File _patchinfo of Package patchinfo.5576

<patchinfo incident="5576">
  <issue id="2017-14316" tracker="cve" />
  <issue id="2017-14317" tracker="cve" />
  <issue id="2017-14318" tracker="cve" />
  <issue id="2017-14319" tracker="cve" />
  <issue id="1055695" tracker="bnc">XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack</issue>
  <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
  <issue id="1056282" tracker="bnc">VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)</issue>
  <issue id="1056281" tracker="bnc">VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)</issue>
  <issue id="1056280" tracker="bnc">VUL-0: EMBARGOED: xen: Missing check for grant table (XSA-232)</issue>
  <issue id="1056278" tracker="bnc">VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)</issue>
  <rating>important</rating>
  <packager>charlesa</packager>
  <description>This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs
</description>
  <summary>Security update for xen</summary>
    <category>security</category>
</patchinfo>

openSUSE Build Service is sponsored by