File _patchinfo of Package patchinfo.5425

<patchinfo incident="5425">
  <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
  <issue id="1037413" tracker="bnc">requesting support for 'newer' intel cpu's in xen mwait-idle driver - ivt(0x4f), brd(0x4f) and skylake</issue>
  <issue id="1056278" tracker="bnc">VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)</issue>
  <issue id="1056281" tracker="bnc">VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)</issue>
  <issue id="1056282" tracker="bnc">VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)</issue>
  <issue id="1052686" tracker="bnc">VUL-0: EMBARGOED: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230)</issue>
  <issue id="1051787" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226)</issue>
  <issue id="1049578" tracker="bnc">VUL-1: CVE-2017-11434: xen: slirp: out-of-bounds read while parsing dhcp options</issue>
  <issue id="1047675" tracker="bnc">VUL-1: CVE-2017-10806: xen: usb-redirect: stack buffer overflow in debug logging</issue>
  <issue id="1051788" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227)</issue>
  <issue id="1032598" tracker="bnc">NVME devices get removed</issue>
  <issue id="1002573" tracker="bnc">Optimize LVM functions in block-dmmd</issue>
  <issue id="1046637" tracker="bnc">VUL-0: CVE-2017-10664: xen: qemu-nbd: server breaks with SIGPIPE upon client abort</issue>
  <issue id="1048920" tracker="bnc">VUL-0: CVE-2017-11334: xen: exec: oob access during dma operation allowing for DoS</issue>
  <issue id="1048920" tracker="bnc">VUL-0: CVE-2017-11334:  xen: exec: oob access during dma operation allowing for DoS</issue>
  <issue id="2017-12855" tracker="cve" />
  <issue id="2017-14316" tracker="cve" />
  <issue id="2017-14317" tracker="cve" />
  <issue id="2017-14319" tracker="cve" />
  <issue id="2017-11434" tracker="cve" />
  <issue id="2017-10806" tracker="cve" />
  <issue id="2017-11334" tracker="cve" />
  <issue id="2017-12135" tracker="cve" />
  <issue id="2017-12137" tracker="cve" />
  <issue id="2017-10664" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>charlesa</packager>
  <description>This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious
  guest to crash the host or potentially escalate privileges/leak information
  (XSA-226, bsc#1051787).
- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for
  privilege escalation (XSA-227, bsc#1051788).
- CVE-2017-11334: The address_space_write_continue function in exec.c allowed
  local guest OS privileged users to cause a denial of service (out-of-bounds
  access and guest instance crash) by leveraging use of qemu_map_ram_ptr to
  access guest ram block area (bsc#1048920).
- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest
  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP
  options string (bsc#1049578).
- CVE-2017-10806: Stack-based buffer overflow in hw/usb/redirect.c allowed
  local guest OS users to cause a denial of service via vectors related to
  logging debug messages (bsc#1047675).
- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote
  attackers to cause a denial of service (daemon crash) by disconnecting during 
  a server-to-client reply attempt (bsc#1046637).
- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to
  potentially leaking sensitive information (XSA-230, bsc#1052686).
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd
- bsc#1032598: Prevent removal of NVME devices
- bsc#1037413: Support for newer intel cpu's, mwait-idle driver and skylake
</description>
  <summary>Security update for xen</summary>
</patchinfo>
openSUSE Build Service is sponsored by