Hash: SHA256

Package        : xen
Version        : 4.1.6.lts1-6
CVE ID         : CVE-2017-7228
Debian Bug     : #859560

CVE-2017-7228 (XSA-212)

  An insufficient check on XENMEM_exchange may allow PV guests to access
  all of system memory.

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-6.

We recommend that you upgrade your xen packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
 -------------- Ola Lundqvist --------------------
/  opal@debian.org       GPG fingerprint          \
|  ola@inguza.com        22F2 32C6 B1E0 F4BF 2B26 |
|  https://inguza.com/    0A6A 5E90 DCFA 9426 876F /
 -------------------------------------------------

Debian LTS: DLA-907-1: xen security update

April 21, 2017
CVE-2017-7228 (XSA-212) An insufficient check on XENMEM_exchange may allow PV guests to access all of system memory

Summary

An insufficient check on XENMEM_exchange may allow PV guests to access
all of system memory.

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-6.

We recommend that you upgrade your xen packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- --
-------------- Ola Lundqvist --------------------
/ opal@debian.org GPG fingerprint \
| ola@inguza.com 22F2 32C6 B1E0 F4BF 2B26 |
| https://inguza.com/ 0A6A 5E90 DCFA 9426 876F /
-------------------------------------------------


Severity
Package : xen
Version : 4.1.6.lts1-6
CVE ID : CVE-2017-7228
Debian Bug : #859560

Related News