[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 907-1] xen security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : xen
Version        : 4.1.6.lts1-6
CVE ID         : CVE-2017-7228
Debian Bug     : #859560

CVE-2017-7228 (XSA-212)

  An insufficient check on XENMEM_exchange may allow PV guests to access
  all of system memory.

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-6.

We recommend that you upgrade your xen packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 -------------- Ola Lundqvist --------------------
/  opal@debian.org       GPG fingerprint          \
|  ola@inguza.com        22F2 32C6 B1E0 F4BF 2B26 |
|  http://inguza.com/    0A6A 5E90 DCFA 9426 876F /
 -------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBCAAGBQJY+nMwAAoJEF6Q3PqUJodv7nIP/2CIMprXXrpN6GqHeXGecUV0
y3aU93qbGZHWEvO8cDl2NqU4uFAfeQp7NN4IlwwGsmVmSzuwoeQlBNGA7kZiflPZ
rEUzGghtahSj9ZUPywgCZ+lqYEhVXIvqK5aVlt7G1YApbqM+QUjszfo5D2kmresh
47ZOVQNDKWED9VjQ6nq4J6tiqlXuLpbdGOeLNrOxqxnMzrpGzjpHXhLNWZjL9w77
3TTiXzv6DjPU4tMYxxjfNWecXm+UO6nBnw8+XEM49TT4VCVmQMhiVeTpzc72wKti
eSam3o/rR7bQmmvM0VYrtQuQiUJykw9BccIp2obHbe/r3n6UMJ/dyaGl6ke5lxso
D1XzeFMkn66CaAGEcGVRrB7cLQ7gIPzkkQZNQx46v3HavuYkDH2MtQiQdnAK6JN2
1QD0fxDEb2QmoEfj1SRygWEbhtiy3mewVXgHHsSjarqesoa4sCsvPUXO7NLHH2aI
tPgOyPXsVJUdyedCnTl5IClZOMRKaP2/+qHgSx//P48TSxa5gzc/6ttWRHkSHPYv
yStgtlgi9ZWvuCIvub4ZPdc0SvBrQIvHNILosIlMyHpWjW8zG7k9AcivCfGt9Esj
Hl9CfU/GWY9Aw0apO4UGmKHuUtxI0RGdYwljlMxgR8qMIFihQEM8WjHmU8+ADtCy
SCoT9Qlcfbe2/ueCZYdt
=fJ7P
-----END PGP SIGNATURE-----


Reply to: