Debian Security Advisory
DLA-1181-1 xen -- LTS security update
- Date Reported:
- 20 Nov 2017
- Affected Packages:
- xen
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2017-15588, CVE-2017-15589, CVE-2017-15592, CVE-2017-15593, CVE-2017-15595.
- More information:
-
Multiple vulnerabilities have been discovered in the Xen hypervisor:
- CVE-2017-15588
Jann Horn discovered a race condition that can cause a stale TLB entry which might result in privilege escalation, denial of service or information leak.
- CVE-2017-15589
Roger Pau Monné discovered a hypervisor stack leak in the x86 I/O intercept code, resulting in information leaks.
- CVE-2017-15592
Andrew Cooper discovered that incorrect handling of self-linear shadow mappings for translated guests might result in denial of service or privilege escalation.
- CVE-2017-15593
Jan Beulich discovered that page type reference counts are mishandled which may result in denial of service.
- CVE-2017-15595
Jann Horn discovered that crafted page-table stacking might result in denial of service, privilege escalation or information leaks.
For Debian 7
Wheezy
, these problems have been fixed in version 4.1.6.lts1-10.We recommend that you upgrade your xen packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2017-15588