Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:Update
patchinfo.4995
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4995
<patchinfo incident="4995"> <issue id="1042893" tracker="bnc">VUL-0: xen: Races in the grant table unmap code (XSA-218)</issue> <issue id="1034845" tracker="bnc">VUL-0: CVE-2017-8905: xen: possible memory corruption via failsafe callback (XSA-215)</issue> <issue id="1042882" tracker="bnc">VUL-0: xen: page transfer may allow PV guest to elevate privilege (XSA-217)</issue> <issue id="1042924" tracker="bnc">VUL-0: xen: NULL pointer deref in event channel poll (XSA-221)</issue> <issue id="1042923" tracker="bnc">VUL-0: xen: x86: PKRU and BND* leakage between vCPU-s (XSA-220)</issue> <issue id="1042931" tracker="bnc">VUL-0: xen: stale P2M mappings due to insufficient error checking (XSA-222)</issue> <issue id="1026236" tracker="bnc">Paravirtualized vs. fully virtualized migration - latter one much faster</issue> <issue id="1037243" tracker="bnc">VUL-1: CVE-2017-8309: xen: audio: host memory leakage via capture buffer</issue> <issue id="1042915" tracker="bnc">VUL-0: xen: x86: insufficient reference counts during shadow emulation (XSA-219)</issue> <issue id="1042938" tracker="bnc">VUL-0: xen: grant table operations mishandle reference counts (XSA-224)</issue> <issue id="1042863" tracker="bnc">VUL-0: xen: blkif responses leak backend stack data (XSA-216)</issue> <issue id="1031460" tracker="bnc">Xen Host: after Update to SP4 latest patches, DomU Live Migration doesn't work</issue> <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue> <issue id="1042160" tracker="bnc">VUL-1: CVE-2017-9330: xen: usb: ohci: infinite loop due to incorrect return value</issue> <issue id="1043297" tracker="bnc">VUL-1: CVE-2017-9503: xen: scsi: megasas: null pointer dereference while processing megasas command</issue> <issue id="1043074" tracker="bnc">VUL-0: CVE-2017-9374: xen: usb: ehci host memory leakage during hotunplug</issue> <issue id="1036470" tracker="bnc">VUL-1: CVE-2017-8112: xen: qemu: scsi: vmw_pvscsi: infinite loop in pvscsi_log2</issue> <issue id="1014136" tracker="bnc">kdump can't dump a kernel on SLES12-SP2 with Xen hypervisor.</issue> <issue id="2017-9503" tracker="cve" /> <issue id="2017-8309" tracker="cve" /> <issue id="2017-9330" tracker="cve" /> <issue id="2017-8905" tracker="cve" /> <issue id="2017-8112" tracker="cve" /> <issue id="2017-9374" tracker="cve" /> <issue id="2017-10911" tracker="cve" /> <issue id="2017-10912" tracker="cve" /> <issue id="2017-10913" tracker="cve" /> <issue id="2017-10914" tracker="cve" /> <issue id="2017-10915" tracker="cve" /> <issue id="2017-10917" tracker="cve" /> <issue id="2017-10918" tracker="cve" /> <issue id="2017-10920" tracker="cve" /> <issue id="2017-10921" tracker="cve" /> <issue id="2017-10922" tracker="cve" /> <issue id="2017-10916" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description>This update for xen fixes several issues. These security issues were fixed: - CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863) - CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882) - CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893) - CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915) - CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924) - CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931) - CVE-2017-10922, CVE-2017-10921, CVE-2017-10920: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938) - CVE-2017-10916: PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923) - CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160) - CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243) - CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470) - CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845). - CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297) - CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074) These non-security issues were fixed: - bsc#1031460: Fixed DomU Live Migration - bsc#1014136: Fixed kdump SLES12-SP2 - bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed </description> <summary>Security update for xen</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor