drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in Xen
Name: |
Ausführen von Code mit höheren Privilegien in Xen |
|
ID: |
201703-07 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Di, 28. März 2017, 07:43 |
|
Referenzen: |
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620 |
|
Applikationen: |
Xen |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --7RKe6GUGRALkk9CRMCfuQGJU2S8wR9Oo6 Content-Type: multipart/mixed; boundary="ABDObdcTnI0mi1pk058OcXq3PLwmdNegc"; protected-headers="v1" From: Yury German <blueknight@gentoo.org> To: gentoo-announce@lists.gentoo.org Message-ID: <d9400384-ca62-9cb9-1716-c51fe26eb235@gentoo.org> Subject: [ GLSA 201703-07 ] Xen: Privilege Escalation
--ABDObdcTnI0mi1pk058OcXq3PLwmdNegc Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201703-07 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: Xen: Privilege Escalation Date: March 28, 2017 Bugs: #609120 ID: 201703-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
A vulnerability in Xen's bundled QEMU version might allow privilege escalation.
Background ==========
Xen is a bare-metal hypervisor.
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-emulation/xen-tools < 4.7.1-r8 >= 4.7.1-r8
Description ===========
In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo fails to check wethehr the specified memory region is safe.
Impact ======
A local attacker could potentially execute arbitrary code with privileges of Xen (QEMU) process on the host, gain privileges on the host system, or cause a Denial of Service condition.
Workaround ==========
Running guests in Paravirtualization (PV) mode, or running guests in Hardware-assisted virtualizion (HVM) utilizing stub domains mitigate the issue.
Running HVM guests with the device model in a stubdomain will mitigate the issue.
Changing the video card emulation to stdvga (stdvga=1, vga="stdvga", in the xl domain configuration) will avoid the vulnerability.
Resolution ==========
All Xen Tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.7.1-r8"
References ==========
[ 1 ] CVE-2017-2620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201703-07
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--ABDObdcTnI0mi1pk058OcXq3PLwmdNegc--
--7RKe6GUGRALkk9CRMCfuQGJU2S8wR9Oo6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJY2da9AAoJEB9lYVdQaQ1QiNQH/j75RTNapb2K7sVcbxxFq+uS Jit4UAqR/IU0inRjyvOsnFBQf6it9UkRIaC3q/DnM+MCdyGywj5wX0Lxbtx0JL4Y 7OxAbOHjA9GK2Xk5MH5DCawm9M1l4OiBHVZpBJD1R8ZXlypDcGPAXxu7bPBvNFwY vRESYSpQSzCNnhC+e3Gp0iccO25JlXIGaPvdHIms6eqBVdxU4S1uXyajEEB8sGeV Z999aXeQC8Ly68RnlX64pWk/6V2PSEpteP2FxGmMcF4sBRaqnPJvkljjPWntuwpJ OVICMRxhFQfhZLv4+bNeGwttWFZvTg5AWQpT3nys10+NEyWjAbZHlAmPslueAoI= =q6o9 -----END PGP SIGNATURE-----
--7RKe6GUGRALkk9CRMCfuQGJU2S8wR9Oo6--
|
|
|
|