Описание
Security update for xen
This update for xen fixes the following issues:
- A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service. (XSA-202, bsc#1014298, CVE-2016-10024)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP1
xen-4.5.5_04-22.6.1
xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
xen-libs-4.5.5_04-22.6.1
xen-libs-32bit-4.5.5_04-22.6.1
SUSE Linux Enterprise Server 12 SP1
xen-4.5.5_04-22.6.1
xen-doc-html-4.5.5_04-22.6.1
xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
xen-libs-4.5.5_04-22.6.1
xen-libs-32bit-4.5.5_04-22.6.1
xen-tools-4.5.5_04-22.6.1
xen-tools-domU-4.5.5_04-22.6.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
xen-4.5.5_04-22.6.1
xen-doc-html-4.5.5_04-22.6.1
xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
xen-libs-4.5.5_04-22.6.1
xen-libs-32bit-4.5.5_04-22.6.1
xen-tools-4.5.5_04-22.6.1
xen-tools-domU-4.5.5_04-22.6.1
SUSE Linux Enterprise Software Development Kit 12 SP1
xen-devel-4.5.5_04-22.6.1
Ссылки
- Link for SUSE-SU-2016:3207-1
- E-Mail link for SUSE-SU-2016:3207-1
- SUSE Security Ratings
- SUSE Bug 1012651
- SUSE Bug 1014298
- SUSE Bug 1016340
- SUSE CVE CVE-2016-10013 page
- SUSE CVE CVE-2016-10024 page
- SUSE CVE CVE-2016-9932 page
Описание
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_04-22.6.1
Ссылки
- CVE-2016-10013
- SUSE Bug 1016340
Описание
Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_04-22.6.1
Ссылки
- CVE-2016-10024
- SUSE Bug 1014298
- SUSE Bug 1178658
Описание
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:xen-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-kmp-default-4.5.5_04_k3.12.67_60.64.24-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-32bit-4.5.5_04-22.6.1
SUSE Linux Enterprise Desktop 12 SP1:xen-libs-4.5.5_04-22.6.1
Ссылки
- CVE-2016-9932
- SUSE Bug 1012651
- SUSE Bug 1016340