Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.4219
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.4219
<patchinfo incident="4219"> <issue id="1023004" tracker="bnc">VUL-0: CVE-2017-2615: kvm: qemu: display: cirrus: oob access while doing bitblt copy backward mode [XSA-208]</issue> <issue id="1000195" tracker="bnc">SLES 11 SP3 with XEN kernel stop booting with Panic on CPU0</issue> <issue id="1024307" tracker="bnc">VUL-0: CVE-2017-5898: xen: usb: integer overflow in emulated_apdu_from_guest</issue> <issue id="1024186" tracker="bnc">VUL-0: CVE-2017-5856: xen: scsi/megasas: host memory leakage in megasas_handle_dcmd</issue> <issue id="1024183" tracker="bnc">VUL-0: CVE-2016-10155: xen: watchdog: memory leakage in virtual hardware watchdog wdt_i6300esb</issue> <issue id="1014507" tracker="bnc">VUL-0: CVE-2016-9911: xen: usb: ehci: memory leakage in ehci_init_transfer</issue> <issue id="1022627" tracker="bnc">VUL-1: CVE-2017-5579: xen: qemu serial: host memory leakage in 16550A UART emulation</issue> <issue id="1013657" tracker="bnc">VUL-0: CVE-2016-9776: xen: qemu: net: mcf_fec: infinite loop while receiving data in mcf_fec_receive</issue> <issue id="1024834" tracker="bnc">VUL-0: EMBARGOED: CVE-2017-2620: xen: cirrus_bitblt_cputovideo does not check if memory region is safe (XSA-209)</issue> <issue id="1015169" tracker="bnc">VUL-0: CVE-2016-9921, CVE-2016-9922: xen: qemu: display: cirrus_vga: a divide by zero in cirrus_do_copy</issue> <issue id="1025188" tracker="bnc">VUL-0: CVE-2017-5973: xen: usb:infinite loop while doing control transfer in xhci_kick_epctx</issue> <issue id="1013668" tracker="bnc">VUL-0: CVE-2016-9101: xen: qemu: net: eepro100 memory leakage at device unplug</issue> <issue id="1016340" tracker="bnc">VUL-0: CVE-2016-10013: xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204)</issue> <issue id="907805" tracker="bnc">VUL-0: CVE-2014-8106: qemu: cirrus: insufficient blit region checks</issue> <issue id="1022871" tracker="bnc">VUL-0: xen: memory leak when destroying guest without PT devices (XSA-207)</issue> <issue id="1014490" tracker="bnc">VUL-0: CVE-2016-9907: xen: usb: redirector: memory leakage when destroying redirector</issue> <issue id="1002496" tracker="bnc">Adding support for reloading clvm in block-dmmd</issue> <issue id="2016-9921" tracker="cve" /> <issue id="2017-2615" tracker="cve" /> <issue id="2016-9776" tracker="cve" /> <issue id="2016-9922" tracker="cve" /> <issue id="2016-10155" tracker="cve" /> <issue id="2016-9101" tracker="cve" /> <issue id="2017-5856" tracker="cve" /> <issue id="2017-5898" tracker="cve" /> <issue id="2017-2620" tracker="cve" /> <issue id="2014-8106" tracker="cve" /> <issue id="2017-5579" tracker="cve" /> <issue id="2016-9907" tracker="cve" /> <issue id="2016-9911" tracker="cve" /> <issue id="2017-5973" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description> This update for xen fixes several issues. These security issues were fixed: - CVE-2017-5973: A infinite loop while doing control transfer in xhci_kick_epctx allowed privileged user inside the guest to crash the host process resulting in DoS (bsc#1025188) - CVE-2016-10155: The virtual hardware watchdog 'wdt_i6300esb' was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1024183) - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation (bsc#1024834) - CVE-2017-5856: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a memory leakage issue allowing a privileged user to leak host memory resulting in DoS (bsc#1024186) - CVE-2017-5898: The CCID Card device emulator support was vulnerable to an integer overflow flaw allowing a privileged user to crash the Qemu process on the host resulting in DoS (bsc#1024307) - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation (bsc#1023004) - CVE-2014-8106: A heap-based buffer overflow in the Cirrus VGA emulator allowed local guest users to execute arbitrary code via vectors related to blit regions (bsc#907805). - A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service (DoS) (bsc#1022871) - CVE-2017-5579: The 16550A UART serial device emulation support was vulnerable to a memory leakage issue allowing a privileged user to cause a DoS and/or potentially crash the Qemu process on the host (bsc#1022627) - CVE-2016-9907: The USB redirector usb-guest support was vulnerable to a memory leakage flaw when destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could have used this issue to leak host memory, resulting in DoS for a host (bsc#1014490) - CVE-2016-9911: The USB EHCI Emulation support was vulnerable to a memory leakage issue while processing packet data in 'ehci_init_transfer'. A guest user/process could have used this issue to leak host memory, resulting in DoS for the host (bsc#1014507) - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-9922: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS (bsc#1015169) - CVE-2016-9101: A memory leak in hw/net/eepro100.c allowed local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device (bsc#1013668) - CVE-2016-9776: The ColdFire Fast Ethernet Controller emulator support was vulnerable to an infinite loop issue while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could have used this issue to crash the Qemu process on the host leading to DoS (bsc#1013657) These non-security issues were fixed: - bsc#1000195: Prevent panic on CPU0 while booting on SLES 11 SP3 - bsc#1002496: Added support for reloading clvm in block-dmmd block-dmmd </description> <summary>Security update for xen</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor