoS while using
      non-canonical addresses by untrusted PV guests. (closes: #677221)
      CVE-2012-0217
      CVE-2012-0218
    - Disable Xen on CPUs affected by AMD Erratum #121. PV guests can
      cause a DoS of the host.
  * Don't fail if standard toolstacks are not available. (closes: #677244)

 -- Bastian Blank <email address hidden>  Thu, 14 Jun 2012 17:06:25 +0200

Upload details

Uploaded by:
Debian Xen Team
Uploaded to:
Sid
Original maintainer:
Debian Xen Team
Architectures:
all amd64 i386
Section:
kernel
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
xen_4.1.3~rc1+hg-20120614.a9c0a89c08f2-1.dsc 2.5 KiB ed197ef6b641f5bb23aa225a8c9c9810b66605c40ff5632ae1576455093cbb02
xen_4.1.3~rc1+hg-20120614.a9c0a89c08f2.orig-qemu.tar.gz 3.0 MiB 3f7ca8173f969d6a510f0f0ddb413c79856d679ab3892ac3f00964ca7f3d0325
xen_4.1.3~rc1+hg-20120614.a9c0a89c08f2.orig.tar.gz 6.3 MiB 492ca4a8fa11d8976ecc0293e00c09a6dcc516989816566ccda321a259cfb6b8
xen_4.1.3~rc1+hg-20120614.a9c0a89c08f2-1.debian.tar.gz 104.8 KiB be5d9d1dc5d3d91f19e94852b766fad71b7e225acfc8abcc650a8fcd2a55f9de

No changes file available.

Binary packages built by this source