SUSE-SU-2017:1081-1

Source
https://www.suse.com/support/update/announcement/2017/suse-su-20171081-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2017:1081-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2017:1081-1
Related
Published
2017-04-20T13:47:43Z
Modified
2017-04-20T13:47:43Z
Summary
Security update for xen
Details

This update for xen fixes the following issues:

These security issues were fixed:

  • CVE-2017-7228: Broken check in memory_exchange() permited PV guest breakout (bsc#1030442).
  • XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host (bsc#1030144).
  • CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655).
  • CVE-2017-6414: Memory leak in the vcardapdunew function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object (bsc#1027570).
  • CVE-2017-6505: The ohciserviceed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors (bsc#1028235).
  • CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS (bsc#1026636).

These non-security issues were fixed:

  • bsc#1022555: Timeout in 'execution of /etc/xen/scripts/block add'
  • bsc#1029827: Forward port xenstored
References

Affected packages

SUSE:Linux Enterprise Software Development Kit 11 SP4 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_16-54.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-devel": "4.4.4_16-54.1"
        }
    ]
}

SUSE:Linux Enterprise Server 11 SP4 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_16-54.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-kmp-pae": "4.4.4_16_3.0.101_97-54.1",
            "xen-tools-domU": "4.4.4_16-54.1",
            "xen-kmp-default": "4.4.4_16_3.0.101_97-54.1",
            "xen-libs": "4.4.4_16-54.1",
            "xen-doc-html": "4.4.4_16-54.1",
            "xen-libs-32bit": "4.4.4_16-54.1",
            "xen-tools": "4.4.4_16-54.1",
            "xen": "4.4.4_16-54.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_16-54.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-kmp-pae": "4.4.4_16_3.0.101_97-54.1",
            "xen-tools-domU": "4.4.4_16-54.1",
            "xen-kmp-default": "4.4.4_16_3.0.101_97-54.1",
            "xen-libs": "4.4.4_16-54.1",
            "xen-doc-html": "4.4.4_16-54.1",
            "xen-libs-32bit": "4.4.4_16-54.1",
            "xen-tools": "4.4.4_16-54.1",
            "xen": "4.4.4_16-54.1"
        }
    ]
}