Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2015:1952-1

Опубликовано: 29 окт. 2015
Источник: suse-cvrf

Описание

Security update for xen

xen was updated to fix eight security issues.

These security issues were fixed:

  • CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.- files before the program (bsc#932267).
  • CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
  • CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
  • CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
  • CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
  • CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
  • CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
  • CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

Список пакетов

SUSE Linux Enterprise Server 11 SP2-LTSS
xen-4.1.6_08-20.1
xen-devel-4.1.6_08-20.1
xen-doc-html-4.1.6_08-20.1
xen-doc-pdf-4.1.6_08-20.1
xen-kmp-default-4.1.6_08_3.0.101_0.7.37-20.1
xen-kmp-pae-4.1.6_08_3.0.101_0.7.37-20.1
xen-kmp-trace-4.1.6_08_3.0.101_0.7.37-20.1
xen-libs-4.1.6_08-20.1
xen-libs-32bit-4.1.6_08-20.1
xen-tools-4.1.6_08-20.1
xen-tools-domU-4.1.6_08-20.1

Описание

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки

Описание

Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-20.1
SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-20.1

Ссылки