Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: openSUSE-SU-2015:0226-1
Distribution: SUSE
Plattformen: SUSE openSUSE 13.1
Datum: Fr, 6. Februar 2015, 11:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0361

Originalnachricht

   openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:0226-1
Rating: important
References: #826717 #866902 #882089 #889526 #900292 #901317
#903357 #903359 #903850 #903967 #903970 #905465
#905467 #906439 #906996 #910681
Cross-References: CVE-2013-3495 CVE-2014-5146 CVE-2014-5149
CVE-2014-8594 CVE-2014-8595 CVE-2014-8866
CVE-2014-8867 CVE-2014-9030 CVE-2014-9065
CVE-2014-9066 CVE-2015-0361
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that solves 11 vulnerabilities and has 5 fixes is
now available.

Description:


The virtualization software XEN was updated to version 4.3.3 and also to
fix bugs and security issues.

Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to use
after free on hvm guest teardown

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

CVE-2014-9030: XSA-113: Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling

CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to
MMIO
emulated inside the hypervisor

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode
hypercall argument translation

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86
emulation of far branches

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU
update hypercalls

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be
evaded by native NMI interrupts

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu
operations are not preemptible

Bugs fixed:
- bnc#903357 - Corrupted save/restore test leaves orphaned data in xenstore

- bnc#903359 - Temporary migration name is not cleaned up after migration

- bnc#903850 - VUL-0: Xen: guest user mode triggerable VM exits not
handled by hypervisor

- bnc#866902 - L3: Xen save/restore of HVM guests cuts off disk and
networking

- bnc#901317 - L3: increase limit domUloader to 32MB domUloader.py

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus

- bsc#900292 - xl: change default dump directory

- Update to Xen 4.3.3


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-113=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

xen-debugsource-4.3.3_04-34.1
xen-devel-4.3.3_04-34.1
xen-kmp-default-4.3.3_04_k3.11.10_25-34.1
xen-kmp-default-debuginfo-4.3.3_04_k3.11.10_25-34.1
xen-kmp-desktop-4.3.3_04_k3.11.10_25-34.1
xen-kmp-desktop-debuginfo-4.3.3_04_k3.11.10_25-34.1
xen-libs-4.3.3_04-34.1
xen-libs-debuginfo-4.3.3_04-34.1
xen-tools-domU-4.3.3_04-34.1
xen-tools-domU-debuginfo-4.3.3_04-34.1

- openSUSE 13.1 (x86_64):

xen-4.3.3_04-34.1
xen-doc-html-4.3.3_04-34.1
xen-libs-32bit-4.3.3_04-34.1
xen-libs-debuginfo-32bit-4.3.3_04-34.1
xen-tools-4.3.3_04-34.1
xen-tools-debuginfo-4.3.3_04-34.1
xen-xend-tools-4.3.3_04-34.1
xen-xend-tools-debuginfo-4.3.3_04-34.1

- openSUSE 13.1 (i586):

xen-kmp-pae-4.3.3_04_k3.11.10_25-34.1
xen-kmp-pae-debuginfo-4.3.3_04_k3.11.10_25-34.1


References:

http://support.novell.com/security/cve/CVE-2013-3495.html
http://support.novell.com/security/cve/CVE-2014-5146.html
http://support.novell.com/security/cve/CVE-2014-5149.html
http://support.novell.com/security/cve/CVE-2014-8594.html
http://support.novell.com/security/cve/CVE-2014-8595.html
http://support.novell.com/security/cve/CVE-2014-8866.html
http://support.novell.com/security/cve/CVE-2014-8867.html
http://support.novell.com/security/cve/CVE-2014-9030.html
http://support.novell.com/security/cve/CVE-2014-9065.html
http://support.novell.com/security/cve/CVE-2014-9066.html
http://support.novell.com/security/cve/CVE-2015-0361.html
https://bugzilla.suse.com/show_bug.cgi?id=826717
https://bugzilla.suse.com/show_bug.cgi?id=866902
https://bugzilla.suse.com/show_bug.cgi?id=882089
https://bugzilla.suse.com/show_bug.cgi?id=889526
https://bugzilla.suse.com/show_bug.cgi?id=900292
https://bugzilla.suse.com/show_bug.cgi?id=901317
https://bugzilla.suse.com/show_bug.cgi?id=903357
https://bugzilla.suse.com/show_bug.cgi?id=903359
https://bugzilla.suse.com/show_bug.cgi?id=903850
https://bugzilla.suse.com/show_bug.cgi?id=903967
https://bugzilla.suse.com/show_bug.cgi?id=903970
https://bugzilla.suse.com/show_bug.cgi?id=905465
https://bugzilla.suse.com/show_bug.cgi?id=905467
https://bugzilla.suse.com/show_bug.cgi?id=906439
https://bugzilla.suse.com/show_bug.cgi?id=906996
https://bugzilla.suse.com/show_bug.cgi?id=910681

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung