what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5117-1

Debian Security Advisory 5117-1
Posted Apr 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5117-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2022-23033, CVE-2022-23034, CVE-2022-23035, CVE-2022-26356, CVE-2022-26357, CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361
SHA-256 | 819f8a49cd9f2ae6dc9a4768afc2e71a91e4114e4c5860d415894bcc9b37f10b

Debian Security Advisory 5117-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5117-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 10, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
CVE ID : CVE-2022-23033 CVE-2022-23034 CVE-2022-23035 CVE-2022-26356
CVE-2022-26357 CVE-2022-26358 CVE-2022-26359 CVE-2022-26360
CVE-2022-26361

Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in privilege escalation, denial of service or information leaks.

For the stable distribution (bullseye), these problems have been fixed in
version 4.14.4+74-gd7b22226b5-1.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=RXKC
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close