-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3633-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff July 27, 2016 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xen CVE ID : CVE-2015-8338 CVE-2016-4480 CVE-2016-4962 CVE-2016-5242 CVE-2016-6258 Multiple vulnerabilities have been discovered in the Xen hypervisor. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-8338 Julien Grall discovered that Xen on ARM was susceptible to denial of service via long running memory operations. CVE-2016-4480 Jan Beulich discovered that incorrect page table handling could result in privilege escalation inside a Xen guest instance. CVE-2016-4962 Wei Liu discovered multiple cases of missing input sanitising in libxl which could result in denial of service. CVE-2016-5242 Aaron Cornelius discovered that incorrect resource handling on ARM systems could result in denial of service. CVE-2016-6258 Jeremie Boutoille discovered that incorrect pagetable handling in PV instances could result in guest to host privilege escalation. For the stable distribution (jessie), these problems have been fixed in version 4.4.1-9+deb8u6. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your xen packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJXmSiLAAoJEBDCk7bDfE42d08P/2R+H2xSyWzPeVo4d64nlknJ P90iN3GJGxjlRq3oRERc/iZe2QfT1gsENM1BIpAsD+A9ji3ZJqyi795kdq6kuBch ztRTJ7OLFpBWkq0AxA2YKNMinv0u8LOYmrcChIp+AGZaU6GQa+ksCZsgDzFtSp4Q NAw0MCw+vJ81uvv3TFHkJNkqSjLheBenhB3OlpDU10GNwOdeOBsm+gO5PLpCmn9t P4yp6/km5EWkQDzgamRte3Gd2R7w9MYC7L3C5FbHbV6PdXTKKnTAzJrt4PIMEs8u G0HyGnuNVyh0qKxsnbdFWBu/7xlbQnIqppyeF80EnOk0dUNJrk8AyJBKiuYzUtsQ A4Itv60pp84VpRq6GtcaoBNZ9jckHtpkaoukTiYCNBD3Y56L9Q248xUxXiZii9r9 nU2VtIGFW8+36pKz7sXpes1SkzGMOgNgCRETCDR88M1eYXMaDhDT8Fbq2wdGU7zu VcC8leZy5yoIwPOGx15w6Pvd4oPlT5VH/0lDYKIMQ6iMqphf5GlwL1F/Ow0LyUS3 xzzAbX7RliQgL/+q0YvpBB6jfOUNjLz730gUu+AJu327PL0u+a1NBDQTIXM631tC Ktu8H5Vdmg6PoF2LbuIj9bUDDRzFEYmWkG6MhXzTeRX9psl43HuIgOvLpdDk6pee afYWZKXJ2545KKIUZBTt =e12B -----END PGP SIGNATURE-----