{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.5.3_10-20.1","xen-kmp-default":"4.5.3_10_k3.12.62_60.62-20.1","xen-libs":"4.5.3_10-20.1","xen-libs-32bit":"4.5.3_10-20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.5.3_10-20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen-devel":"4.5.3_10-20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.5.3_10-20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.5.3_10-20.1","xen-doc-html":"4.5.3_10-20.1","xen-kmp-default":"4.5.3_10_k3.12.62_60.62-20.1","xen-libs":"4.5.3_10-20.1","xen-libs-32bit":"4.5.3_10-20.1","xen-tools":"4.5.3_10-20.1","xen-tools-domU":"4.5.3_10-20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.5.3_10-20.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.5.3_10-20.1","xen-doc-html":"4.5.3_10-20.1","xen-kmp-default":"4.5.3_10_k3.12.62_60.62-20.1","xen-libs":"4.5.3_10-20.1","xen-libs-32bit":"4.5.3_10-20.1","xen-tools":"4.5.3_10-20.1","xen-tools-domU":"4.5.3_10-20.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.5.3_10-20.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes several issues.\n\nThese security issues were fixed:\n- CVE-2016-7092: The get_page_from_l3e function in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables (bsc#995785).\n- CVE-2016-7093: Xen allowed local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation (bsc#995789).\n- CVE-2016-7094: Buffer overflow in Xen allowed local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update (bsc#995792).\n- CVE-2016-6836: Information leakage in vmxnet3_complete_packet (bsc#994761).\n- CVE-2016-6888: Integer overflow in packet initialisation in VMXNET3 device driver. Aprivileged user inside guest c... (bsc#994772).\n- CVE-2016-6833: Use after free while writing (bsc#994775).\n- CVE-2016-6835: Buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 deviceemulation. (bsc#994625).\n- CVE-2016-6834: An infinite loop during packet fragmentation (bsc#994421).\n- CVE-2016-6258: The PV pagetable code in arch/x86/mm.c in Xen allowed local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries (bsc#988675).\n- CVE-2016-6259: Xen did not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allowed local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check (bsc#988676).\n\nThese non-security issues were fixed:\n- bsc#991934: Hypervisor crash in csched_acct\n- bsc#992224: During boot of Xen Hypervisor, failed to get contiguous memory for DMA\n- bsc#955104: Virsh reports error 'one or more references were leaked after disconnect from hypervisor' when 'virsh save' failed due to 'no response from client after 6 keepalive messages'\n- bsc#959552: Migration of HVM guest leads into libvirt segmentation fault\n- bsc#993665: Migration of xen guests finishes in: One or more references were leaked after disconnect from the hypervisor\n- bsc#959330: Guest migrations using virsh results in error 'Internal error: received hangup / error event on socket'\n- bsc#990500: VM virsh migration fails with keepalive error: ':virKeepAliveTimerInternal:143 : No response from client'\n- bsc#953518: Unplug also SCSI disks in qemu-xen-traditional for upstream unplug protocol\n- bsc#953518: xen_platform: unplug also SCSI disks in qemu-xen\n- bsc#971949: xl: Support (by ignoring) xl migrate --live. xl migrations are always live\n- bsc#970135: New virtualization project clock test randomly fails on Xen\n- bsc#990970: Add PMU support for Intel E7-8867 v4 (fam=6, model=79)\n","id":"SUSE-SU-2016:2473-1","modified":"2016-10-07T09:05:05Z","published":"2016-10-07T09:05:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162473-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/953518"},{"type":"REPORT","url":"https://bugzilla.suse.com/955104"},{"type":"REPORT","url":"https://bugzilla.suse.com/959330"},{"type":"REPORT","url":"https://bugzilla.suse.com/959552"},{"type":"REPORT","url":"https://bugzilla.suse.com/970135"},{"type":"REPORT","url":"https://bugzilla.suse.com/971949"},{"type":"REPORT","url":"https://bugzilla.suse.com/988675"},{"type":"REPORT","url":"https://bugzilla.suse.com/988676"},{"type":"REPORT","url":"https://bugzilla.suse.com/990500"},{"type":"REPORT","url":"https://bugzilla.suse.com/990970"},{"type":"REPORT","url":"https://bugzilla.suse.com/991934"},{"type":"REPORT","url":"https://bugzilla.suse.com/992224"},{"type":"REPORT","url":"https://bugzilla.suse.com/993665"},{"type":"REPORT","url":"https://bugzilla.suse.com/994421"},{"type":"REPORT","url":"https://bugzilla.suse.com/994625"},{"type":"REPORT","url":"https://bugzilla.suse.com/994761"},{"type":"REPORT","url":"https://bugzilla.suse.com/994772"},{"type":"REPORT","url":"https://bugzilla.suse.com/994775"},{"type":"REPORT","url":"https://bugzilla.suse.com/995785"},{"type":"REPORT","url":"https://bugzilla.suse.com/995789"},{"type":"REPORT","url":"https://bugzilla.suse.com/995792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6833"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6888"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7092"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-7094"}],"related":["CVE-2016-6258","CVE-2016-6259","CVE-2016-6833","CVE-2016-6834","CVE-2016-6835","CVE-2016-6836","CVE-2016-6888","CVE-2016-7092","CVE-2016-7093","CVE-2016-7094"],"summary":"Security update for xen","upstream":["CVE-2016-6258","CVE-2016-6259","CVE-2016-6833","CVE-2016-6834","CVE-2016-6835","CVE-2016-6836","CVE-2016-6888","CVE-2016-7092","CVE-2016-7093","CVE-2016-7094"]}