SB2019011602 - Debian update for xen
Published: January 16, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Denial of service (CVE-ID: CVE-2018-19961)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists due to insufficient TLB flushing after improper large page mappings with AMD IOMMUs. An adjacent attacker can cause the service to crash.
2) Privilege escalation (CVE-ID: CVE-2018-19962)
The vulnerability allows an adjacent attacker to gain elevated privileges on the target system.The weakness exists on AMD x86 platforms due to small IOMMU mappings are unsafely combined into larger ones. An adjacent attacker can gain host OS privileges.
3) Denial of service (CVE-ID: CVE-2018-19965)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists due to an error when attempting to use INVPCID with a non-canonical addresses. An adjacent attacker can cause the service to crash.
4) Denial of service (CVE-ID: CVE-2018-19966)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.The weakness exists due to XSA-240 conflicts with shadow paging. An adjacent attacker can cause the service to crash.
5) Denial of service (CVE-ID: CVE-2018-19967)
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.
The vulnerability exists due to unspecified flaw. An adjacent attacker can invoke a HLE transaction with the XACQUIRE prefix on the host physical memory range covering the first 4 MiB starting at the 1GiB boundary to cause denial of service conditions on the host system.
6) Resource exhaustion (CVE-ID: CVE-2017-15595)
The vulnerability allows an adjacent attacker to gain elevated privileges or cause DoS conditions on the target system.The weakness exists due to improper input validation. An adjacent attacker can supply specially crafted page-table stacking, trigger unbounded recursion, stack consumption, gain elevated privileges or cause hypervisor crash.
Remediation
Install update from vendor's website.