<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:2514-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-09-17T18:55:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-09-17T18:55:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-09-17T18:55:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes several issues.

These security issues were fixed:

- CVE-2017-14316: Missing bound check in function `alloc_heap_pages` for an
  internal array allowed attackers using crafted hypercalls to execute
  arbitrary code within Xen (XSA-231, bsc#1056278)
- CVE-2017-14318: The function __gnttab_cache_flush missed a check for grant
  tables, allowing a malicious guest to crash the host or for x86 PV guests to
  potentially escalate privileges (XSA-232, bsc#1056280)
- CVE-2017-14317: A race in cxenstored may have cause a double-free allowind for
  DoS of the xenstored daemon (XSA-233, bsc#1056281).
- CVE-2017-14319: An error while handling grant mappings allowed malicious or
  buggy x86 PV guest to escalate its privileges or crash the hypervisor (XSA-234,
  bsc#1056282).

These non-security issues were fixed:

- bsc#1057358: Fixed boot into SUSE Linux Enterprise 12.3 with secure boot
- bsc#1055695: Fixed restoring updates for HVM guests for ballooned domUs

This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:2514-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.9.0_12-7.1">
      <FullProductName ProductID="xen-4.9.0_12-7.1">xen-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.9.0_12-7.1">
      <FullProductName ProductID="xen-devel-4.9.0_12-7.1">xen-devel-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.9.0_12-7.1">
      <FullProductName ProductID="xen-doc-html-4.9.0_12-7.1">xen-doc-html-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.9.0_12-7.1">
      <FullProductName ProductID="xen-libs-4.9.0_12-7.1">xen-libs-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.9.0_12-7.1">
      <FullProductName ProductID="xen-tools-4.9.0_12-7.1">xen-tools-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.9.0_12-7.1">
      <FullProductName ProductID="xen-tools-domU-4.9.0_12-7.1">xen-tools-domU-4.9.0_12-7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-4.9.0_12-7.1">xen-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-devel-4.9.0_12-7.1">xen-devel-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-doc-html-4.9.0_12-7.1">xen-doc-html-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-libs-4.9.0_12-7.1">xen-libs-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-tools-4.9.0_12-7.1">xen-tools-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.0_12-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-tools-domU-4.9.0_12-7.1">xen-tools-domU-4.9.0_12-7.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node &gt;= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.</Note>
    </Notes>
    <CVE>CVE-2017-14316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.0_12-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14316.html</URL>
        <Description>CVE-2017-14316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056278</URL>
        <Description>SUSE Bug 1056278</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).</Note>
    </Notes>
    <CVE>CVE-2017-14317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.0_12-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14317.html</URL>
        <Description>CVE-2017-14317</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056281</URL>
        <Description>SUSE Bug 1056281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page in question. However, the function does not check to see if the owning domain actually has a grant table or not. Some special domains, such as `DOMID_XEN`, `DOMID_IO` and `DOMID_COW` are created without grant tables. Hence, if __gnttab_cache_flush operates on a page owned by these special domains, it will attempt to dereference a NULL pointer in the domain struct.</Note>
    </Notes>
    <CVE>CVE-2017-14318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.0_12-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:L/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14318.html</URL>
        <Description>CVE-2017-14318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056280</URL>
        <Description>SUSE Bug 1056280</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account.</Note>
    </Notes>
    <CVE>CVE-2017-14319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.0_12-7.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.0_12-7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14319.html</URL>
        <Description>CVE-2017-14319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056282</URL>
        <Description>SUSE Bug 1056282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
