Описание
Security update for xen
This update for xen to version 4.9.1 (bsc#1027519) fixes several issues.
This new feature was added:
- Support migration of HVM domains larger than 1 TB
These security issues were fixed:
- bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code allowed for DoS (XSA-246)
- bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests to retain a writable mapping of freed memory leading to information leaks, privilege escalation or DoS (XSA-247).
- CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063123)
- CVE-2017-15597: A grant copy operation being done on a grant of a dying domain allowed a malicious guest administrator to corrupt hypervisor memory, allowing for DoS or potentially privilege escalation and information leaks (bsc#1061075).
This non-security issue was fixed:
- bsc#1055047: Fixed --initrd-inject option in virt-install
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP3
Ссылки
- Link for SUSE-SU-2017:3115-1
- E-Mail link for SUSE-SU-2017:3115-1
- SUSE Security Ratings
- SUSE Bug 1027519
- SUSE Bug 1055047
- SUSE Bug 1061075
- SUSE Bug 1063123
- SUSE Bug 1068187
- SUSE Bug 1068191
- SUSE CVE CVE-2017-15289 page
- SUSE CVE CVE-2017-15597 page
Описание
The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
Затронутые продукты
Ссылки
- CVE-2017-15289
- SUSE Bug 1063122
- SUSE Bug 1063123
- SUSE Bug 1178658
Описание
An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.
Затронутые продукты
Ссылки
- CVE-2017-15597
- SUSE Bug 1061075