[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5272-1] xen security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5272-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 06, 2022                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2022-33745 CVE-2022-33746 CVE-2022-33747 CVE-2022-33748 
                 CVE-2022-42309 CVE-2022-42310 CVE-2022-42311 CVE-2022-42312 
                 CVE-2022-42313 CVE-2022-42314 CVE-2022-42315 CVE-2022-42316 
                 CVE-2022-42317 CVE-2022-42318 CVE-2022-42319 CVE-2022-42320 
                 CVE-2022-42321 CVE-2022-42322 CVE-2022-42323 CVE-2022-42324 
                 CVE-2022-42325 CVE-2022-42326

Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in privilege escalation, denial of service or information leaks.

For the stable distribution (bullseye), these problems have been fixed in
version 4.14.5+86-g1c354767d5-1.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=tL2J
-----END PGP SIGNATURE-----


Reply to: