Bug#686966: unblock: xen/4.1.3-2
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
Please unblock xen/4.1.3-2. It includes only security fixes.
xen (4.1.3-2) unstable; urgency=medium
* Don't allow writing reserved bits in debug register.
CVE-2012-3494
* Fix error handling in interrupt assignment.
CVE-2012-3495
* Don't trigger bug messages on invalid flags.
CVE-2012-3496
* Check array bounds in interrupt assignment.
CVE-2012-3498
* Properly check bounds while setting the cursor in qemu.
CVE-2012-3515
* Disable monitor in qemu by default.
CVE-2012-4411
unblock xen/4.1.3-2
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.5-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Reply to: