xen 4.4.1-9+deb8u9 source package in Debian
Changelog
xen (4.4.1-9+deb8u9) jessie-security; urgency=medium Security updates: * XSA-200: Closes:#848081: CVE-2016-9932: x86 emulation operand size * XSA-202: CVE-2016-10024: x86 PV guests may be able to mask interrupts * XSA-204: CVE-2016-10013: x86: Mishandling of SYSCALL singlestep * XSA-212: Closes:#859560: CVE-2017-7228: x86: broken memory_exchange() * XSA-213: Closes:#861659: 64bit PV guest breakout * XSA-214: Closes:#861660: grant transfer PV privilege escalation * XSA-215: Closes:#861662: memory corruption via failsafe callback -- Ian Jackson <email address hidden> Mon, 08 May 2017 15:04:37 +0100
Upload details
- Uploaded by:
- Debian Xen Team
- Uploaded to:
- Jessie
- Original maintainer:
- Debian Xen Team
- Architectures:
- amd64 arm64 armhf i386 all
- Section:
- kernel
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
xen_4.4.1-9+deb8u9.dsc | 2.6 KiB | b04bcb8548088c76f0c397d3a9399ced1725f8ac0d728342df05f32be2d876cf |
xen_4.4.1.orig.tar.xz | 3.6 MiB | c51b9f10047779d76b9f9900e2f626008d07ffe9a35f6221d703a542e599a8cb |
xen_4.4.1-9+deb8u9.debian.tar.xz | 114.9 KiB | 189427cbb2b40974123eb3492149d9d9509c90aa9cac789a91c7f76b3364b24b |
No changes file available.