ESB-2018.0366 - [Debian] xen: Multiple vulnerabilities 2018-02-07

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0366
                [SECURITY] [DLA 1270-1] xen security update
                              7 February 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xen
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Increased Privileges            -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-15590 CVE-2017-2620 CVE-2016-9637
                   CVE-2016-9603  

Reference:         ESB-2017.2203
                   ESB-2016.2907
                   ESB-2016.2876

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : xen
Version        : 4.1.6.lts1-12
CVE ID         : CVE-2016-9603 CVE-2016-9637 CVE-2017-2620

Multiple vulnerabilities have been discovered in the Xen hypervisor, which
could result in privilege escalation.

For Debian 7 "Wheezy", these problems have been fixed in version
4.1.6.lts1-12.

We recommend that you upgrade your xen packages.

Please note that CVE-2017-15590 (XSA-237) will *not* be fixed in wheezy as
the patches are too intrusive to backport.
The vulnerability can be mitigated by not passing through physical devices
to untrusted guests.
More information can be found on https://xenbits.xen.org/xsa/advisory-237.html

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEFkxwUS95KUdnZKtW/iLG/YMTXUUFAlp5oFMACgkQ/iLG/YMT
XUVYhg//af8gqhHof4pV1pVcsxzB6NPbAjiFqRC3RLj6/aN2aJ7dkI/9CxVvkCgz
1FzFCots57gqBaoSZB/Pl7SordOzoAfH+J51hIj7RI7Q8Qr6Hunc9nQdFWvmffba
vDYvPFiWz/+G6hN/S3Ou0UZL897I6GzDLaWzXEpn3KFRX73VdiXCtiTcs1VPgazH
pavxgWNgk2CaGUgfVbyW7ZTovfBEuSwW3gIfBLV6RHnfNrYxKC0w5SStYzZnCSjn
BMXIB5RzzmW6htGP15T5FoVrbYWSD9FPG/4VquOXK34vguATNVkXG2chhvX+cuxu
P7Stk2GrRsamSNLsYgCiB78OSyvOuz2yh/3xG4zuTZHp+9voeKZQ6oN2zcIKEr8K
t5ADjWFBIW+pxyrVYz3/Szms+7m50xWHOLhlJROtH2d8/bmGx6/y6vKJrub+dc3+
Gq10vUHzGKLIyTvzXmgzcknZXfPGH5+1hkM5eIFELkIdeVsA4o4xt75hdTNNi3Tp
IEMr6b1dWbNUuaAmC3gR9vuTTzp11iN0zbLfYhVR1xW8Fgn2j3o6upmOeCogoOBI
l2eEffesEv0fuVimHCs96IiDfbhBnS/ejzJLwpxMOw24wUlBCpkzbb6GbTzDQvgy
FbBSIkDHtXAoqymuw6kpsYQo8mm2FzJfQ3/YjEYhMQapEypR3Sw=
=YdEG
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=MqpJ
-----END PGP SIGNATURE-----

« Back to bulletins