Amazon will/have patched hosts.

For our guests we should update as part of the netrounds upgrade next week.

On Wed, Dec 9, 2015 at 9:43 PM, Moritz Muehlenhoff <j...@debian.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> - -------------------------------------------------------------------------
> Debian Security Advisory DSA-3414-1                   secur...@debian.org
> https://www.debian.org/security/                       Moritz Muehlenhoff
> December 09, 2015                     https://www.debian.org/security/faq
> - -------------------------------------------------------------------------
>
> Package        : xen
> CVE ID         : CVE-2015-3259 CVE-2015-3340 CVE-2015-5307 CVE-2015-6654
>                  CVE-2015-7311 CVE-2015-7812 CVE-2015-7813 CVE-2015-7814
>                  CVE-2015-7969 CVE-2015-7970 CVE-2015-7971 CVE-2015-7972
>                  CVE-2015-8104
>
> Multiple security issues have been found in the Xen virtualisation
> solution, which may result in denial of service or information
> disclosure.
>
> For the oldstable distribution (wheezy), an update will be provided
> later.
>
> For the stable distribution (jessie), these problems have been fixed in
> version 4.4.1-9+deb8u3.
>
> For the unstable distribution (sid), these problems will be fixed soon.
>
> We recommend that you upgrade your xen packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJWaJIXAAoJEBDCk7bDfE42S90P/3px90Ze6eFrTI6CT6a5q7rh
> /RV36XemP9n0I7BIo+QLeLnUVBSwFuOuqqIv7zeo+l3zkb40c+ledwdwMsQ/bchY
> 7g+ugwHI677qMJ5U29Xsl4DANqBHv1YUpMrraRxejHHKJLP8D5qt2vvG7jCTJj3S
> rWQyqKhvr6ngMSmORLZ9buwVVsaQuiBr8Ngz7TI9V1EiirIv1vAQ88YTBoYICxv2
> z1KSEvJCPSba4g7RYir2Dr6hQCBSXt8q7jZLa8tBlmkhJv3d+BEf3TR53Gpvlnn3
> 4I+Vl4+zxzO84cos4t3po5FXSIKsSFQnjFNQ9b7Uym4T/KdTP8b3FViRww/d0w7r
> PtVldqDFMIeUp9goguCynCRspduoFPHYqGlPwdolurNZ+5FhO3nrzYv1kIwXY4oj
> nk/wv5hEpWXiZseO92jXX2LydVDMURCBDRkyANB4sISb8y3kOUjnWYa48pzKHIl2
> +go5lQjeJswlY/OQxLJ74Kk+XIOubIJyh2vN26SqbOkELS67EGXNJfLW/uGsvMqP
> buhsvYJLhM9SxAXwtbf9ld7/58/XlKPyGMY8M/BFpVdii5JT9AgORMzl06/Vxk2M
> mvuUmJW8jyLvi0pB8bYGcByFrfxY58/wAEgiw/Y+71QjBVAqi6Lu1pOzxW0o8hz4
> qm62jLluGkmq/dkmKDKz
> =xwRJ
> -----END PGP SIGNATURE-----
>
>

Reply via email to