xen 4.4.1-9+deb8u9 source package in Debian

Changelog

xen (4.4.1-9+deb8u9) jessie-security; urgency=medium

  Security updates:
  * XSA-200: Closes:#848081: CVE-2016-9932: x86 emulation operand size
  * XSA-202: CVE-2016-10024: x86 PV guests may be able to mask interrupts
  * XSA-204: CVE-2016-10013: x86: Mishandling of SYSCALL singlestep
  * XSA-212: Closes:#859560: CVE-2017-7228: x86: broken memory_exchange()
  * XSA-213: Closes:#861659: 64bit PV guest breakout
  * XSA-214: Closes:#861660: grant transfer PV privilege escalation
  * XSA-215: Closes:#861662: memory corruption via failsafe callback

 -- Ian Jackson <email address hidden>  Mon, 08 May 2017 15:04:37 +0100

Upload details

Uploaded by:
Debian Xen Team
Uploaded to:
Jessie
Original maintainer:
Debian Xen Team
Architectures:
amd64 arm64 armhf i386 all
Section:
kernel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
xen_4.4.1-9+deb8u9.dsc 2.6 KiB b04bcb8548088c76f0c397d3a9399ced1725f8ac0d728342df05f32be2d876cf
xen_4.4.1.orig.tar.xz 3.6 MiB c51b9f10047779d76b9f9900e2f626008d07ffe9a35f6221d703a542e599a8cb
xen_4.4.1-9+deb8u9.debian.tar.xz 114.9 KiB 189427cbb2b40974123eb3492149d9d9509c90aa9cac789a91c7f76b3364b24b

No changes file available.

Binary packages built by this source