Описание
Security update for xen
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
- CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- CVE-2017-10922, CVE-2017-10921, CVE-2017-10920: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-10916: PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
These non-security issues were fixed:
- bsc#1031460: Fixed DomU Live Migration
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
Список пакетов
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE OpenStack Cloud 6
Ссылки
- Link for SUSE-SU-2017:1812-1
- E-Mail link for SUSE-SU-2017:1812-1
- SUSE Security Ratings
- SUSE Bug 1014136
- SUSE Bug 1026236
- SUSE Bug 1027519
- SUSE Bug 1031460
- SUSE Bug 1034845
- SUSE Bug 1036470
- SUSE Bug 1037243
- SUSE Bug 1042160
- SUSE Bug 1042863
- SUSE Bug 1042882
- SUSE Bug 1042893
- SUSE Bug 1042915
- SUSE Bug 1042923
- SUSE Bug 1042924
- SUSE Bug 1042931
- SUSE Bug 1042938
- SUSE Bug 1043074
Описание
The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
Затронутые продукты
Ссылки
- CVE-2017-10911
- SUSE Bug 1042863
- SUSE Bug 1043330
- SUSE Bug 1057378
Описание
Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.
Затронутые продукты
Ссылки
- CVE-2017-10912
- SUSE Bug 1042882
- SUSE Bug 1178658
Описание
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
Затронутые продукты
Ссылки
- CVE-2017-10913
- SUSE Bug 1042893
Описание
The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2.
Затронутые продукты
Ссылки
- CVE-2017-10914
- SUSE Bug 1042893
Описание
The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.
Затронутые продукты
Ссылки
- CVE-2017-10915
- SUSE Bug 1042915
Описание
The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
Затронутые продукты
Ссылки
- CVE-2017-10916
- SUSE Bug 1042923
Описание
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
Затронутые продукты
Ссылки
- CVE-2017-10917
- SUSE Bug 1042924
Описание
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
Затронутые продукты
Ссылки
- CVE-2017-10918
- SUSE Bug 1042931
- SUSE Bug 1178658
Описание
The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 1.
Затронутые продукты
Ссылки
- CVE-2017-10920
- SUSE Bug 1042938
- SUSE Bug 1178658
Описание
The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2.
Затронутые продукты
Ссылки
- CVE-2017-10921
- SUSE Bug 1042938
Описание
The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.
Затронутые продукты
Ссылки
- CVE-2017-10922
- SUSE Bug 1042938
Описание
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
Затронутые продукты
Ссылки
- CVE-2017-8112
- SUSE Bug 1036211
- SUSE Bug 1036470
Описание
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
Затронутые продукты
Ссылки
- CVE-2017-8309
- SUSE Bug 1037242
- SUSE Bug 1037243
- SUSE Bug 1178658
Описание
Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
Затронутые продукты
Ссылки
- CVE-2017-8905
- SUSE Bug 1034845
- SUSE Bug 1178658
Описание
QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
Затронутые продукты
Ссылки
- CVE-2017-9330
- SUSE Bug 1042159
- SUSE Bug 1042160
- SUSE Bug 1043157
- SUSE Bug 1178658
Описание
Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
Затронутые продукты
Ссылки
- CVE-2017-9374
- SUSE Bug 1043073
- SUSE Bug 1043074
Описание
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
Затронутые продукты
Ссылки
- CVE-2017-9503
- SUSE Bug 1043296
- SUSE Bug 1043297
- SUSE Bug 1043312