exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4210-1

Debian Security Advisory 4210-1
Posted May 25, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4210-1 - This update provides mitigations for the Spectre v4 variant in x86-based micro processors. On Intel CPUs this requires updated microcode which is currently not released publicly (but your hardware vendor may have issued an update).

tags | advisory, x86
systems | linux, debian
advisories | CVE-2018-3639
SHA-256 | e7dea1a2627fbb19e4616f6132a1e36513ef8af16446a94b6535d852641ce04e

Debian Security Advisory 4210-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4210-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 25, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
CVE ID : CVE-2018-3639

This update provides mitigations for the Spectre v4 variant in x86-based
micro processors. On Intel CPUs this requires updated microcode which
is currently not released publicly (but your hardware vendor may have
issued an update). For servers with AMD CPUs no microcode update is
needed, please refer to https://xenbits.xen.org/xsa/advisory-263.html
for further information.

For the stable distribution (stretch), this problem has been fixed in
version 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=fWvA
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close