File _patchinfo of Package patchinfo.5576
<patchinfo incident="5576">
<issue id="2017-14316" tracker="cve" />
<issue id="2017-14317" tracker="cve" />
<issue id="2017-14318" tracker="cve" />
<issue id="2017-14319" tracker="cve" />
<issue id="1055695" tracker="bnc">XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack</issue>
<issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
<issue id="1056282" tracker="bnc">VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)</issue>
<issue id="1056281" tracker="bnc">VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)</issue>
<issue id="1056280" tracker="bnc">VUL-0: EMBARGOED: xen: Missing check for grant table (XSA-232)</issue>
<issue id="1056278" tracker="bnc">VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)</issue>
<rating>important</rating>
<packager>charlesa</packager>
<description>This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
internal array allowed attackers using crafted hypercalls to execute
arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
tables, allowing a malicious guest to crash the host or for x86 PV guests to
potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
bsc#1056282).
These non-security issues were fixed:
- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
</description>
<summary>Security update for xen</summary>
<category>security</category>
</patchinfo>