Hash: SHA512
Package : xen
Version : 4.1.6.lts1-9
CVE ID : CVE-2017-10912 CVE-2017-10913 CVE-2017-10914 CVE-2017-10915
CVE-2017-10918 CVE-2017-10920 CVE-2017-10921 CVE-2017-10922
CVE-2017-12135 CVE-2017-12137 CVE-2017-12855 CVE-2017-14316
CVE-2017-14317 CVE-2017-14318 CVE-2017-14319
Multiple vulnerabilities have been discovered in the Xen hypervisor:
CVE-2017-10912
Jann Horn discovered that incorrectly handling of page transfers might
result in privilege escalation.
CVE-2017-10913 / CVE-2017-10914
Jann Horn discovered that race conditions in grant handling might
result in information leaks or privilege escalation.
CVE-2017-10915
Andrew Cooper discovered that incorrect reference counting with
shadow paging might result in privilege escalation.
CVE-2017-10918
Julien Grall discovered that incorrect error handling in
physical-to-machine memory mappings may result in privilege
escalation, denial of service or an information leak.
CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922
Jan Beulich discovered multiple places where reference
counting on grant table operations was incorrect, resulting
in potential privilege escalation
CVE-2017-12135
Jan Beulich found multiple problems in the handling of
transitive grants which could result in denial of service
and potentially privilege escalation.
CVE-2017-12137
Andrew Cooper discovered that incorrect validation of
grants may result in privilege escalation.
CVE-2017-12855
Jan Beulich discovered that incorrect grant status handling, thus
incorrectly informing the guest that the grant is no longer in use.
CVE-2017-14316
Matthew Daley discovered that the NUMA node parameter wasn't
verified which which may result in privilege escalation.
CVE-2017-14317
Eric Chanudet discovered that a race conditions in cxenstored might
result in information leaks or privilege escalation.
CVE-2017-14318
Matthew Daley discovered that incorrect validation of
grants may result in a denial of service.
CVE-2017-14319
Andrew Cooper discovered that insufficient grant unmapping
checks may result in denial of service and privilege escalation.
For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-9.
We recommend that you upgrade your xen packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS