Описание
Security update for Xen
This update fixes the following security issues in Xen:
Also the following fix has been applied:
Security Issues references:
Список пакетов
SUSE Linux Enterprise Server 11 SP1-LTSS
SUSE Linux Enterprise Server 11 SP1-TERADATA
Ссылки
- Link for SUSE-SU-2015:0940-1
- E-Mail link for SUSE-SU-2015:0940-1
- SUSE Security Ratings
- SUSE Bug 777628
- SUSE Bug 789944
- SUSE Bug 789945
- SUSE Bug 789948
- SUSE Bug 789950
- SUSE Bug 789951
- SUSE Bug 826717
- SUSE Bug 880751
- SUSE Bug 895798
- SUSE Bug 895799
- SUSE Bug 895802
- SUSE Bug 903850
- SUSE Bug 903967
- SUSE Bug 903970
- SUSE Bug 905465
- SUSE Bug 905467
- SUSE Bug 906439
Описание
Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2012-5510
- SUSE Bug 789945
Описание
Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
Затронутые продукты
Ссылки
- CVE-2012-5511
- SUSE Bug 789944
Описание
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Затронутые продукты
Ссылки
- CVE-2012-5513
- SUSE Bug 789951
Описание
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2012-5514
- SUSE Bug 789948
- SUSE Bug 789988
Описание
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
Затронутые продукты
Ссылки
- CVE-2012-5515
- SUSE Bug 789950
Описание
The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
Затронутые продукты
Ссылки
- CVE-2013-3495
- SUSE Bug 826717
- SUSE Bug 903970
Описание
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2014-4021
- SUSE Bug 880751
- SUSE Bug 903970
Описание
Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2014-7154
- SUSE Bug 880751
- SUSE Bug 895798
Описание
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Затронутые продукты
Ссылки
- CVE-2014-7155
- SUSE Bug 880751
- SUSE Bug 895799
Описание
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2014-7156
- SUSE Bug 880751
- SUSE Bug 895802
Описание
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
Затронутые продукты
Ссылки
- CVE-2014-8594
- SUSE Bug 903967
- SUSE Bug 903970
Описание
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
Затронутые продукты
Ссылки
- CVE-2014-8595
- SUSE Bug 903970
- SUSE Bug 907649
Описание
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
Затронутые продукты
Ссылки
- CVE-2014-8866
- SUSE Bug 903970
- SUSE Bug 905465
Описание
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2014-8867
- SUSE Bug 903970
- SUSE Bug 905467
Описание
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
Затронутые продукты
Ссылки
- CVE-2014-9030
- SUSE Bug 903970
- SUSE Bug 906439
Описание
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
Затронутые продукты
Ссылки
- CVE-2015-3340
- SUSE Bug 927967
- SUSE Bug 929339
Описание
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Затронутые продукты
Ссылки
- CVE-2015-3456
- SUSE Bug 929339
- SUSE Bug 932770
- SUSE Bug 935900