Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: SUSE-SU-2016:0658-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 10 SP4 LTSS
Datum: Fr, 4. März 2016, 22:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222

Originalnachricht

   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:0658-1
Rating: important
References: #877642 #932267 #944463 #950706 #953527 #954405
#956408 #956411 #957988 #958009 #958493 #958523
#962360
Cross-References: CVE-2014-0222 CVE-2015-4037 CVE-2015-5239
CVE-2015-5307 CVE-2015-7504 CVE-2015-7512
CVE-2015-7971 CVE-2015-8104 CVE-2015-8339
CVE-2015-8340 CVE-2015-8504 CVE-2015-8550
CVE-2015-8555
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

An update that fixes 13 vulnerabilities is now available.

Description:


Xen was updated to fix the following vulnerabilities:

* CVE-2014-0222: Qcow1 L2 table size integer overflows (bsc#877642)
* CVE-2015-4037: Insecure temporary file use in /net/slirp.c
(bsc#932267)
* CVE-2015-5239: Integer overflow in vnc_client_read() and
protocol_client_msg() (bsc#944463)
* CVE-2015-7504: Heap buffer overflow vulnerability in pcnet emulator
(XSA-162, bsc#956411)
* CVE-2015-7971: Some pmu and profiling hypercalls log without rate
limiting (XSA-152, bsc#950706)
* CVE-2015-8104: Guest to host DoS by triggering an infinite loop in
microcode via #DB exception (bsc#954405)
* CVE-2015-5307: Guest to host DOS by intercepting #AC (XSA-156,
bsc#953527)
* CVE-2015-8339: XENMEM_exchange error handling issues (XSA-159,
bsc#956408)
* CVE-2015-8340: XENMEM_exchange error handling issues (XSA-159,
bsc#956408)
* CVE-2015-7512: Buffer overflow in pcnet's non-loopback mode
(bsc#962360)
* CVE-2015-8550: Paravirtualized drivers incautious about shared
memory contents (XSA-155, bsc#957988)
* CVE-2015-8504: Avoid floating point exception in vnc support
(bsc#958493)
* CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization
(XSA-165, bsc#958009)
* Ioreq handling possibly susceptible to multiple read issue (XSA-166,
bsc#958523)

Security Issues:

* CVE-2014-0222
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222>
* CVE-2015-4037
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037>
* CVE-2015-5239
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239>
* CVE-2015-7504
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504>
* CVE-2015-7971
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971>
* CVE-2015-8104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104>
* CVE-2015-5307
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307>
* CVE-2015-8339
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339>
* CVE-2015-8340
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340>
* CVE-2015-7512
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512>
* CVE-2015-8550
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550>
* CVE-2015-8504
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504>
* CVE-2015-8555
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555>


Special Instructions and Notes:

Please reboot the system after installing this update.


Package List:

- SUSE Linux Enterprise Server 10 SP4 LTSS (i586 x86_64):

xen-3.2.3_17040_46-0.23.2
xen-devel-3.2.3_17040_46-0.23.2
xen-doc-html-3.2.3_17040_46-0.23.2
xen-doc-pdf-3.2.3_17040_46-0.23.2
xen-doc-ps-3.2.3_17040_46-0.23.2
xen-kmp-debug-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-default-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-kdump-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-smp-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-libs-3.2.3_17040_46-0.23.2
xen-tools-3.2.3_17040_46-0.23.2
xen-tools-domU-3.2.3_17040_46-0.23.2
xen-tools-ioemu-3.2.3_17040_46-0.23.2

- SUSE Linux Enterprise Server 10 SP4 LTSS (x86_64):

xen-libs-32bit-3.2.3_17040_46-0.23.2

- SUSE Linux Enterprise Server 10 SP4 LTSS (i586):

xen-kmp-bigsmp-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-kdumppae-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-vmi-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2
xen-kmp-vmipae-3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2


References:

https://www.suse.com/security/cve/CVE-2014-0222.html
https://www.suse.com/security/cve/CVE-2015-4037.html
https://www.suse.com/security/cve/CVE-2015-5239.html
https://www.suse.com/security/cve/CVE-2015-5307.html
https://www.suse.com/security/cve/CVE-2015-7504.html
https://www.suse.com/security/cve/CVE-2015-7512.html
https://www.suse.com/security/cve/CVE-2015-7971.html
https://www.suse.com/security/cve/CVE-2015-8104.html
https://www.suse.com/security/cve/CVE-2015-8339.html
https://www.suse.com/security/cve/CVE-2015-8340.html
https://www.suse.com/security/cve/CVE-2015-8504.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8555.html
https://bugzilla.suse.com/877642
https://bugzilla.suse.com/932267
https://bugzilla.suse.com/944463
https://bugzilla.suse.com/950706
https://bugzilla.suse.com/953527
https://bugzilla.suse.com/954405
https://bugzilla.suse.com/956408
https://bugzilla.suse.com/956411
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/958009
https://bugzilla.suse.com/958493
https://bugzilla.suse.com/958523
https://bugzilla.suse.com/962360
https://download.suse.com/patch/finder/?keywords=085198b0d3665c1af17df9c5dcb0be80

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung