lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160317215203.GA7650@pisco.westfalen.local>
Date: Thu, 17 Mar 2016 22:52:03 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3519-1] xen security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3519-1                   security@...ian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 17, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2015-8339 CVE-2015-8340 CVE-2015-8341 CVE-2015-8550 
                 CVE-2015-8555 CVE-2016-1570 CVE-2016-1571 CVE-2016-2270
                 CVE-2016-2271

Multiple security issues have been found in the Xen virtualisation
solution, which may result in denial of service or information disclosure.
           
The oldstable distribution (wheezy) will be updated in a separate DSA.

For the stable distribution (jessie), these problems have been fixed in
version 4.4.1-9+deb8u4.

For the unstable distribution (sid), these problems will be fixed soon.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=mfoX
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ