Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:1146-1

Опубликовано: 02 мая 2017
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes several security issues:

  • A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch (XSA-213, bsc#1034843)
  • A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer (XSA-214, bsc#1034844).
  • CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions (bsc#1034994).
  • CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process (bsc#1028655)

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
xen-libs-4.2.5_21-41.1
xen-tools-domU-4.2.5_21-41.1
SUSE Linux Enterprise Server 11 SP3-LTSS
xen-4.2.5_21-41.1
xen-doc-html-4.2.5_21-41.1
xen-doc-pdf-4.2.5_21-41.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
xen-libs-4.2.5_21-41.1
xen-libs-32bit-4.2.5_21-41.1
xen-tools-4.2.5_21-41.1
xen-tools-domU-4.2.5_21-41.1
SUSE Manager 2.1
xen-4.2.5_21-41.1
xen-doc-html-4.2.5_21-41.1
xen-doc-pdf-4.2.5_21-41.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
xen-libs-4.2.5_21-41.1
xen-libs-32bit-4.2.5_21-41.1
xen-tools-4.2.5_21-41.1
xen-tools-domU-4.2.5_21-41.1
SUSE Manager Proxy 2.1
xen-4.2.5_21-41.1
xen-doc-html-4.2.5_21-41.1
xen-doc-pdf-4.2.5_21-41.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
xen-libs-4.2.5_21-41.1
xen-libs-32bit-4.2.5_21-41.1
xen-tools-4.2.5_21-41.1
xen-tools-domU-4.2.5_21-41.1
SUSE OpenStack Cloud 5
xen-4.2.5_21-41.1
xen-doc-html-4.2.5_21-41.1
xen-doc-pdf-4.2.5_21-41.1
xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
xen-libs-4.2.5_21-41.1
xen-libs-32bit-4.2.5_21-41.1
xen-tools-4.2.5_21-41.1
xen-tools-domU-4.2.5_21-41.1

Описание

A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-41.1

Ссылки

Описание

hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-41.1

Ссылки

Описание

Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-41.1

Ссылки

Описание

Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.99-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-41.1
SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-41.1

Ссылки
Уязвимость SUSE-SU-2017:1146-1