-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5117-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff
April 10, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xen
CVE ID : CVE-2022-23033 CVE-2022-23034 CVE-2022-23035 CVE-2022-26356
CVE-2022-26357 CVE-2022-26358 CVE-2022-26359 CVE-2022-26360
CVE-2022-26361
Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in privilege escalation, denial of service or information leaks.
For the stable distribution (bullseye), these problems have been fixed in version 4.14.4+74-gd7b22226b5-1.
We recommend that you upgrade your xen packages.
For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmJTG7IACgkQEMKTtsN8 Tjag1xAAkiyruupHA/GN+VkD2a5HlN+R2KD7oCX48d/ahHagLWnvwvohLui5cDKD 2lv71NzZiWgG58W3TVIJO9puhI/82sKFComnDKkTjyYoWLAF/97Bcx5cT0/gSZUN xXCffViOGj2XMbboaKVo4B2oBTV4V0aFCnO4i+0PP4WYQ7vU6x4M46zxY5wUiyOb RbO+Aw/ZvS8VE8y1y1sqyylSg4KYCdemRKsRykrxyhY2ZaeeF1eNv2cib0XWcAxm MFp7x5DPJMAyFQ6wR1vYm117TjacMR4AFaLYdrQlM25mt65ErTepCNATJh1YLozw bNap7hcjSU86PSPO/WSYDGbG+2CgmkWPoyUE/TmJhZm1Cs9GQKPX+9y7gFh2cK8s EYsxz8eYo9yEyc8ZqTyjSRES/pRIQpv1FZ043xL5paMo7T8bXmrNTN6LNufUC+Ij a7VuMJGdX3oYbxipsgtT1n12ZH/5r5rXEq1tkvVFTISTUIS8xMctcFpq9fsnkh1o FtYEHkyDk51wBBKPADmyvHN2VcI/lNYflEwYD1LjskuPAuh5fSVnEgFDlpHN+hCk Q+smytgkQEF278JjGZBnpiRHgA7KuZON8UxRc9JonwkQqZqmNWBMTebFaFdYFspr UAGAls/mHVomu5hJS4f6Cy4GlMvvYRm2q1lte1KzQs7Vs1Vfw6w=
=RXKC
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)