Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: SUSE-SU-2015:0022-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Software Development Kit 12, SUSE Linux Enterprise Desktop 12
Datum: Fr, 9. Januar 2015, 13:22
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030

Originalnachricht

   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0022-1
Rating: important
References: #826717 #866902 #882089 #889526 #896023 #897614
#897906 #898772 #900292 #901317 #903357 #903359
#903850 #903967 #903970 #905465 #905467 #906439

Cross-References: CVE-2013-3495 CVE-2014-5146 CVE-2014-5149
CVE-2014-8594 CVE-2014-8595 CVE-2014-8866
CVE-2014-8867 CVE-2014-9030
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

An update that solves 8 vulnerabilities and has 10 fixes is
now available.

Description:

xen was updated to fix nine security issues.

These security issues were fixed:
- Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling
(CVE-2014-9030).
- Insufficient bounding of "REP MOVS" to MMIO emulated inside the
hypervisor (CVE-2014-8867).
- Excessive checking in compatibility mode hypercall argument translation
(CVE-2014-8866).
- Guest user mode triggerable VM exits not handled by hypervisor
(bnc#9038500).
- Missing privilege level checks in x86 emulation of far branches
(CVE-2014-8595).
- Insufficient restrictions on certain MMU update hypercalls
(CVE-2014-8594).
- Long latency virtual-mmu operations are not preemptible (CVE-2014-5146,
CVE-2014-5149).
- Intel VT-d Interrupt Remapping engines can be evaded by native NMI
interrupts (CVE-2013-3495).

These non-security issues were fixed:
- Corrupted save/restore test leaves orphaned data in xenstore
(bnc#903357).
- Temporary migration name is not cleaned up after migration (bnc#903359).
- Xen save/restore of HVM guests cuts off disk and networking
(bnc#866902).
- increase limit domUloader to 32MB (bnc#901317).
- XEN Host crashes when assigning non-VF device (SR-IOV) to guest
(bnc#898772).
- Windows 2012 R2 fails to boot up with greater than 60 vcpus (bnc#882089).
- Restrict requires on grub2-x86_64-xen to x86_64 hosts
- Change default dump directory (bsc#900292).
- Update xen2libvirt.py to better detect and handle file formats
- libxc: check return values on mmap() and madvise() on
xc_alloc_hypercall_buffer() (bnc#897906).
- Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available
(bnc#897614).
- Adjust xentop column layout (bnc#896023).


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12:

zypper in -t patch SUSE-SLE-SDK-12-2015-8

- SUSE Linux Enterprise Server 12:

zypper in -t patch SUSE-SLE-SERVER-12-2015-8

- SUSE Linux Enterprise Desktop 12:

zypper in -t patch SUSE-SLE-DESKTOP-12-2015-8

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 12 (x86_64):

xen-debugsource-4.4.1_08-5.2
xen-devel-4.4.1_08-5.2

- SUSE Linux Enterprise Server 12 (x86_64):

xen-4.4.1_08-5.2
xen-debugsource-4.4.1_08-5.2
xen-doc-html-4.4.1_08-5.2
xen-kmp-default-4.4.1_08_k3.12.28_4-5.2
xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2
xen-libs-32bit-4.4.1_08-5.2
xen-libs-4.4.1_08-5.2
xen-libs-debuginfo-32bit-4.4.1_08-5.2
xen-libs-debuginfo-4.4.1_08-5.2
xen-tools-4.4.1_08-5.2
xen-tools-debuginfo-4.4.1_08-5.2
xen-tools-domU-4.4.1_08-5.2
xen-tools-domU-debuginfo-4.4.1_08-5.2

- SUSE Linux Enterprise Desktop 12 (x86_64):

xen-4.4.1_08-5.2
xen-debugsource-4.4.1_08-5.2
xen-kmp-default-4.4.1_08_k3.12.28_4-5.2
xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2
xen-libs-32bit-4.4.1_08-5.2
xen-libs-4.4.1_08-5.2
xen-libs-debuginfo-32bit-4.4.1_08-5.2
xen-libs-debuginfo-4.4.1_08-5.2


References:

http://support.novell.com/security/cve/CVE-2013-3495.html
http://support.novell.com/security/cve/CVE-2014-5146.html
http://support.novell.com/security/cve/CVE-2014-5149.html
http://support.novell.com/security/cve/CVE-2014-8594.html
http://support.novell.com/security/cve/CVE-2014-8595.html
http://support.novell.com/security/cve/CVE-2014-8866.html
http://support.novell.com/security/cve/CVE-2014-8867.html
http://support.novell.com/security/cve/CVE-2014-9030.html
https://bugzilla.suse.com/show_bug.cgi?id=826717
https://bugzilla.suse.com/show_bug.cgi?id=866902
https://bugzilla.suse.com/show_bug.cgi?id=882089
https://bugzilla.suse.com/show_bug.cgi?id=889526
https://bugzilla.suse.com/show_bug.cgi?id=896023
https://bugzilla.suse.com/show_bug.cgi?id=897614
https://bugzilla.suse.com/show_bug.cgi?id=897906
https://bugzilla.suse.com/show_bug.cgi?id=898772
https://bugzilla.suse.com/show_bug.cgi?id=900292
https://bugzilla.suse.com/show_bug.cgi?id=901317
https://bugzilla.suse.com/show_bug.cgi?id=903357
https://bugzilla.suse.com/show_bug.cgi?id=903359
https://bugzilla.suse.com/show_bug.cgi?id=903850
https://bugzilla.suse.com/show_bug.cgi?id=903967
https://bugzilla.suse.com/show_bug.cgi?id=903970
https://bugzilla.suse.com/show_bug.cgi?id=905465
https://bugzilla.suse.com/show_bug.cgi?id=905467
https://bugzilla.suse.com/show_bug.cgi?id=906439

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung