Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:0747-1

Опубликовано: 30 мар. 2015
Источник: suse-cvrf

Описание

Security update for Xen

The Virtualization service XEN was updated to fix various bugs and security issues.

The following security issues have been fixed:

* CVE-2015-2756: XSA-126: Unmediated PCI command register access in qemu could have lead to denial of service attacks against the host, if PCI cards are passed through to guests. * XSA-125: Long latency MMIO mapping operations were not preemptible. * CVE-2015-2151: XSA-123: Instructions with register operands ignored eventual segment overrides encoded for them. Due to an insufficiently conditional assignment such a bogus segment override could have, however, corrupted a pointer used subsequently to store the result of the instruction. * CVE-2015-2045: XSA-122: The code handling certain sub-operations of the HYPERVISOR_xen_version hypercall failed to fully initialize all fields of structures subsequently copied back to guest memory. Due to this hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest. * CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing with certain system devices checked whether the access size by the guest is a supported one. When the access size is unsupported these routines failed to set the data to be returned to the guest for read accesses, so that hypervisor stack contents were copied into the destination of the operation, thus becoming visible to the guest.

Also fixed:

* Fully virtualized guest install from network source failed with 'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

* CVE-2015-2044 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044> * CVE-2015-2045 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045> * CVE-2015-2151 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151> * CVE-2015-2756 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
xen-4.2.5_04-0.9.1
xen-doc-html-4.2.5_04-0.9.1
xen-doc-pdf-4.2.5_04-0.9.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-libs-4.2.5_04-0.9.1
xen-libs-32bit-4.2.5_04-0.9.1
xen-tools-4.2.5_04-0.9.1
xen-tools-domU-4.2.5_04-0.9.1
SUSE Linux Enterprise Server 11 SP3
xen-4.2.5_04-0.9.1
xen-doc-html-4.2.5_04-0.9.1
xen-doc-pdf-4.2.5_04-0.9.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-libs-4.2.5_04-0.9.1
xen-libs-32bit-4.2.5_04-0.9.1
xen-tools-4.2.5_04-0.9.1
xen-tools-domU-4.2.5_04-0.9.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
xen-4.2.5_04-0.9.1
xen-doc-html-4.2.5_04-0.9.1
xen-doc-pdf-4.2.5_04-0.9.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-libs-4.2.5_04-0.9.1
xen-libs-32bit-4.2.5_04-0.9.1
xen-tools-4.2.5_04-0.9.1
xen-tools-domU-4.2.5_04-0.9.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3
xen-4.2.5_04-0.9.1
xen-doc-html-4.2.5_04-0.9.1
xen-doc-pdf-4.2.5_04-0.9.1
xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1
xen-libs-4.2.5_04-0.9.1
xen-libs-32bit-4.2.5_04-0.9.1
xen-tools-4.2.5_04-0.9.1
xen-tools-domU-4.2.5_04-0.9.1
SUSE Linux Enterprise Software Development Kit 11 SP3
xen-devel-4.2.5_04-0.9.1

Описание

The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1

Ссылки

Описание

The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1

Ссылки

Описание

The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1

Ссылки

Описание

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_04-0.9.1
SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1

Ссылки