what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3633-1

Debian Security Advisory 3633-1
Posted Jul 28, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3633-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2015-8338, CVE-2016-4480, CVE-2016-4962, CVE-2016-5242, CVE-2016-6258
SHA-256 | 69e2b39b3913e68cc3897dadfc8422de8be200cf50452bcb270d6b48048d7d24

Debian Security Advisory 3633-1

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3633-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
July 27, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
CVE ID : CVE-2015-8338 CVE-2016-4480 CVE-2016-4962 CVE-2016-5242
CVE-2016-6258

Multiple vulnerabilities have been discovered in the Xen hypervisor. The
Common Vulnerabilities and Exposures project identifies the following
problems:

CVE-2015-8338

Julien Grall discovered that Xen on ARM was susceptible to denial
of service via long running memory operations.

CVE-2016-4480

Jan Beulich discovered that incorrect page table handling could
result in privilege escalation inside a Xen guest instance.

CVE-2016-4962

Wei Liu discovered multiple cases of missing input sanitising in
libxl which could result in denial of service.

CVE-2016-5242

Aaron Cornelius discovered that incorrect resource handling on
ARM systems could result in denial of service.

CVE-2016-6258

Jeremie Boutoille discovered that incorrect pagetable handling in
PV instances could result in guest to host privilege escalation.

For the stable distribution (jessie), these problems have been fixed in
version 4.4.1-9+deb8u6.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=e12B
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close