Описание
Security update for xen
This update for xen fixes several issues.
These security issues were fixed:
- blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
These non-security issues were fixed:
- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU
- bsc#1031460: Fixed DomU Live Migration
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
Список пакетов
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server for SAP Applications 11 SP4
SUSE Linux Enterprise Software Development Kit 11 SP4
Ссылки
- Link for SUSE-SU-2017:1770-1
- E-Mail link for SUSE-SU-2017:1770-1
- SUSE Security Ratings
- SUSE Bug 1014136
- SUSE Bug 1026236
- SUSE Bug 1027519
- SUSE Bug 1031460
- SUSE Bug 1032148
- SUSE Bug 1034845
- SUSE Bug 1036470
- SUSE Bug 1037243
- SUSE Bug 1042160
- SUSE Bug 1042863
- SUSE Bug 1042882
- SUSE Bug 1042893
- SUSE Bug 1042915
- SUSE Bug 1042924
- SUSE Bug 1042931
- SUSE Bug 1042938
- SUSE Bug 1043074
Описание
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
Затронутые продукты
Ссылки
- CVE-2017-8112
- SUSE Bug 1036211
- SUSE Bug 1036470
Описание
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
Затронутые продукты
Ссылки
- CVE-2017-8309
- SUSE Bug 1037242
- SUSE Bug 1037243
- SUSE Bug 1178658
Описание
Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
Затронутые продукты
Ссылки
- CVE-2017-8905
- SUSE Bug 1034845
- SUSE Bug 1178658
Описание
QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
Затронутые продукты
Ссылки
- CVE-2017-9330
- SUSE Bug 1042159
- SUSE Bug 1042160
- SUSE Bug 1043157
- SUSE Bug 1178658
Описание
Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
Затронутые продукты
Ссылки
- CVE-2017-9374
- SUSE Bug 1043073
- SUSE Bug 1043074
Описание
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
Затронутые продукты
Ссылки
- CVE-2017-9503
- SUSE Bug 1043296
- SUSE Bug 1043297
- SUSE Bug 1043312