[SECURITY] [DLA 1132-1] xen security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : xen
Version : 4.1.6.lts1-9
CVE ID : CVE-2017-10912 CVE-2017-10913 CVE-2017-10914 CVE-2017-10915
CVE-2017-10918 CVE-2017-10920 CVE-2017-10921 CVE-2017-10922
CVE-2017-12135 CVE-2017-12137 CVE-2017-12855 CVE-2017-14316
CVE-2017-14317 CVE-2017-14318 CVE-2017-14319
Multiple vulnerabilities have been discovered in the Xen hypervisor:
CVE-2017-10912
Jann Horn discovered that incorrectly handling of page transfers might
result in privilege escalation.
CVE-2017-10913 / CVE-2017-10914
Jann Horn discovered that race conditions in grant handling might
result in information leaks or privilege escalation.
CVE-2017-10915
Andrew Cooper discovered that incorrect reference counting with
shadow paging might result in privilege escalation.
CVE-2017-10918
Julien Grall discovered that incorrect error handling in
physical-to-machine memory mappings may result in privilege
escalation, denial of service or an information leak.
CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922
Jan Beulich discovered multiple places where reference
counting on grant table operations was incorrect, resulting
in potential privilege escalation
CVE-2017-12135
Jan Beulich found multiple problems in the handling of
transitive grants which could result in denial of service
and potentially privilege escalation.
CVE-2017-12137
Andrew Cooper discovered that incorrect validation of
grants may result in privilege escalation.
CVE-2017-12855
Jan Beulich discovered that incorrect grant status handling, thus
incorrectly informing the guest that the grant is no longer in use.
CVE-2017-14316
Matthew Daley discovered that the NUMA node parameter wasn't
verified which which may result in privilege escalation.
CVE-2017-14317
Eric Chanudet discovered that a race conditions in cxenstored might
result in information leaks or privilege escalation.
CVE-2017-14318
Matthew Daley discovered that incorrect validation of
grants may result in a denial of service.
CVE-2017-14319
Andrew Cooper discovered that insufficient grant unmapping
checks may result in denial of service and privilege escalation.
For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-9.
We recommend that you upgrade your xen packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=pFC2
-----END PGP SIGNATURE-----
Reply to: