Security update for xen

This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
internal array allowed attackers using crafted hypercalls to execute
arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
tables, allowing a malicious guest to crash the host or for x86 PV guests to
potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
bsc#1056282).

These non-security issues were fixed:

- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1055695
XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack
bnc#1027519
Xen: Missing upstream bug fixes
bnc#1056282
VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)
bnc#1056281
VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)
bnc#1056280
VUL-0: EMBARGOED: xen: Missing check for grant table (XSA-232)
bnc#1056278
VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)
Selected Binaries
openSUSE Build Service is sponsored by