Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5272-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5272-1 - Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in privilege escalation, denial of service or information leaks.
- systems | linux[9], debian[10]
- advisories | CVE-2022-33745[11], CVE-2022-33746[12], CVE-2022-33747[13], CVE-2022-33748[14], CVE-2022-42309[15], CVE-2022-42310[16], CVE-2022-42311[17], CVE-2022-42312[18], CVE-2022-42313[19], CVE-2022-42314[20], CVE-2022-42315[21], CVE-2022-42316[22], CVE-2022-42317[23], CVE-2022-42318[24]
- SHA-256 |
425a48f085cf69bff81f19c64877e7708b1282a50c4f464feb0623f801fa60ed
- Download[25] | Favorite[26] | View[27]
Change Mirror[28] Download[29]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5272-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Moritz Muehlenhoff
November 06, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : xen
CVE ID : CVE-2022-33745 CVE-2022-33746 CVE-2022-33747 CVE-2022-33748
CVE-2022-42309 CVE-2022-42310 CVE-2022-42311 CVE-2022-42312
CVE-2022-42313 CVE-2022-42314 CVE-2022-42315 CVE-2022-42316
CVE-2022-42317 CVE-2022-42318 CVE-2022-42319 CVE-2022-42320
CVE-2022-42321 CVE-2022-42322 CVE-2022-42323 CVE-2022-42324
CVE-2022-42325 CVE-2022-42326
Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in privilege escalation, denial of service or information leaks.
For the stable distribution (bullseye), these problems have been fixed in
version 4.14.5+86-g1c354767d5-1.
We recommend that you upgrade your xen packages.
For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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tL2J
-----END PGP SIGNATURE-----
File Tags
- ActiveX[34] (932)
- Advisory[35] (79,334)
- Arbitrary[36] (15,604)
- BBS[37] (2,859)
- Bypass[38] (1,609)
- CGI[39] (1,015)
- Code Execution[40] (6,875)
- Conference[41] (672)
- Cracker[42] (840)
- CSRF[43] (3,282)
- DoS[44] (22,463)
- Encryption[45] (2,348)
- Exploit[46] (50,239)
- File Inclusion[47] (4,161)
- File Upload[48] (945)
- Firewall[49] (821)
- Info Disclosure[50] (2,649)
- Intrusion Detection[51] (863)
- Java[52] (2,884)
- JavaScript[53] (814)
- Kernel[54] (6,233)
- Local[55] (14,156)
- Magazine[56] (586)
- Overflow[57] (12,350)
- Perl[58] (1,417)
- PHP[59] (5,078)
- Proof of Concept[60] (2,287)
- Protocol[61] (3,413)
- Python[62] (1,441)
- Remote[63] (29,972)
- Root[64] (3,493)
- Ruby[65] (594)
- Scanner[66] (1,631)
- Security Tool[67] (7,760)
- Shell[68] (3,097)
- Shellcode[69] (1,204)
- Sniffer[70] (885)
- Spoof[71] (2,160)
- SQL Injection[72] (16,082)
- TCP[73] (2,375)
- Trojan[74] (682)
- UDP[75] (874)
- Virus[76] (660)
- Vulnerability[77] (31,030)
- Web[78] (9,296)
- Whitepaper[79] (3,724)
- x86[80] (944)
- XSS[81] (17,465)
- Other[82]
File Archives
- November 2022[83]
- October 2022[84]
- September 2022[85]
- August 2022[86]
- July 2022[87]
- June 2022[88]
- May 2022[89]
- April 2022[90]
- March 2022[91]
- February 2022[92]
- January 2022[93]
- December 2021[94]
- Older[95]
Systems
- AIX[96] (426)
- Apple[97] (1,923)
- BSD[98] (369)
- CentOS[99] (55)
- Cisco[100] (1,916)
- Debian[101] (6,604)
- Fedora[102] (1,690)
- FreeBSD[103] (1,242)
- Gentoo[104] (4,262)
- HPUX[105] (878)
- iOS[106] (329)
- iPhone[107] (108)
- IRIX[108] (220)
- Juniper[109] (67)
- Linux[110] (43,899)
- Mac OS X[111] (684)
- Mandriva[112] (3,105)
- NetBSD[113] (255)
- OpenBSD[114] (479)
- RedHat[115] (12,188)
- Slackware[116] (941)
- Solaris[117] (1,607)
- SUSE[118] (1,444)
- Ubuntu[119] (8,106)
- UNIX[120] (9,140)
- UnixWare[121] (185)
- Windows[122] (6,492)
- Other[123]

Read more https://packetstormsecurity.com/files/169733/dsa-5272-1.txt