Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] openSUSE-SU-2016:0124-1: important: Security update for xen

Recommended Posts

openSUSE Security Update: Security update for xen

______________________________________________________________________________

 

Announcement ID: openSUSE-SU-2016:0124-1

Rating: important

References: #947165 #950704 #954018 #954405 #956408 #956409

#956411 #956592 #956832 #957988 #958007 #958009

#958493 #958523 #958918 #959006

Cross-References: CVE-2015-5307 CVE-2015-7311 CVE-2015-7504

CVE-2015-7549 CVE-2015-7970 CVE-2015-8104

CVE-2015-8339 CVE-2015-8340 CVE-2015-8341

CVE-2015-8345 CVE-2015-8504 CVE-2015-8550

CVE-2015-8554 CVE-2015-8555 CVE-2015-8558

 

Affected Products:

openSUSE 13.1

______________________________________________________________________________

 

An update that solves 15 vulnerabilities and has one errata

is now available.

 

Description:

 

 

This update for xen fixes the following security issues:

 

- CVE-2015-8550: paravirtualized drivers incautious about shared memory

contents (XSA-155, boo#957988)

- CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in

DoS (boo#959006)

- CVE-2015-7549: qemu pci: null pointer dereference issue (boo#958918)

- CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493)

- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164,

boo#958007)

- CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization

(XSA-165, boo#958009)

- boo#958523 xen: ioreq handling possibly susceptible to multiple read

issue (XSA-166)

- CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing

command block list (boo#956832)

- boo#956592: xen: virtual PMU is unsupported (XSA-163)

- CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues

(XSA-159, boo#956408)

- CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error

(XSA-160, boo#956409)

- CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator

(XSA-162, boo#956411)

- CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with

qemu-xen (xsa-142, boo#947165)

- CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in

microcode via #DB exception (boo#954405)

- CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156,

boo#954018)

- CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is

not preemptible (XSA-150, boo#950704)

 

 

Patch Instructions:

 

To install this openSUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- openSUSE 13.1:

 

zypper in -t patch openSUSE-2016-34=1

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- openSUSE 13.1 (i586 x86_64):

 

xen-debugsource-4.3.4_10-53.1

xen-devel-4.3.4_10-53.1

xen-kmp-default-4.3.4_10_k3.11.10_29-53.1

xen-kmp-default-debuginfo-4.3.4_10_k3.11.10_29-53.1

xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1

xen-kmp-desktop-debuginfo-4.3.4_10_k3.11.10_29-53.1

xen-libs-4.3.4_10-53.1

xen-libs-debuginfo-4.3.4_10-53.1

xen-tools-domU-4.3.4_10-53.1

xen-tools-domU-debuginfo-4.3.4_10-53.1

 

- openSUSE 13.1 (x86_64):

 

xen-4.3.4_10-53.1

xen-doc-html-4.3.4_10-53.1

xen-libs-32bit-4.3.4_10-53.1

xen-libs-debuginfo-32bit-4.3.4_10-53.1

xen-tools-4.3.4_10-53.1

xen-tools-debuginfo-4.3.4_10-53.1

xen-xend-tools-4.3.4_10-53.1

xen-xend-tools-debuginfo-4.3.4_10-53.1

 

- openSUSE 13.1 (i586):

 

xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1

xen-kmp-pae-debuginfo-4.3.4_10_k3.11.10_29-53.1

 

 

References:

 

https://www.suse.com/security/cve/CVE-2015-5307.html

https://www.suse.com/security/cve/CVE-2015-7311.html

https://www.suse.com/security/cve/CVE-2015-7504.html

https://www.suse.com/security/cve/CVE-2015-7549.html

https://www.suse.com/security/cve/CVE-2015-7970.html

https://www.suse.com/security/cve/CVE-2015-8104.html

https://www.suse.com/security/cve/CVE-2015-8339.html

https://www.suse.com/security/cve/CVE-2015-8340.html

https://www.suse.com/security/cve/CVE-2015-8341.html

https://www.suse.com/security/cve/CVE-2015-8345.html

https://www.suse.com/security/cve/CVE-2015-8504.html

https://www.suse.com/security/cve/CVE-2015-8550.html

https://www.suse.com/security/cve/CVE-2015-8554.html

https://www.suse.com/security/cve/CVE-2015-8555.html

https://www.suse.com/security/cve/CVE-2015-8558.html

https://bugzilla.suse.com/947165

https://bugzilla.suse.com/950704

https://bugzilla.suse.com/954018

https://bugzilla.suse.com/954405

https://bugzilla.suse.com/956408

https://bugzilla.suse.com/956409

https://bugzilla.suse.com/956411

https://bugzilla.suse.com/956592

https://bugzilla.suse.com/956832

https://bugzilla.suse.com/957988

https://bugzilla.suse.com/958007

https://bugzilla.suse.com/958009

https://bugzilla.suse.com/958493

https://bugzilla.suse.com/958523

https://bugzilla.suse.com/958918

https://bugzilla.suse.com/959006

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×