Debian: DSA-4602-1: xen security update

    Date13 Jan 2020
    CategoryDebian
    173
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, guest-to-host privilege escalation or information leaks.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4602-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                       Moritz Muehlenhoff
    January 13, 2020                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : xen
    CVE ID         : CVE-2019-17349 CVE-2019-17350 CVE-2019-18420 CVE-2019-18421 
                     CVE-2019-18422 CVE-2019-18423 CVE-2019-18424 CVE-2019-18425 
                     CVE-2019-19577 CVE-2019-19578 CVE-2019-19579 CVE-2019-19580 
                     CVE-2019-19581 CVE-2019-19582 CVE-2019-19583 CVE-2018-12207
                     CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
                     CVE-2019-11135 CVE-2019-17348 CVE-2019-17347 CVE-2019-17346
                     CVE-2019-17345 CVE-2019-17344 CVE-2019-17343 CVE-2019-17342
                     CVE-2019-17341 CVE-2019-17340
    
    Multiple vulnerabilities have been discovered in the Xen hypervisor, which
    could result in denial of service, guest-to-host privilege escalation or
    information leaks.
    
    In addition this update provides mitigations for the "TSX Asynchronous Abort"
    speculative side channel attack. For additional information please refer to
    https://xenbits.xen.org/xsa/advisory-305.html
    
    For the oldstable distribution (stretch), these problems have been fixed
    in version 4.8.5.final+shim4.10.4-1+deb9u12. Note that this will be the
    last security update for Xen in the oldstable distribution; upstream
    support for the 4.8.x branch ended by the end of December 2019. If you
    rely on security support for your Xen installation an update to the
    stable distribution (buster) is recommended.
    
    For the stable distribution (buster), these problems have been fixed in
    version 4.11.3+24-g14b62ab3e5-1~deb10u1.
    
    We recommend that you upgrade your xen packages.
    
    For the detailed security status of xen please refer to
    its security tracker page at:
    https://security-tracker.debian.org/tracker/xen
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"81","type":"x","order":"1","pct":56.25,"resources":[]},{"id":"88","title":"Should be more technical","votes":"21","type":"x","order":"2","pct":14.58,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"42","type":"x","order":"3","pct":29.17,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.