Citrix XenServer Multiple Security Updates

Related Vulnerabilities: CVE-2017-7980   CVE-2017-15592   CVE-2017-17044   CVE-2017-17045  

Description of Problem

A number of security vulnerabilities have been identified in Citrix XenServer that may allow a malicious administrator of an HVM guest VM to compromise the host.

These vulnerabilities affect all currently supported versions of Citrix XenServer up to and including Citrix XenServer 7.2.

The following vulnerabilities have been addressed:

  • CVE-2017-7980: code execution via overflow in Cirrus Logic emulation
  • CVE-2017-15592: Incorrect handling of self-linear shadow mappings with translated guests
  • CVE-2017-17044: Infinite loop due to missing PoD error checking
  • CVE-2017-17045: Missing p2m error checking in PoD code

Mitigating Factors

Customers without HVM guests (i.e. PV guests only) are not affected by these issues.


What Customers Should Do

Hotfixes have been released to address these issues. Citrix strongly recommends that affected customers install these hotfixes as soon as possible. The hotfixes can be downloaded from the following locations:

Citrix XenServer 7.2: CTX229541 – https://support.citrix.com/article/CTX229541 and CTX230161 – https://support.citrix.com/article/CTX230161

Citrix XenServer 7.1 LTSR CU1: CTX229540 – https://support.citrix.com/article/CTX229540 and CTX230160 – https://support.citrix.com/article/CTX230160

Citrix XenServer 7.1 LTSR: CTX229545 – https://support.citrix.com/article/CTX229545 and CTX230159 – https://support.citrix.com/article/CTX230159

Citrix XenServer 7.0: CTX229539 – https://support.citrix.com/article/CTX229539 and CTX229544 – https://support.citrix.com/article/CTX229544

Citrix XenServer 6.5 SP1: CTX229543 – https://support.citrix.com/article/CTX229543

Citrix XenServer 6.2 SP1: CTX229096 – https://support.citrix.com/article/CTX229096

Citrix XenServer 6.0.2 Common Criteria: CTX229095 – https://support.citrix.com/article/CTX229095

Customers using the LivePatching feature of Citrix XenServer will not need to reboot servers to apply this hotfix but HVM guest VMs must either be rebooted or migrated to a server with the hotfix already applied for the hotfix to be fully effective.


What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case.html


Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix


Changelog

Date  Change
1st December 2017 Initial publishing