Debian LTS: DLA-1949-1: xen security update

    Date08 Oct 2019
    670
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, informations leaks or privilege escalation.
    Package        : xen
    Version        : 4.4.4lts5-0+deb8u1
    CVE ID         : CVE-2018-19961 CVE-2018-19962 CVE-2018-19966
    XSA ID         : XSA-275 XSA-280 XSA-285 XSA-287 XSA-288
    
    Multiple vulnerabilities have been discovered in the Xen hypervisor, which
    could result in denial of service, informations leaks or privilege
    escalation.
                                                                              
    For Debian 8 "Jessie", these problems have been fixed in version
    4.4.4lts5-0+deb8u1.
    
    We recommend that you upgrade your xen packages.
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"94","type":"x","order":"1","pct":79.66,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15.25,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5.08,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.