openSUSE: 2017:1826-1: important: xen
Description
This update for xen fixes several issues. These security issues were fixed: - CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882) - CVE-2017-10913 CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893) - CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915) - CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924) - CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931) - CVE-2017-10920, CVE-2017-10921, CVE-2017-10922: Grant table operations mishandled reference counts allowing ma...
Read the Full Advisory
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-799=1 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE Leap 42.2 (i586 x86_64): xen-debugsource-4.7.2_06-11.9.1 xen-devel-4.7.2_06-11.9.1 xen-libs-4.7.2_06-11.9.1 xen-libs-debuginfo-4.7.2_06-11.9.1 xen-tools-domU-4.7.2_06-11.9.1 xen-tools-domU-debuginfo-4.7.2_06-11.9.1 - openSUSE Leap 42.2 (x86_64): xen-4.7.2_06-11.9.1 xen-doc-html-4.7.2_06-11.9.1 xen-libs-32bit-4.7.2_06-11.9.1 xen-libs-debuginfo-32bit-4.7.2_06-11.9.1 xen-tools-4.7.2_06-11.9.1 xen-tools-debuginfo-4.7.2_06-11.9.1
References
https://www.suse.com/security/cve/CVE-2017-10912.html https://www.suse.com/security/cve/CVE-2017-10913.html https://www.suse.com/security/cve/CVE-2017-10914.html https://www.suse.com/security/cve/CVE-2017-10915.html https://www.suse.com/security/cve/CVE-2017-10917.html https://www.suse.com/security/cve/CVE-2017-10918.html https://www.suse.com/security/cve/CVE-2017-10920.html https://www.suse.com/security/cve/CVE-2017-10921.html https://www.suse.com/security/cve/CVE-2017-10922.html https://www.suse.com/security/cve/CVE-2017-8309.html https://www.suse.com/security/cve/CVE-2017-9330.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1035642 https://bugzilla.suse.com/1037243 https://bugzilla.suse.com/1042160 https://bugzilla.suse.com/1042882 https://bugzilla.suse.com/1042893 https://bugzilla.suse.com/1042915 https://bugzilla.suse.com/1042923 https://bugzilla.suse.com/1042924 https://bugzilla.suse.com/1042931 https://bugzilla.suse.com/1042938--