-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4369-1 security@xxxxxxxxxx https://www.debian.org/security/ Moritz Muehlenhoff January 14, 2019 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : xen CVE ID : CVE-2018-19961 CVE-2018-19962 CVE-2018-19965 CVE-2018-19966 CVE-2018-19967 Multiple vulnerabilities have been discovered in the Xen hypervisor: CVE-2018-19961 / CVE-2018-19962 Paul Durrant discovered that incorrect TLB handling could result in denial of service, privilege escalation or information leaks. CVE-2018-19965 Matthew Daley discovered that incorrect handling of the INVPCID instruction could result in denial of service by PV guests. CVE-2018-19966 It was discovered that a regression in the fix to address CVE-2017-15595 could result in denial of service, privilege escalation or information leaks by a PV guest. CVE-2018-19967 It was discovered that an error in some Intel CPUs could result in denial of service by a guest instance. For the stable distribution (stretch), these problems have been fixed in version 4.8.5+shim4.10.2+xsa282-1+deb9u11. We recommend that you upgrade your xen packages. For the detailed security status of xen please refer to its security tracker page at: https://security-tracker.debian.org/tracker/xen Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlw9B/0ACgkQEMKTtsN8 TjbK0hAAiwMsUMzx2FXzY2Dz8oMN7gtDF5rfsjATmzxG0ye4g+JrpveOvfh/u4tu MOcP1x2ijDHLsPWe/fYPmFQuYFqhlXO9nitUh5POy0zvYq2DUOf0hf+Cxm0JwI0g /fpwpU6iKXM4lpEumRZ0BT04v0KAns9wCT3VpBxrwdhViD2YptwgCmitBjuSRZgu gyqUt5vZgFNFhTmDMdxqBq6FbZwtACT80gxryNLLRHB45HLCwZpiPe+ApXDlkrUs UOixVYMFmUOMz3VKypEADfmve8/0aGU9rB4jiDW0ibkmriMFV0zvRUMDB/Dpu8l6 zQ0DGpXGqENx9zdlkx6wdVsU29qSIj9M605wp+tn1Guqd2yDwqwf8nAWk6tfc6jk 1gqNHfIfeLUjxozy+qIXXsak5AacrWcFX0ysP9mtJ46/7kmT573zRKemMuOQa2MZ Jpd5WUYCCZw4ku4QGFjDSkWviNE2Kc+nK8C5hyA2oU+F6ZkjzUmc+v2L8aHMfpF+ I1eNvPkkwJAhTlc54NnBoB1S3walB5I9S5B+QNy8WgC5iRujDxrXV8ieS3gpV4ez fvRqvNlWZo6mIDRB2x0icyXRySQt7Wk7LcVdcHTvery9zJY109kUFbKZWNYbQvbB CgN1dowupU7+5PAyG8TOeIlZWJWIWq1XrNg3nfyJA9BoKyoA1qA= =JWnH -----END PGP SIGNATURE-----