Описание
Security update for xen
This update for xen fixes the following issues:
- A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation. (XSA-204, bsc#1016340, CVE-2016-10013)
- CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure. (XSA-200, bsc#1012651, CVE-2016-9932)
- PV guests may have been able to mask interrupts causing a Denial of Service. (XSA-202, bsc#1014298, CVE-2016-10024)
- A missing NULL pointer check in VMFUNC emulation could lead to a hypervisor crash leading to a Denial of Servce. (XSA-203, bsc#1014300, CVE-2016-10025)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP2
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP2
Ссылки
- Link for SUSE-SU-2016:3208-1
- E-Mail link for SUSE-SU-2016:3208-1
- SUSE Security Ratings
- SUSE Bug 1012651
- SUSE Bug 1014298
- SUSE Bug 1014300
- SUSE Bug 1016340
- SUSE CVE CVE-2016-10013 page
- SUSE CVE CVE-2016-10024 page
- SUSE CVE CVE-2016-10025 page
- SUSE CVE CVE-2016-9932 page
Описание
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
Затронутые продукты
Ссылки
- CVE-2016-10013
- SUSE Bug 1016340
Описание
Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
Затронутые продукты
Ссылки
- CVE-2016-10024
- SUSE Bug 1014298
- SUSE Bug 1178658
Описание
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
Затронутые продукты
Ссылки
- CVE-2016-10025
- SUSE Bug 1014300
Описание
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
Затронутые продукты
Ссылки
- CVE-2016-9932
- SUSE Bug 1012651
- SUSE Bug 1016340