-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : xen Version : 4.1.6.lts1-9 CVE ID : CVE-2017-10912 CVE-2017-10913 CVE-2017-10914 CVE-2017-10915 CVE-2017-10918 CVE-2017-10920 CVE-2017-10921 CVE-2017-10922 CVE-2017-12135 CVE-2017-12137 CVE-2017-12855 CVE-2017-14316 CVE-2017-14317 CVE-2017-14318 CVE-2017-14319
Multiple vulnerabilities have been discovered in the Xen hypervisor: CVE-2017-10912 Jann Horn discovered that incorrectly handling of page transfers might result in privilege escalation. CVE-2017-10913 / CVE-2017-10914 Jann Horn discovered that race conditions in grant handling might result in information leaks or privilege escalation. CVE-2017-10915 Andrew Cooper discovered that incorrect reference counting with shadow paging might result in privilege escalation. CVE-2017-10918 Julien Grall discovered that incorrect error handling in physical-to-machine memory mappings may result in privilege escalation, denial of service or an information leak. CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922 Jan Beulich discovered multiple places where reference counting on grant table operations was incorrect, resulting in potential privilege escalation CVE-2017-12135 Jan Beulich found multiple problems in the handling of transitive grants which could result in denial of service and potentially privilege escalation. CVE-2017-12137 Andrew Cooper discovered that incorrect validation of grants may result in privilege escalation. CVE-2017-12855 Jan Beulich discovered that incorrect grant status handling, thus incorrectly informing the guest that the grant is no longer in use. CVE-2017-14316 Matthew Daley discovered that the NUMA node parameter wasn't verified which which may result in privilege escalation. CVE-2017-14317 Eric Chanudet discovered that a race conditions in cxenstored might result in information leaks or privilege escalation. CVE-2017-14318 Matthew Daley discovered that incorrect validation of grants may result in a denial of service. CVE-2017-14319 Andrew Cooper discovered that insufficient grant unmapping checks may result in denial of service and privilege escalation. For Debian 7 "Wheezy", these problems have been fixed in version 4.1.6.lts1-9. We recommend that you upgrade your xen packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEFkxwUS95KUdnZKtW/iLG/YMTXUUFAlneA1IACgkQ/iLG/YMT XUU34BAAiyhNBuzTrsITTiCmIaWlefp7Q5XWTWeA+rE25ttMOU94Ppk0O5nlZY6N QrtXZfj2UMAdFC2723kvRahhPvASyiJoRr06At3Jahl8AaExprvcchP19lWTJvE6 2bN11WrBl1NHSfjMkRAnBc0K0Ka+b97bhK9PkPqW38SQDxjBon1lhIN8N5i9ATDj rFtCjoF0WDFe1y68dThqPQN32Ltq0PKuGFdafekEcvcc6E+LPIwLmq220NWOuXzq ScKEb89VKaNfFJOFB4rn9YUQiE1sj0Cjs4YcIquBuEi2yePyDMEXqX+88qgB7N1w jr9ybhD9uY0LMaWAHOCNSrmioSYda7/peLJgxIhZpKJqmGwlXrBmX1VHFot9Hfxz +AnNGoOmoyhf4Nmvia0oUO9e+ZUl/ohHN97sH/us/f7+nCk9yHO9bvHC6svzhiTB B73vbuHkZ2IAB0P3hG5rhEA5dDC5UqjOUdh+i/pz0mTqvAIFvNaW/NmYkgdtxwyp EwTbj1U0HxrUHJ+luq5iUg+aBT+P4OAHrr8/uHxnxjhrsDOniCau5enAN6KZMcRJ tGX1E3uCPBd+IyVHOo1P4fMO78K1xGTqSQYhKCn34LMbeKWDvKqvy8zeSU1jNeZ3 wKbTfB9MXzdgnXEWgXT9quAMfLB9Hb6ghcKM1y79nvdK+hi9A8k= =pFC2 -----END PGP SIGNATURE-----