Security update for xen
This update for xen fixes the following issues:
- A Mishandling of SYSCALL singlestep during emulation which could
have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have
lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service.
(XSA-202, bsc#1014298, CVE-2016-10024)
- A missing NULL pointer check in VMFUNC emulation could lead to a hypervisor
crash leading to a Denial of Servce. (XSA-203, bsc#1014300, CVE-2016-10025)
This update was imported from the SUSE:SLE-12-SP2:Update update project.
-
Submitted by
Charles Arnold (charlesa)
Fixed bugs
bnc#1014300
VUL-0: EMBARGOED: xen: x86: missing NULL pointer check in VMFUNC emulation (XSA-203)
bnc#1012651
VUL-0: CVE-2016-9932: xen: x86 CMPXCHG8B emulation fails to ignore operand size override (XSA-200)
bnc#1016340
VUL-0: EMU: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204)
bnc#1014298
VUL-0: EMBARGOED: xen: x86 PV guests may be able to mask interrupts (XSA-202)