Debian 10261 Published by

A xen security update has been released for Debian



- -------------------------------------------------------------------------
Debian Security Advisory DSA-3140-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 27, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xen
CVE ID : CVE-2014-8594 CVE-2014-8595 CVE-2014-8866 CVE-2014-8867
CVE-2014-9030

Multiple security issues have been discovered in the Xen virtualisation
solution which may result in denial of service, information disclosure
or privilege escalation.

CVE-2014-8594

Roger Pau Monne and Jan Beulich discovered that incomplete
restrictions on MMU update hypercalls may result in privilege
escalation.

CVE-2014-8595

Jan Beulich discovered that missing privilege level checks in the
x86 emulation of far branches may result in privilege escalation.

CVE-2014-8866

Jan Beulich discovered that an error in compatibility mode hypercall
argument translation may result in denial of service.

CVE-2014-8867

Jan Beulich discovered that an insufficient restriction in
acceleration support for the "REP MOVS" instruction may result in
denial of service.

CVE-2014-9030

Andrew Cooper discovered a page reference leak in MMU_MACHPHYS_UPDATE
handling, resulting in denial of service.

For the stable distribution (wheezy), these problems have been fixed in
version 4.1.4-3+deb7u4.

For the upcoming stable distribution (jessie), these problems have been
fixed in version 4.4.1-4.

For the unstable distribution (sid), these problems have been fixed in
version 4.4.1-4.

We recommend that you upgrade your xen packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
  DSA 3140-1: xen security update