This bug was fixed in the package xen - 4.4.2-0ubuntu0.14.04.1 --------------- xen (4.4.2-0ubuntu0.14.04.1) trusty; urgency=low
* Updating to lastest upstream stable release 4.4.2 (LP: #1476666) - Replacing the following security changes by upstream versions: * CVE-2014-5146, CVE-2014-5149 / XSA-97, CVE-2014-3969, CVE-2015-2290 / XSA-98 (additional fix), CVE-2014-7154 / XSA-104, CVE-2014-7155 / XSA-105, CVE-2014-7156 / XSA-106, CVE-2014-6268 / XSA-107, CVE-2014-7188 / XSA-108, CVE-2014-8594 / XSA-109, CVE-2014-8595 / XSA-110, CVE-2014-8866 / XSA-111, CVE-2014-8867 / XSA-112, CVE-2014-9030 / XSA-113, CVE-2014-9065, CVE-2014-9066 / XSA-114, CVE-2015-0361 / XSA-116, CVE-2015-1563 / XSA-118, CVE-2015-2152 / XSA-119, CVE-2015-2044 / XSA-121, CVE-2015-2045 / XSA-122, CVE-2015-2151 / XSA-123 * Refreshed d/p/version.patch to fix some fuzz when applying. No functional change. -- Stefan Bader <stefan.ba...@canonical.com> Mon, 20 Jul 2015 11:34:38 +0200 ** Changed in: xen (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3969 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-5146 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-5149 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-6268 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7154 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7155 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7156 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-7188 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8594 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8595 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8866 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8867 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9030 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9065 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-9066 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-0361 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-1563 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2044 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2045 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2151 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2152 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2290 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1476666 Title: [MRE] Rebase Xen-4.4 to upstream stable 4.4.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1476666/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs