Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP3:GA
patchinfo.5423
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.5423
<patchinfo incident="5423"> <packager>charlesa</packager> <issue tracker="bnc" id="1052686">VUL-0: CVE-2017-12855: xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230)</issue> <issue tracker="bnc" id="1002573">Optimize LVM functions in block-dmmd</issue> <issue tracker="bnc" id="1026236">Paravirtualized vs. fully virtualized migration - latter one much faster</issue> <issue tracker="bnc" id="1035231">migration of HVM domU does not use superpages on destination dom0</issue> <issue tracker="bnc" id="1037840">Xen-detect always shows HVM for PV guests</issue> <issue tracker="bnc" id="1055695">XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack</issue> <issue tracker="bnc" id="1046637">VUL-0: CVE-2017-10664: xen: qemu-nbd: server breaks with SIGPIPE upon client abort</issue> <issue tracker="bnc" id="1049578">VUL-1: CVE-2017-11434: xen: slirp: out-of-bounds read while parsing dhcp options</issue> <issue tracker="bnc" id="1051787">VUL-0: CVE-2017-12135: xen: possibly unbounded recursion in grant table code (XSA-226)</issue> <issue tracker="bnc" id="1051788">VUL-0: CVE-2017-12137: xen: x86: PV privilege escalation via map_grant_ref (XSA-227)</issue> <issue tracker="bnc" id="1051789">VUL-0: CVE-2017-12136: xen: grant_table: Race conditions with maptrack free list handling (XSA-228)</issue> <issue tracker="cve" id="2017-10664"></issue> <issue tracker="cve" id="2017-11434"></issue> <issue tracker="cve" id="2017-12135"></issue> <issue tracker="cve" id="2017-12136"></issue> <issue tracker="cve" id="2017-12137"></issue> <issue tracker="cve" id="2017-12855"></issue> <issue tracker="cve" id="2016-9603"></issue> <category>security</category> <rating>important</rating> <summary>Security update for xen</summary> <description>This update for xen to version 4.7.3 fixes several issues. These security issues were fixed: - CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious guest to crash the host or potentially escalate privileges/leak information (XSA-226, bsc#1051787). - CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for privilege escalation (XSA-227, bsc#1051788). - CVE-2017-12136: Race conditions with maptrack free list handling allows a malicious guest administrator to crash the host or escalate their privilege to that of the host (XSA-228, bsc#1051789). - CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP options string (bsc#1049578). - CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt (bsc#1046637). - CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to potentially leaking sensitive information (XSA-230 CVE-2017-12855). These non-security issues were fixed: - bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack - bsc#1035231: Migration of HVM domU did not use superpages on destination dom0 - bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd - bsc#1037840: Xen-detect always showed HVM for PV guests </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor