[SECURITY] [DSA 3633-1] xen security update

From: Moritz Muehlenhoff <jmm@debian.org>
To: bugtraq@securityfocus.com
Cc:
Subject: [SECURITY] [DSA 3633-1] xen security update
Date:


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3633-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 27, 2016                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2015-8338 CVE-2016-4480 CVE-2016-4962 CVE-2016-5242 
                 CVE-2016-6258

Multiple vulnerabilities have been discovered in the Xen hypervisor. The
Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2015-8338

    Julien Grall discovered that Xen on ARM was susceptible to denial
    of service via long running memory operations.

CVE-2016-4480

    Jan Beulich discovered that incorrect page table handling could
    result in privilege escalation inside a Xen guest instance.

CVE-2016-4962

    Wei Liu discovered multiple cases of missing input sanitising in
    libxl which could result in denial of service.

CVE-2016-5242

    Aaron Cornelius discovered that incorrect resource handling on
    ARM systems could result in denial of service.

CVE-2016-6258

    Jeremie Boutoille discovered that incorrect pagetable handling in
    PV instances could result in guest to host privilege escalation.

For the stable distribution (jessie), these problems have been fixed in
version 4.4.1-9+deb8u6.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=e12B
-----END PGP SIGNATURE-----





Copyright © 1995-2018 LinuxRocket.net. All rights reserved.