Lucene search

K
citrixCitrixCTX228867
HistoryOct 12, 2017 - 4:00 a.m.

Citrix XenServer Multiple Security Updates

2017-10-1204:00:00
support.citrix.com
34

EPSS

0.001

Percentile

42.3%

<section>
<div><div>
<div>

<h2> Description of Problem</h2>

<div>
<div>
<div>
<p>A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of a guest VM to compromise the host.</p>
<p>These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 7.2.</p>
<p>The following vulnerabilities have been addressed:</p>
<ul>
<li>CVE-2017-15595: Unlimited recursion in linear pagetable de-typing</li>
<li>CVE-2017-15588: Stale TLB entry due to page type release race</li>
<li>CVE-2017-15593: page type reference leak on x86</li>
<li>CVE-2017-15592: x86: Incorrect handling of self-linear shadow mappings with translated guests</li>
<li>CVE-2017-15594: x86: Incorrect handling of IST settings during CPU hotplug</li>
<li>CVE-2017-15590: multiple MSI mapping issues on x86</li>
<li>CVE-2017-15589: hypervisor stack leak in x86 I/O intercept code</li>
</ul>
<p>For customers that do not have PV-based guests, are not using PCI passthrough and are using hardware with HAP support, the risk is reduced to a disclosure of a small part of the hypervisor stack.</p>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> What Customers Should Do</h2>

<div>
<div>
<div>
<p>Hotfixes have been released to address these issues. Citrix strongly recommends that affected customers install these hotfixes as soon as possible. The hotfixes can be downloaded from the following locations:</p>
<p>Citrix XenServer 7.2: CTX228722 – <a href=“https://support.citrix.com/article/CTX228722”>https://support.citrix.com/article/CTX228722</a> </p>
<p>Citrix XenServer 7.1 LTSR CU1: CTX228721 – <a href=“https://support.citrix.com/article/CTX228721”>https://support.citrix.com/article/CTX228721</a> </p>
<p>Citrix XenServer 7.1 LTSR: CTX228720 – <a href=“https://support.citrix.com/article/CTX228720”>https://support.citrix.com/article/CTX228720</a> </p>
<p>Citrix XenServer 7.0: CTX228719 – <a href=“https://support.citrix.com/article/CTX228719”>https://support.citrix.com/article/CTX228719</a> </p>
<p>Citrix XenServer 6.5 SP1: CTX228718 – <a href=“https://support.citrix.com/article/CTX228718”>https://support.citrix.com/article/CTX228718</a> </p>
<p>Citrix XenServer 6.2 SP1: CTX228717 – <a href=“https://support.citrix.com/article/CTX228717”>https://support.citrix.com/article/CTX228717</a> </p>
<p>Citrix XenServer 6.0.2 Common Criteria: CTX228716 – <a href=“https://support.citrix.com/article/CTX228716”>https://support.citrix.com/article/CTX228716</a></p>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> What Citrix Is Doing</h2>

<div>
<div>
<div>
<div>
<div>
<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=“http://support.citrix.com/”>http://support.citrix.com/</a></u>.</p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Obtaining Support on This Issue</h2>

<div>
<div>
<div>
<div>
<div>
<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=“https://www.citrix.com/support/open-a-support-case.html”>https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Reporting Security Vulnerabilities</h2>

<div>
<div>
<div>
<div>
<div>
<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – <a href=“http://support.citrix.com/article/CTX081743”>Reporting Security Issues to Citrix</a></p>
</div>
</div>
</div>
</div>
</div>

<hr />
</div>
<div>

<h2> Changelog</h2>

<div>
<div>
<div>
<table border=“1” width=“100%”>
<tbody>
<tr>
<td>Date </td>
<td>Change</td>
</tr>
<tr>
<td>12th October 2017</td>
<td>Initial publishing</td>
</tr>
<tr>
<td>18th October 2017</td>
<td>Update to CVE numbers</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>

<hr />
</div>
</div></div>
</section>