File _patchinfo of Package patchinfo.4507
<patchinfo incident="4507">
<issue id="1028655" tracker="bnc">VUL-0: CVE-2016-9603: xen: Cirrus VGA Heap overflow via display refresh (XSA-211)</issue>
<issue id="1029827" tracker="bnc">Forward port xenstored</issue>
<issue id="1022555" tracker="bnc">L3: Timeout in "execution of /etc/xen/scripts/block add"</issue>
<issue id="1028235" tracker="bnc">VUL-0: CVE-2017-6505: xen: qemu: usb: an infinite loop issue in ohci_service_ed_list</issue>
<issue id="1030144" tracker="bnc">VUL-0: EMBARGOED: xen: xenstore denial of service via repeated update (XSA-206)</issue>
<issue id="1030442" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-7228: xen: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212)</issue>
<issue id="1027570" tracker="bnc">VUL-0: CVE-2017-6414: xen: libcacard: host memory leakage while creating new APDU</issue>
<issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
<issue id="1026636" tracker="bnc">VUL-1: CVE-2017-2633: xen: qemu: VNC: memory corruption due to unchecked resolution limit</issue>
<issue id="2017-7228" tracker="cve" />
<issue id="2017-6505" tracker="cve" />
<issue id="2016-9603" tracker="cve" />
<issue id="2017-2633" tracker="cve" />
<issue id="2017-6414" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>charlesa</packager>
<description>
This update for xen fixes the following issues:
These security issues were fixed:
- CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
- XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
- CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
- CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
- CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS (bsc#1026636).
- CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655).
These non-security issues were fixed:
- bsc#1022555: Timeout in "execution of /etc/xen/scripts/block add"
- bsc#1029827: Forward port xenstored
</description>
<summary>Security update for xen</summary>
</patchinfo>