File _patchinfo of Package patchinfo.3242
<patchinfo incident="3242"> <issue id="959330" tracker="bnc">Guest migrations using virsh results in error "Internal error: received hangup / error event on socket"</issue> <issue id="995789" tracker="bnc">VUL-0: CVE-2016-7093: xen: x86: Mishandling of instruction pointer truncation during emulation (XSA-186)</issue> <issue id="993665" tracker="bnc">Migration of xen guests finishes in: One or more references were leaked after disconnect from the hypervisor</issue> <issue id="988676" tracker="bnc">VUL-0: CVE-2016-6259: xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183)</issue> <issue id="992224" tracker="bnc">[HPS Bug] During boot of Xen Hypervisor, Failed to get contiguous memory for DMA from Xen</issue> <issue id="959552" tracker="bnc">Migration of HVM guest leads into libvirt segmentation fault</issue> <issue id="994775" tracker="bnc">VUL-0: CVE-2016-6833: xen: net: vmxnet3: use after free while writing</issue> <issue id="953518" tracker="bnc">disks added via SCSI controller are visible twice on HVM XEN guest systems</issue> <issue id="995792" tracker="bnc">VUL-0: CVE-2016-7094: xen: x86 HVM: Overflow of sh_ctxt->seg_reg[] (XSA-187)</issue> <issue id="994772" tracker="bnc">VUL-0: CVE-2016-6888: xen: Integer overflow in packet initialisation in VMXNET3 device driver. Aprivileged user inside guest c...</issue> <issue id="990970" tracker="bnc">xen-4.4.4_02-32.1 add PMU support for Intel E7-8867 v4 (fam=6, model=79)</issue> <issue id="994625" tracker="bnc">VUL-0: CVE-2016-6835: xen: qemu: Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 deviceemulation.</issue> <issue id="995785" tracker="bnc">VUL-0: CVE-2016-7092: xen: x86: Disallow L3 recursive pagetable for 32-bit PV guests (XSA-185)</issue> <issue id="991934" tracker="bnc">xen hypervisor crash in csched_acct</issue> <issue id="994761" tracker="bnc">VUL-0: CVE-2016-6836: xen: qemu: net: vmxnet: Information leakage in vmxnet3_complete_packet</issue> <issue id="990500" tracker="bnc">VM virsh migration fails with keepalive error: ":virKeepAliveTimerInternal:143 : No response from client"</issue> <issue id="988675" tracker="bnc">VUL-0: CVE-2016-6258: xen: x86: Privilege escalation in PV guests (XSA-182)</issue> <issue id="994421" tracker="bnc">VUL-0: CVE-2016-6834: xen: an infinite loop during packet fragmentation</issue> <issue id="971949" tracker="bnc">XEN: "option `' not supported" is displayed within guest migration using xl stack</issue> <issue id="955104" tracker="bnc">Virsh reports error "one or more references were leaked after disconnect from hypervisor" when "virsh save" failed due to "no response from client after 6 keepalive messages"</issue> <issue id="970135" tracker="bnc">new virtualization project clock test randomly fails on Xen</issue> <issue id="2016-6888" tracker="cve" /> <issue id="2016-6258" tracker="cve" /> <issue id="2016-6259" tracker="cve" /> <issue id="2016-6836" tracker="cve" /> <issue id="2016-7093" tracker="cve" /> <issue id="2016-7092" tracker="cve" /> <issue id="2016-6834" tracker="cve" /> <issue id="2016-6835" tracker="cve" /> <issue id="2016-6833" tracker="cve" /> <issue id="2016-7094" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description>This update for xen fixes several issues. These security issues were fixed: - CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785). - CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789). - CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792). - CVE-2016-6836: Information leakage in vmxnet3_complete_packet (bsc#994761). - CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. Aprivileged user inside guest c... (bsc#994772). - CVE-2016-6833: Use after free while writing (bsc#994775). - CVE-2016-6835: Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 deviceemulation. (bsc#994625). - CVE-2016-6834: An infinite loop during packet fragmentation (bsc#994421). - CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675). - CVE-2016-6259: Xen did not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allowed local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check (bsc#988676). These non-security issues were fixed: - bsc#991934: Hypervisor crash in csched_acct - bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA - bsc#955104: Virsh reports error "one or more references were leaked after disconnect from hypervisor" when "virsh save" failed due to "no response from client after 6 keepalive messages" - bsc#959552: Migration of HVM guest leads into libvirt segmentation fault - bsc#993665: Migration of xen guests finishes in: One or more references were leaked after disconnect from the hypervisor - bsc#959330: Guest migrations using virsh results in error "Internal error: received hangup / error event on socket" - bsc#990500: VM virsh migration fails with keepalive error: ":virKeepAliveTimerInternal:143 : No response from client" - bsc#953518: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol - bsc#953518: xen_platform: unplug also SCSI disks in qemu-xen - bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live - bsc#970135: New virtualization project clock test randomly fails on Xen - bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79) </description> <summary>Security update for xen</summary> </patchinfo>