File _patchinfo of Package patchinfo.5575

<patchinfo incident="5575">
  <issue id="1056282" tracker="bnc">VUL-0: EMBARGOED: xen: insufficient grant unmapping checks for x86 PV guests (XSA-234)</issue>
  <issue id="1056281" tracker="bnc">VUL-0: EMBARGOED: xen: cxenstored: Race in domain cleanup (XSA-233)</issue>
  <issue id="1056280" tracker="bnc">VUL-0: EMBARGOED: xen: Missing check for grant table (XSA-232)</issue>
  <issue id="1056278" tracker="bnc">VUL-0: EMBARGOED: xen: Missing NUMA node parameter verification (XSA-231)</issue>
  <issue id="2017-14316" tracker="cve" />
  <issue id="2017-14317" tracker="cve" />
  <issue id="2017-14318" tracker="cve" />
  <issue id="2017-14319" tracker="cve" />
    <category>security</category>
  <rating>important</rating>
  <packager>charlesa</packager>
  <description>This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).
</description>
  <summary>Security update for xen</summary>
</patchinfo>

openSUSE Build Service is sponsored by