Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: DSA-3633-1
Distribution: Debian
Plattformen: Debian jessie
Datum: Do, 28. Juli 2016, 08:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3633-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 27, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
CVE ID : CVE-2015-8338 CVE-2016-4480 CVE-2016-4962 CVE-2016-5242
CVE-2016-6258

Multiple vulnerabilities have been discovered in the Xen hypervisor. The
Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2015-8338

Julien Grall discovered that Xen on ARM was susceptible to denial
of service via long running memory operations.

CVE-2016-4480

Jan Beulich discovered that incorrect page table handling could
result in privilege escalation inside a Xen guest instance.

CVE-2016-4962

Wei Liu discovered multiple cases of missing input sanitising in
libxl which could result in denial of service.

CVE-2016-5242

Aaron Cornelius discovered that incorrect resource handling on
ARM systems could result in denial of service.

CVE-2016-6258

Jeremie Boutoille discovered that incorrect pagetable handling in
PV instances could result in guest to host privilege escalation.

For the stable distribution (jessie), these problems have been fixed in
version 4.4.1-9+deb8u6.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJXmSiLAAoJEBDCk7bDfE42d08P/2R+H2xSyWzPeVo4d64nlknJ
P90iN3GJGxjlRq3oRERc/iZe2QfT1gsENM1BIpAsD+A9ji3ZJqyi795kdq6kuBch
ztRTJ7OLFpBWkq0AxA2YKNMinv0u8LOYmrcChIp+AGZaU6GQa+ksCZsgDzFtSp4Q
NAw0MCw+vJ81uvv3TFHkJNkqSjLheBenhB3OlpDU10GNwOdeOBsm+gO5PLpCmn9t
P4yp6/km5EWkQDzgamRte3Gd2R7w9MYC7L3C5FbHbV6PdXTKKnTAzJrt4PIMEs8u
G0HyGnuNVyh0qKxsnbdFWBu/7xlbQnIqppyeF80EnOk0dUNJrk8AyJBKiuYzUtsQ
A4Itv60pp84VpRq6GtcaoBNZ9jckHtpkaoukTiYCNBD3Y56L9Q248xUxXiZii9r9
nU2VtIGFW8+36pKz7sXpes1SkzGMOgNgCRETCDR88M1eYXMaDhDT8Fbq2wdGU7zu
VcC8leZy5yoIwPOGx15w6Pvd4oPlT5VH/0lDYKIMQ6iMqphf5GlwL1F/Ow0LyUS3
xzzAbX7RliQgL/+q0YvpBB6jfOUNjLz730gUu+AJu327PL0u+a1NBDQTIXM631tC
Ktu8H5Vdmg6PoF2LbuIj9bUDDRzFEYmWkG6MhXzTeRX9psl43HuIgOvLpdDk6pee
afYWZKXJ2545KKIUZBTt
=e12B
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung