{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.9.0_11-3.9.1","xen-doc-html":"4.9.0_11-3.9.1","xen-libs":"4.9.0_11-3.9.1","xen-libs-32bit":"4.9.0_11-3.9.1","xen-tools":"4.9.0_11-3.9.1","xen-tools-domU":"4.9.0_11-3.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0_11-3.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.9.0_11-3.9.1","xen-doc-html":"4.9.0_11-3.9.1","xen-libs":"4.9.0_11-3.9.1","xen-libs-32bit":"4.9.0_11-3.9.1","xen-tools":"4.9.0_11-3.9.1","xen-tools-domU":"4.9.0_11-3.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.0_11-3.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-12135: Unbounded recursion in grant table code allowed a malicious\n  guest to crash the host or potentially escalate privileges/leak information\n  (XSA-226, bsc#1051787).\n- CVE-2017-12137: Incorrectly-aligned updates to pagetables allowed for\n  privilege escalation (XSA-227, bsc#1051788).\n- CVE-2017-12136: Race conditions with maptrack free list handling allows a\n  malicious guest administrator to crash the host or escalate their privilege to\n  that of the host (XSA-228, bsc#1051789).\n- CVE-2017-11434: The dhcp_decode function in slirp/bootp.c allowed local guest\n  OS users to cause a denial of service (out-of-bounds read) via a crafted DHCP\n  options string (bsc#1049578).\n- CVE-2017-10664: qemu-nbd did not ignore SIGPIPE, which allowed remote\n  attackers to cause a denial of service (daemon crash) by disconnecting during a\n  server-to-client reply attempt (bsc#1046637).\n- CVE-2017-12855: Premature clearing of GTF_writing / GTF_reading lead to\n  potentially leaking sensitive information (XSA-230 bsc#1052686.\n\nThese non-security issues were fixed:\n\n- bsc#1055695: XEN: 11SP4 and 12SP3 HVM guests can not be restored after the save using xl stack\n- bsc#1035231: Migration of HVM domU did not use superpages on destination dom0\n- bsc#1002573: Optimized LVM functions in block-dmmd block-dmmd\n","id":"SUSE-SU-2017:2327-2","modified":"2017-11-16T10:21:10Z","published":"2017-11-16T10:21:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20172327-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1002573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1026236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1035231"},{"type":"REPORT","url":"https://bugzilla.suse.com/1046637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1049578"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051788"},{"type":"REPORT","url":"https://bugzilla.suse.com/1051789"},{"type":"REPORT","url":"https://bugzilla.suse.com/1052686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1055695"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-10664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-11434"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12135"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12136"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12137"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2017-12855"}],"related":["CVE-2017-10664","CVE-2017-11434","CVE-2017-12135","CVE-2017-12136","CVE-2017-12137","CVE-2017-12855"],"summary":"Security update for xen","upstream":["CVE-2017-10664","CVE-2017-11434","CVE-2017-12135","CVE-2017-12136","CVE-2017-12137","CVE-2017-12855"]}