Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-RU-2019:2767-1

Опубликовано: 24 окт. 2019
Источник: suse-cvrf

Описание

Recommended update for xen

This update for xen to version 4.10.4 fixes the following issues:

  • Fixed an issue where libxenlight could not restore domain vsa6535522 on live migration (bsc#1133818).
  • Fixed an HPS bug which did not allow to install Windows Server 2016 with 2 CPUs setting or above (bsc#1137717).
  • Fixed an issue where libxenlight could not create new domain (bsc#1131811).
  • Fixed an issue where Xen could not pre-allocate 1 shadow page (bsc#1145240).
  • Fixed an issue where attached pci devices were lost after reboot (bsc#1129642).
  • Fixed a segmentation fault in Libvrtd during live migration to a VM (bsc#1145774).
  • Xenpvnetboot is now ported correctly to Python 3 (bsc#1138563).

Список пакетов

Image SLES15-EC2-CHOST-HVM-BYOS
xen-libs-4.10.4_04-3.22.1
xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS
xen-libs-4.10.4_04-3.22.1
xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-SAP-EC2-HVM
xen-libs-4.10.4_04-3.22.1
xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-SAP-EC2-HVM-BYOS
xen-libs-4.10.4_04-3.22.1
xen-tools-domU-4.10.4_04-3.22.1
SUSE Linux Enterprise Module for Basesystem 15
xen-libs-4.10.4_04-3.22.1
xen-tools-domU-4.10.4_04-3.22.1
SUSE Linux Enterprise Module for Server Applications 15
xen-4.10.4_04-3.22.1
xen-devel-4.10.4_04-3.22.1
xen-tools-4.10.4_04-3.22.1

Описание

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки

Описание

An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.


Затронутые продукты
Image SLES15-EC2-CHOST-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-CHOST-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-libs-4.10.4_04-3.22.1
Image SLES15-EC2-HVM-BYOS:xen-tools-domU-4.10.4_04-3.22.1

Ссылки
Уязвимость SUSE-RU-2019:2767-1