Описание
Security update for Xen
XEN has been updated to fix various bugs and security issues:
Also the following bugs have been fixed:
Security Issue references:
Список пакетов
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP2-LTSS
SUSE Linux Enterprise Server for SAP Applications 11 SP2
Ссылки
- Link for SUSE-SU-2015:0944-1
- E-Mail link for SUSE-SU-2015:0944-1
- SUSE Security Ratings
- SUSE Bug 777628
- SUSE Bug 789940
- SUSE Bug 789944
- SUSE Bug 789945
- SUSE Bug 789948
- SUSE Bug 789950
- SUSE Bug 789951
- SUSE Bug 789988
- SUSE Bug 792476
- SUSE Bug 793927
- SUSE Bug 794316
- SUSE Bug 797014
- SUSE Bug 797031
- SUSE Bug 797523
- SUSE Bug 798188
- SUSE Bug 799694
- SUSE Bug 800156
Описание
Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2012-5510
- SUSE Bug 789945
Описание
Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
Затронутые продукты
Ссылки
- CVE-2012-5511
- SUSE Bug 789944
Описание
Array index error in the HVMOP_set_mem_access handler in Xen 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) or obtain sensitive information via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2012-5512
- SUSE Bug 789940
Описание
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Затронутые продукты
Ссылки
- CVE-2012-5513
- SUSE Bug 789951
Описание
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
Затронутые продукты
Ссылки
- CVE-2012-5514
- SUSE Bug 789948
- SUSE Bug 789988
Описание
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
Затронутые продукты
Ссылки
- CVE-2012-5515
- SUSE Bug 789950
Описание
Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
Затронутые продукты
Ссылки
- CVE-2012-5634
- SUSE Bug 794316
- SUSE Bug 800275
- SUSE Bug 840592
Описание
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
Затронутые продукты
Ссылки
- CVE-2012-6075
- SUSE Bug 797523
- SUSE Bug 800275
- SUSE Bug 840592
Описание
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
Затронутые продукты
Ссылки
- CVE-2013-0153
- SUSE Bug 800275
- SUSE Bug 800802
- SUSE Bug 840592
Описание
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
Затронутые продукты
Ссылки
- CVE-2015-3340
- SUSE Bug 927967
- SUSE Bug 929339
Описание
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Затронутые продукты
Ссылки
- CVE-2015-3456
- SUSE Bug 929339
- SUSE Bug 932770
- SUSE Bug 935900