8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.2%
Debian Security Advisory DSA-3969-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
September 12, 2017 https://www.debian.org/security/faq
Package : xen
CVE ID : CVE-2017-10912 CVE-2017-10913 CVE-2017-10914
CVE-2017-10915 CVE-2017-10916 CVE-2017-10917
CVE-2017-10918 CVE-2017-10919 CVE-2017-10920
CVE-2017-10921 CVE-2017-10922 CVE-2017-12135
CVE-2017-12136 CVE-2017-12137 CVE-2017-12855
Multiple vulnerabilities have been discovered in the Xen hypervisor:
CVE-2017-10912
Jann Horn discovered that incorrectly handling of page transfers might
result in privilege escalation.
CVE-2017-10913 / CVE-2017-10914
Jann Horn discovered that race conditions in grant handling might
result in information leaks or privilege escalation.
CVE-2017-10915
Andrew Cooper discovered that incorrect reference counting with
shadow paging might result in privilege escalation.
CVE-2017-10916
Andrew Cooper discovered an information leak in the handling
of the the Memory Protection Extensions (MPX) and Protection
Key (PKU) CPU features. This only affects Debian stretch.
CVE-2017-10917
Ankur Arora discovered a NULL pointer dereference in event
polling, resulting in denial of service.
CVE-2017-10918
Julien Grall discovered that incorrect error handling in
physical-to-machine memory mappings may result in privilege
escalation, denial of service or an information leak.
CVE-2017-10919
Julien Grall discovered that that incorrect handling of
virtual interrupt injection on ARM systems may result in
denial of service.
CVE-2017-10920 / CVE-2017-10921 / CVE-2017-10922
Jan Beulich discovered multiple places where reference
counting on grant table operations was incorrect, resulting
in potential privilege escalation
CVE-2017-12135
Jan Beulich found multiple problems in the handling of
transitive grants which could result in denial of service
and potentially privilege escalation.
CVE-2017-12136
Ian Jackson discovered that race conditions in the allocator
for grant mappings may result in denial of service or privilege
escalation. This only affects Debian stretch.
CVE-2017-12137
Andrew Cooper discovered that incorrect validation of
grants may result in privilege escalation.
CVE-2017-12855
Jan Beulich discovered that incorrect grant status handling, thus
incorrectly informing the guest that the grant is no longer in use.
XSA-235 (no CVE yet)
Wei Liu discovered that incorrect locking of add-to-physmap
operations on ARM may result in denial of service.
For the oldstable distribution (jessie), these problems have been fixed
in version 4.4.1-9+deb8u10.
For the stable distribution (stretch), these problems have been fixed in
version 4.8.1-1+deb9u3.
We recommend that you upgrade your xen packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | arm64 | libxenstore3.0 | < 4.8.1-1+deb9u3 | libxenstore3.0_4.8.1-1+deb9u3_arm64.deb |
Debian | 8 | arm64 | xenstore-utils | < 4.4.1-9+deb8u10 | xenstore-utils_4.4.1-9+deb8u10_arm64.deb |
Debian | 9 | armhf | xenstore-utils-dbgsym | < 4.8.1-1+deb9u3 | xenstore-utils-dbgsym_4.8.1-1+deb9u3_armhf.deb |
Debian | 8 | amd64 | xen-hypervisor-4.4-amd64 | < 4.4.1-9+deb8u10 | xen-hypervisor-4.4-amd64_4.4.1-9+deb8u10_amd64.deb |
Debian | 9 | i386 | libxenstore3.0-dbgsym | < 4.8.1-1+deb9u3 | libxenstore3.0-dbgsym_4.8.1-1+deb9u3_i386.deb |
Debian | 9 | amd64 | xen-system-amd64 | < 4.8.1-1+deb9u3 | xen-system-amd64_4.8.1-1+deb9u3_amd64.deb |
Debian | 7 | i386 | xen-utils-4.1 | < 4.1.6.lts1-9 | xen-utils-4.1_4.1.6.lts1-9_i386.deb |
Debian | 8 | i386 | libxen-dev | < 4.4.1-9+deb8u10 | libxen-dev_4.4.1-9+deb8u10_i386.deb |
Debian | 9 | arm64 | libxenstore3.0-dbgsym | < 4.8.1-1+deb9u3 | libxenstore3.0-dbgsym_4.8.1-1+deb9u3_arm64.deb |
Debian | 9 | all | xen | < 4.8.1-1+deb9u3 | xen_4.8.1-1+deb9u3_all.deb |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.2%