Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2015:0256-1: important: Security update for xen

Recommended Posts

openSUSE Security Update: Security update for xen

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2015:0256-1

Rating: important

References: #826717 #866902 #882089 #889526 #896023 #897906

#898772 #900292 #901317 #903357 #903359 #903850

#903967 #903970 #904255 #905465 #905467 #906439

#906996 #910681

Cross-References: CVE-2013-3495 CVE-2014-5146 CVE-2014-5149

CVE-2014-8594 CVE-2014-8595 CVE-2014-8866

CVE-2014-8867 CVE-2014-9030 CVE-2014-9065

CVE-2014-9066 CVE-2015-0361

Affected Products:

openSUSE 13.2

______________________________________________________________________________

 

An update that solves 11 vulnerabilities and has 9 fixes is

now available.

 

Description:

 

 

The XEN virtualization was updated to fix bugs and security issues:

 

Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to use

after free on hvm guest teardown

 

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

 

CVE-2014-9030: XSA-113: Guest effectable page reference leak in

MMU_MACHPHYS_UPDATE handling

 

CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO

emulated inside the hypervisor

 

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode

hypercall argument translation

 

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86

emulation of far branches

 

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU

update hypercalls

 

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be

evaded by native NMI interrupts

 

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu

operations are not preemptible

 

Bugs fixed:

- Restore missing fixes from block-dmmd script

 

- bnc#904255 - XEN boot hangs in early boot on UEFI system

 

- Fix missing banner by restoring figlet program

 

- bnc#903357 - Corrupted save/restore test leaves orphaned data in xenstore

 

- bnc#903359 - Temporary migration name is not cleaned up after migration

 

- bnc#903850 - Xen: guest user mode triggerable VM exits not handled by

hypervisor

 

- bnc#866902 - Xen save/restore of HVM guests cuts off disk and networking

 

- bnc#901317 - increase limit domUloader to 32MB

 

- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device

(SR-IOV) to guest

 

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus

 

- bsc#900292 - xl: change default dump directory

 

- Update xen2libvirt.py to better detect and handle file formats

 

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus

 

 

- bnc#897906 - libxc: check return values on mmap() and madvise()

on xc_alloc_hypercall_buffer()

 

- bnc#896023 - Adjust xentop column layout

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE 13.2:

 

zypper in -t patch openSUSE-2015-129=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE 13.2 (i586 x86_64):

 

xen-debugsource-4.4.1_08-9.1

xen-devel-4.4.1_08-9.1

xen-libs-4.4.1_08-9.1

xen-libs-debuginfo-4.4.1_08-9.1

xen-tools-domU-4.4.1_08-9.1

xen-tools-domU-debuginfo-4.4.1_08-9.1

 

- openSUSE 13.2 (x86_64):

 

xen-4.4.1_08-9.1

xen-doc-html-4.4.1_08-9.1

xen-kmp-default-4.4.1_08_k3.16.7_7-9.1

xen-kmp-default-debuginfo-4.4.1_08_k3.16.7_7-9.1

xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1

xen-kmp-desktop-debuginfo-4.4.1_08_k3.16.7_7-9.1

xen-libs-32bit-4.4.1_08-9.1

xen-libs-debuginfo-32bit-4.4.1_08-9.1

xen-tools-4.4.1_08-9.1

xen-tools-debuginfo-4.4.1_08-9.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2013-3495.html

http://support.novell.com/security/cve/CVE-2014-5146.html

http://support.novell.com/security/cve/CVE-2014-5149.html

http://support.novell.com/security/cve/CVE-2014-8594.html

http://support.novell.com/security/cve/CVE-2014-8595.html

http://support.novell.com/security/cve/CVE-2014-8866.html

http://support.novell.com/security/cve/CVE-2014-8867.html

http://support.novell.com/security/cve/CVE-2014-9030.html

http://support.novell.com/security/cve/CVE-2014-9065.html

http://support.novell.com/security/cve/CVE-2014-9066.html

http://support.novell.com/security/cve/CVE-2015-0361.html

https://bugzilla.suse.com/show_bug.cgi?id=826717

https://bugzilla.suse.com/show_bug.cgi?id=866902

https://bugzilla.suse.com/show_bug.cgi?id=882089

https://bugzilla.suse.com/show_bug.cgi?id=889526

https://bugzilla.suse.com/show_bug.cgi?id=896023

https://bugzilla.suse.com/show_bug.cgi?id=897906

https://bugzilla.suse.com/show_bug.cgi?id=898772

https://bugzilla.suse.com/show_bug.cgi?id=900292

https://bugzilla.suse.com/show_bug.cgi?id=901317

https://bugzilla.suse.com/show_bug.cgi?id=903357

https://bugzilla.suse.com/show_bug.cgi?id=903359

https://bugzilla.suse.com/show_bug.cgi?id=903850

https://bugzilla.suse.com/show_bug.cgi?id=903967

https://bugzilla.suse.com/show_bug.cgi?id=903970

https://bugzilla.suse.com/show_bug.cgi?id=904255

https://bugzilla.suse.com/show_bug.cgi?id=905465

https://bugzilla.suse.com/show_bug.cgi?id=905467

https://bugzilla.suse.com/show_bug.cgi?id=906439

https://bugzilla.suse.com/show_bug.cgi?id=906996

https://bugzilla.suse.com/show_bug.cgi?id=910681

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×