Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: openSUSE-SU-2015:1094-1
Distribution: SUSE
Plattformen: openSUSE 13.1
Datum: Mo, 22. Juni 2015, 22:13
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
Applikationen: Xen

Originalnachricht

   openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: openSUSE-SU-2015:1094-1
Rating: important
References: #922709 #931625 #931626 #931627 #931628 #932770
#932790 #932996
Cross-References: CVE-2015-2751 CVE-2015-3209 CVE-2015-4103
CVE-2015-4104 CVE-2015-4105 CVE-2015-4106
CVE-2015-4163 CVE-2015-4164
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:

Xen was updated to fix eight vulnerabilities.

The following vulnerabilities were fixed:

* CVE-2015-2751: Certain domctl operations may be abused to lock up the
host (XSA-127 boo#922709)
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu (XSA-128) (boo#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests
(XSA-129) (boo#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages
(XSA-130) (boo#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131)
(boo#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134)
(boo#932790)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to
host escape (XSA-135) (boo#932770)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (boo#932996)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2015-435=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

xen-debugsource-4.3.4_05-47.1
xen-devel-4.3.4_05-47.1
xen-kmp-default-4.3.4_05_k3.11.10_29-47.1
xen-kmp-default-debuginfo-4.3.4_05_k3.11.10_29-47.1
xen-kmp-desktop-4.3.4_05_k3.11.10_29-47.1
xen-kmp-desktop-debuginfo-4.3.4_05_k3.11.10_29-47.1
xen-libs-4.3.4_05-47.1
xen-libs-debuginfo-4.3.4_05-47.1
xen-tools-domU-4.3.4_05-47.1
xen-tools-domU-debuginfo-4.3.4_05-47.1

- openSUSE 13.1 (x86_64):

xen-4.3.4_05-47.1
xen-doc-html-4.3.4_05-47.1
xen-libs-32bit-4.3.4_05-47.1
xen-libs-debuginfo-32bit-4.3.4_05-47.1
xen-tools-4.3.4_05-47.1
xen-tools-debuginfo-4.3.4_05-47.1
xen-xend-tools-4.3.4_05-47.1
xen-xend-tools-debuginfo-4.3.4_05-47.1

- openSUSE 13.1 (i586):

xen-kmp-pae-4.3.4_05_k3.11.10_29-47.1
xen-kmp-pae-debuginfo-4.3.4_05_k3.11.10_29-47.1


References:

https://www.suse.com/security/cve/CVE-2015-2751.html
https://www.suse.com/security/cve/CVE-2015-3209.html
https://www.suse.com/security/cve/CVE-2015-4103.html
https://www.suse.com/security/cve/CVE-2015-4104.html
https://www.suse.com/security/cve/CVE-2015-4105.html
https://www.suse.com/security/cve/CVE-2015-4106.html
https://www.suse.com/security/cve/CVE-2015-4163.html
https://www.suse.com/security/cve/CVE-2015-4164.html
https://bugzilla.suse.com/922709
https://bugzilla.suse.com/931625
https://bugzilla.suse.com/931626
https://bugzilla.suse.com/931627
https://bugzilla.suse.com/931628
https://bugzilla.suse.com/932770
https://bugzilla.suse.com/932790
https://bugzilla.suse.com/932996

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung