[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4112-1 xen -- xen

ID: oval:org.secpod.oval:def:603271Date: (C)2018-02-28   (M)2024-01-29
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in the Xen hypervisor: CVE-2017-17563 Jan Beulich discovered that an incorrect reference count overflow check in x86 shadow mode may result in denial of service or privilege escalation. CVE-2017-17564 Jan Beulich discovered that improper x86 shadow mode reference count error handling may result in denial of service or privilege escalation. CVE-2017-17565 Jan Beulich discovered that an incomplete bug check in x86 log-dirty handling may result in denial of service. CVE-2017-17566 Jan Beulich discovered that x86 PV guests may gain access to internally used pages which could result in denial of service or potential privilege escalation. In addition this update ships the Comet shim to address the Meltdown class of vulnerabilities for guests with legacy PV kernels. In addition, the package provides the Xen PTI stage 1 mitigation which is built-in and enabled by default on Intel systems, but can be disabled with `xpti=false" on the hypervisor command line Please refer to the following URL for more details on how to configure individual mitigation strategies: https://xenbits.xen.org/xsa/advisory-254.html Additional information can also be found in README.pti and README.comet.

Platform:
Debian 9.x
Product:
xen-hypervisor-4.8-amd64
libxen-dev
xen-hypervisor-4.8-arm64
xen-hypervisor-4.8-armhf
xen-system-armhf
xen-utils-4.8
xen-system-arm64
libxen-4.8
libxenstore3.0
xen-utils-common
xen-system-amd64
xenstore-utils
Reference:
DSA-4112-1
CVE-2017-17563
CVE-2017-17564
CVE-2017-17565
CVE-2017-17566
CVE    4
CVE-2017-17563
CVE-2017-17564
CVE-2017-17565
CVE-2017-17566
...
CPE    2
cpe:/a:xen:xen-utils-4.8
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies