CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
85.5%
Debian Security Advisory DSA-3969-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
September 12, 2017 https://www.debian.org/security/faq
Package : xen
CVE ID : CVE-2017-10912 CVE-2017-10913 CVE-2017-10914
CVE-2017-10915 CVE-2017-10916 CVE-2017-10917
CVE-2017-10918 CVE-2017-10919 CVE-2017-10920
CVE-2017-10921 CVE-2017-10922 CVE-2017-12135
CVE-2017-12136 CVE-2017-12137 CVE-2017-12855
Multiple vulnerabilities have been discovered in the Xen hypervisor:
CVE-2017-10912
Jann Horn discovered that incorrectly handling of page transfers might
result in privilege escalation.
CVE-2017-10913 / CVE-2017-10914
Jann Horn discovered that race conditions in grant handling might
result in information leaks or privilege escalation.
CVE-2017-10915
Andrew Cooper discovered that incorrect reference counting with
shadow paging might result in privilege escalation.
CVE-2017-10916
Andrew Cooper discovered an information leak in the handling
of the the Memory Protection Extensions (MPX) and Protection
Key (PKU) CPU features. This only affects Debian stretch.
CVE-2017-10917
Ankur Arora discovered a NULL pointer dereference in event
polling, resulting in denial of service.
CVE-2017-10918
Julien Grall discovered that incorrect error handling in
physical-to-machine memory mappings may result in privilege
escalation, denial of service or an information leak.
CVE-2017-10919
Julien Grall discovered that that incorrect handling of
virtual interrupt injection on ARM systems may result in
denial of service.
CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922
Jan Beulich discovered multiple places where reference
counting on grant table operations was incorrect, resulting
in potential privilege escalation
CVE-2017-12135
Jan Beulich found multiple problems in the handling of
transitive grants which could result in denial of service
and potentially privilege escalation.
CVE-2017-12136
Ian Jackson discovered that race conditions in the allocator
for grant mappings may result in denial of service or privilege
escalation. This only affects Debian stretch.
CVE-2017-12137
Andrew Cooper discovered that incorrect validation of
grants may result in privilege escalation.
CVE-2017-12855
Jan Beulich discovered that incorrect grant status handling, thus
incorrectly informing the guest that the grant is no longer in use.
XSA-235 (no CVE yet)
Wei Liu discovered that incorrect locking of add-to-physmap
operations on ARM may result in denial of service.
For the oldstable distribution (jessie), these problems have been fixed
in version 4.4.1-9+deb8u10.
For the stable distribution (stretch), these problems have been fixed in
version 4.8.1-1+deb9u3.
We recommend that you upgrade your xen packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | amd64 | xen-system-amd64 | < 4.4.1-9+deb8u10 | xen-system-amd64_4.4.1-9+deb8u10_amd64.deb |
Debian | 8 | amd64 | libxenstore3.0 | < 4.4.1-9+deb8u10 | libxenstore3.0_4.4.1-9+deb8u10_amd64.deb |
Debian | 9 | amd64 | libxenstore3.0-dbgsym | < 4.8.1-1+deb9u3 | libxenstore3.0-dbgsym_4.8.1-1+deb9u3_amd64.deb |
Debian | 9 | amd64 | xen-utils-4.8 | < 4.8.1-1+deb9u3 | xen-utils-4.8_4.8.1-1+deb9u3_amd64.deb |
Debian | 7 | i386 | xen-hypervisor-4.1-amd64 | < 4.1.6.lts1-9 | xen-hypervisor-4.1-amd64_4.1.6.lts1-9_i386.deb |
Debian | 9 | armhf | xen-utils-4.8-dbgsym | < 4.8.1-1+deb9u3 | xen-utils-4.8-dbgsym_4.8.1-1+deb9u3_armhf.deb |
Debian | 7 | amd64 | libxen-4.1 | < 4.1.6.lts1-9 | libxen-4.1_4.1.6.lts1-9_amd64.deb |
Debian | 8 | armhf | xenstore-utils | < 4.4.1-9+deb8u10 | xenstore-utils_4.4.1-9+deb8u10_armhf.deb |
Debian | 9 | armhf | xenstore-utils-dbgsym | < 4.8.1-1+deb9u3 | xenstore-utils-dbgsym_4.8.1-1+deb9u3_armhf.deb |
Debian | 8 | arm64 | xen-hypervisor-4.4-arm64 | < 4.4.1-9+deb8u10 | xen-hypervisor-4.4-arm64_4.4.1-9+deb8u10_arm64.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
85.5%