-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2364
                            xen security update
                               13 July 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xen
Publisher:         Debian
Operating System:  Debian GNU/Linux 10
Impact/Access:     Denial of Service        -- Existing Account
                   Increased Privileges     -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-15567 CVE-2020-15566 CVE-2020-15565
                   CVE-2020-15564 CVE-2020-15563 CVE-2020-11743
                   CVE-2020-11742 CVE-2020-11741 CVE-2020-11740
                   CVE-2020-11739  

Reference:         ESB-2020.2320
                   ESB-2020.1575
                   ESB-2020.1463

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4723

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4723-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
July 12, 2020                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2020-11739 CVE-2020-11740 CVE-2020-11741 CVE-2020-11742 
                 CVE-2020-11743 CVE-2020-15563 CVE-2020-15564 CVE-2020-15565 
                 CVE-2020-15566 CVE-2020-15567

Multiple vulnerabilities have been discovered in the Xen hypervisor,
which could result in denial of service, guest-to-host privilege
escalation or information leaks.
      
For the stable distribution (buster), these problems have been fixed in
version 4.11.4+24-gddaaccbbab-1~deb10u1.

We recommend that you upgrade your xen packages.

For the detailed security status of xen please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xen

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=tfm7
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=83iV
-----END PGP SIGNATURE-----