Описание
Security update for xen
This security update of Xen fixes the following issues:
- bsc#939712 (XSA-140): QEMU leak of uninitialized heap memory in rtl8139 device model (CVE-2015-5165)
- bsc#938344: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM (CVE-2015-5154)
Список пакетов
SUSE Linux Enterprise Server 11 SP2-LTSS
xen-4.1.6_08-17.1
xen-devel-4.1.6_08-17.1
xen-doc-html-4.1.6_08-17.1
xen-doc-pdf-4.1.6_08-17.1
xen-kmp-default-4.1.6_08_3.0.101_0.7.29-17.1
xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-17.1
xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-17.1
xen-libs-4.1.6_08-17.1
xen-libs-32bit-4.1.6_08-17.1
xen-tools-4.1.6_08-17.1
xen-tools-domU-4.1.6_08-17.1
Ссылки
- Link for SUSE-SU-2015:1408-1
- E-Mail link for SUSE-SU-2015:1408-1
- SUSE Security Ratings
- SUSE Bug 938344
- SUSE Bug 939712
- SUSE CVE CVE-2015-5154 page
- SUSE CVE CVE-2015-5165 page
Описание
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-17.1
Ссылки
- CVE-2015-5154
- SUSE Bug 938344
- SUSE Bug 950367
Описание
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-17.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-17.1
Ссылки
- CVE-2015-5165
- SUSE Bug 939712
- SUSE Bug 950367