Citrix XenServer Multiple Security Updates

Related Vulnerabilities: CVE-2017-2615   CVE-2017-2620  

Description of Problem

Two security issues have been identified within Citrix XenServer. These issues could, if exploited, allow the administrator of an HVM guest VM to compromise the host.

The following vulnerabilities have been addressed:

  • CVE-2017-2615 (High): QEMU: oob access in cirrus bitblt copy
  • CVE-2017-2620 (High): QEMU: cirrus_bitblt_cputovideo does not check if memory region is safe

Mitigating Factors

Customers using only PV guest VMs are not affected by this vulnerability.

Customers using only VMs that use the std-vga graphics emulation are not affected by this vulnerability.


What Customers Should Do

Hotfixes have been released to address these issues. Citrix recommends that affected customers install these hotfixes, which can be downloaded from the following locations:

Citrix XenServer 7.0: CTX220760 – https://support.citrix.com/article/CTX220760

Citrix XenServer 6.5 SP1: CTX220759 – https://support.citrix.com/article/CTX220759

Citrix XenServer 6.2 SP1: CTX220758 – https://support.citrix.com/article/CTX220758

Citrix XenServer 6.0.2 Common Criteria: CTX220757– https://support.citrix.com/article/CTX220757


What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.


Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at https://www.citrix.com/support/open-a-support-case.html


Reporting Security Vulnerabilities

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix


Changelog

Date  Change
21st February 2017 Initial publishing