File _patchinfo of Package patchinfo.5575
<patchinfo incident="5575">
<issue id="1056282" tracker="bnc">VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)</issue>
<issue id="1056281" tracker="bnc">VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)</issue>
<issue id="1056280" tracker="bnc">VUL-0: EMBARGOED: xen: Missing check for grant table (XSA-232)</issue>
<issue id="1056278" tracker="bnc">VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)</issue>
<issue id="2017-14316" tracker="cve" />
<issue id="2017-14317" tracker="cve" />
<issue id="2017-14318" tracker="cve" />
<issue id="2017-14319" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>charlesa</packager>
<description>This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
internal array allowed attackers using crafted hypercalls to execute
arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
tables, allowing a malicious guest to crash the host or for x86 PV guests to
potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
bsc#1056282).
</description>
<summary>Security update for xen</summary>
</patchinfo>