it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 3633-1] xen security update
- Date: Wed, 27 Jul 2016 23:36:24 +0200
- List-archive: https://lists.debian.org/msgid-search/20160727213624.GA19548 AT pisco.westfalen.local
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-return-path: <jmm AT inutil.org>
- Priority: urgent
- Resent-date: Wed, 27 Jul 2016 21:36:45 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <kzjzvaPhZsD.A.nvB.tlSmXB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3633-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 27, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xen
CVE ID : CVE-2015-8338 CVE-2016-4480 CVE-2016-4962 CVE-2016-5242
CVE-2016-6258
Multiple vulnerabilities have been discovered in the Xen hypervisor. The
Common Vulnerabilities and Exposures project identifies the following
problems:
CVE-2015-8338
Julien Grall discovered that Xen on ARM was susceptible to denial
of service via long running memory operations.
CVE-2016-4480
Jan Beulich discovered that incorrect page table handling could
result in privilege escalation inside a Xen guest instance.
CVE-2016-4962
Wei Liu discovered multiple cases of missing input sanitising in
libxl which could result in denial of service.
CVE-2016-5242
Aaron Cornelius discovered that incorrect resource handling on
ARM systems could result in denial of service.
CVE-2016-6258
Jeremie Boutoille discovered that incorrect pagetable handling in
PV instances could result in guest to host privilege escalation.
For the stable distribution (jessie), these problems have been fixed in
version 4.4.1-9+deb8u6.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your xen packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=e12B
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 3633-1] xen security update, Moritz Muehlenhoff, 27.07.2016
Archiv bereitgestellt durch MHonArc 2.6.19.