[SECURITY] [DLA 907-1] xen security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Package : xen
Version : 4.1.6.lts1-6
CVE ID : CVE-2017-7228
Debian Bug : #859560
CVE-2017-7228 (XSA-212)
An insufficient check on XENMEM_exchange may allow PV guests to access
all of system memory.
For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-6.
We recommend that you upgrade your xen packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- --
-------------- Ola Lundqvist --------------------
/ opal@debian.org GPG fingerprint \
| ola@inguza.com 22F2 32C6 B1E0 F4BF 2B26 |
| http://inguza.com/ 0A6A 5E90 DCFA 9426 876F /
-------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=fJ7P
-----END PGP SIGNATURE-----
Reply to: