Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201705-11 ] Xen: Multiple vulnerabilities
Date: Fri, 26 May 2017 06:27:39
Message-Id: 87521aac-965e-d76a-0ab4-c207bf1789a7@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201705-11
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Xen: Multiple vulnerabilities
9 Date: May 26, 2017
10 Bugs: #615980
11 ID: 201705-11
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in Xen, the worst of which
19 could allow for privilege escalation.
20
21 Background
22 ==========
23
24 Xen is a bare-metal hypervisor.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 app-emulation/xen < 4.7.2-r1 >= 4.7.2-r1
33 2 app-emulation/xen-tools < 4.7.2 >= 4.7.2
34 3 app-emulation/xen-pvgrub
35 < 4.7.2 >= 4.7.2
36 -------------------------------------------------------------------
37 3 affected packages
38
39 Description
40 ===========
41
42 Multiple vulnerabilities have been discovered in Xen. Please review the
43 CVE identifiers and Xen Security Advisory referenced below for details.
44
45 Impact
46 ======
47
48 A local attacker could potentially execute arbitrary code with
49 privileges of Xen (QEMU) process on the host, gain privileges on the
50 host system, or cause a Denial of Service condition.
51
52 Workaround
53 ==========
54
55 There is no known workaround at this time.
56
57 Resolution
58 ==========
59
60 All Xen users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.7.2-r1:0"
64
65 All Xen Tools users should upgrade to the latest version:
66
67 # emerge --sync
68 # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.7.2:0"
69
70 All Xen pvgrub users should upgrade to the latest version:
71
72 # emerge --sync
73 # emerge --ask --oneshot -v ">=app-emulation/xen-pvgrub-4.7.2:0"
74
75 References
76 ==========
77
78 [ 1 ] CVE-2017-8903
79 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8903
80 [ 2 ] CVE-2017-8904
81 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8904
82 [ 3 ] CVE-2017-8905
83 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8905
84
85 Availability
86 ============
87
88 This GLSA and any updates to it are available for viewing at
89 the Gentoo Security Website:
90
91 https://security.gentoo.org/glsa/201705-11
92
93 Concerns?
94 =========
95
96 Security is a primary focus of Gentoo Linux and ensuring the
97 confidentiality and security of our users' machines is of utmost
98 importance to us. Any security concerns should be addressed to
99 security@g.o or alternatively, you may file a bug at
100 https://bugs.gentoo.org.
101
102 License
103 =======
104
105 Copyright 2017 Gentoo Foundation, Inc; referenced text
106 belongs to its owner(s).
107
108 The contents of this document are licensed under the
109 Creative Commons - Attribution / Share Alike license.
110
111 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature