-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5017-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff December 05, 2021
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xen
CVE ID : CVE-2021-28704 CVE-2021-28705 CVE-2021-28706
CVE-2021-28707 CVE-2021-28708 CVE-2021-28709
Multiple vulnerabilities have been discovered in the Xen hypervisor,
which could result in privilege escalation, denial of service or
information leaks.
For the stable distribution (bullseye), these problems have been fixed in version 4.14.3+32-g9de3671772-1~deb11u1.
We recommend that you upgrade your xen packages.
For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmGso5wACgkQEMKTtsN8 TjbC+g//ev89UFG1SEtFBzTaIe/5qnnecMiN/gLaqgOAqukED6UMo6+z5smlHtHS 5a3obmPTKoCE9LactQoGNbfGHCTZ010uBmqWT5M4NgWesL6rIu5AD16fbKdAPUyq sjTW1c1wdSg2Wd03qwwLLcINCfEXOu8orBOexP/krPNVm6LuzmhDobKmZDs4d9Y/ UAnDEQOD3z1pTOESzbsOyzJ6BvobG+OzHrkKl1nhMDkoXs5G7BuszfCr6x9Jvedv PFhcMO1PThpDIypWR5JDkbQKHqj5XdGuxh3cLT3bga62lcLrSOsLac81LVWZODXf DreEGfr6QDwr7Ojonq2wI+0xa3D2oYZguIENyeC3EnDNBHFu9Gcsc3Pgd/eX4nuc qIp4IE4Ll1pCpKSSn3v2aOjze8Ac7Esg+cJWvY8NGldlPjBfYTwMGrRzmHfh4/+J oZr4XgVILY919vAqBfbJNTFg0MTVuj9wPzZCpZslBMYcz/bmSYngqDw5cWwnh9qv h+d0SG1BL/jGnnuXMPMppbFCQgpr9aHYl1jjoi2PCPsNXPZ93ImSPdH5PkAy2KiK 4tTX/EQjEBJtJZJP6s+WcjrF5h+eBqjgZrL8dYkwTfErbLbLsnyxK6IPimkm14I1 c7uqMeIOikokIjYrGKmj4rQhSEz1+LOuA+71lI23vYVmEp6wtM0=
=FGVm
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)