drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Xen
Name: |
Mehrere Probleme in Xen |
|
ID: |
DSA-3140-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian wheezy |
|
Datum: |
Di, 27. Januar 2015, 15:35 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030 |
|
Applikationen: |
Xen |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3140-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 27, 2015 http://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : xen CVE ID : CVE-2014-8594 CVE-2014-8595 CVE-2014-8866 CVE-2014-8867 CVE-2014-9030
Multiple security issues have been discovered in the Xen virtualisation solution which may result in denial of service, information disclosure or privilege escalation.
CVE-2014-8594
Roger Pau Monne and Jan Beulich discovered that incomplete restrictions on MMU update hypercalls may result in privilege escalation.
CVE-2014-8595
Jan Beulich discovered that missing privilege level checks in the x86 emulation of far branches may result in privilege escalation.
CVE-2014-8866
Jan Beulich discovered that an error in compatibility mode hypercall argument translation may result in denial of service.
CVE-2014-8867
Jan Beulich discovered that an insufficient restriction in acceleration support for the "REP MOVS" instruction may result in denial of service.
CVE-2014-9030
Andrew Cooper discovered a page reference leak in MMU_MACHPHYS_UPDATE handling, resulting in denial of service.
For the stable distribution (wheezy), these problems have been fixed in version 4.1.4-3+deb7u4.
For the upcoming stable distribution (jessie), these problems have been fixed in version 4.4.1-4.
For the unstable distribution (sid), these problems have been fixed in version 4.4.1-4.
We recommend that you upgrade your xen packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJUx233AAoJEBDCk7bDfE427SwP/0vk4BEClNotQKKEEJduVMP2 zb8b++/f4ZocQgezJ9/oew8UGgd9Klq6XcIh5BVaQi6PD70sw4uWX03820PCs88X ywRCrTHSXPfPlwOG6dY8nZ1oOUItP64N03j+nugI27GNPgmJpu7xgewmY+c8vZpF r5sEjhINwgDmHMCgb8bCFKQ/7UDUcE2MZJVF++oWuKusvCFo57cG/pakRwF9XFsw Aw24obp7vySzOs5mThid3asOHcNqUYZml1YTI6E3nxL+bL9K11KFZzl98a75Q4YI HJJuqJk3H5CO+GCSq2Dl6NzHBWA7hCFepaKilhj/Ao6vnAoqbkFjklwczofXM6fq wQ1586wFp6ZTFtawn66DKoeT3CQp+OhOce5N4X3num6Ev32yaK8Rox7CF9xena6Q ubEEW2pKKblwFJRVm9wyBo1RQvPUyMUsvbq+DNX2GBJ1+wOzIMqm0K9G7+nFlGI8 Z7u3RIgLTolzgFN0NR6B4A03/0kOYKNlrFuJB8wXerkwFsK/X4wX/f2dRJRleiNX JzDvWYCfcjWTrRjcvGdotNELdDoz+eePFuRzp7Os4SdJE2dxdWBsmvqU/NXc8pBL d1FtjPArM8IndL0Mf6+oPz3uAAFPjbaeTRQk/uhX7HPVN9gLDqyLWGuCsaf+seMu 9IwVAOzHz+HymOHT02af =5heI -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/20150127105345.GA5712@pisco.westfalen.local
|
|
|
|