DSA-4602-1 xen -- xenID: oval:org.secpod.oval:def:604670 | Date: (C)2020-02-16 (M)2024-04-17 |
Class: PATCH | Family: unix |
Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, guest-to-host privilege escalation or information leaks. In addition this update provides mitigations for the quot;TSX Asynchronous Abortquot; speculative side channel attack. For additional information please refer to https://xenbits.xen.org/xsa/advisory-305.html
Platform: |
Debian 10.x |
Debian 9.x |
Product: |
libxenmisc4.11 |
xen-hypervisor-4.11-amd64 |
libxenevtchn1 |
libxencall1 |
xen-hypervisor-common |
libxengnttab1 |
libxentoollog1 |
libxendevicemodel1 |
xen-system-armhf |
xen-utils-common |
libxenforeignmemory1 |
xen-system-arm64 |
xen-doc |
xen-hypervisor-4.11-armhf |
xen-system-amd64 |
xen-hypervisor-4.11-arm64 |
xen-utils-4.11 |
libxenstore3.0 |
libxentoolcore1 |
libxen-dev |
xenstore-utils |
xen-hypervisor-4.8-amd64 |
xen-hypervisor-4.8-arm64 |
xen-hypervisor-4.8-armhf |
xen-utils-4.8 |
libxen-4.8 |