Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:0020-1

Опубликовано: 04 янв. 2019
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security vulnerabilities fixed:

  • CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB flushing with AMD IOMMUs, which potentially allowed a guest to escalate its privileges, may cause a Denial of Service (DoS) affecting the entire host, or may be able to access data it is not supposed to access. (XSA-275) (bsc#1115040)
  • CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case non-canonical addresses are accessed, which may allow a guest to cause Xen to crash, resulting in a Denial of Service (DoS) affecting the entire host. (XSA-279) (bsc#1115045)
  • CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which conflicted with shadow paging and allowed a guest to cause Xen to crash, resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
  • CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in various Bluetooth functions, allowing this to crash qemu process resulting in Denial of Service (DoS). (bsc#1117756).
  • CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI host bus adapter emulation, which allowed a user and/or process to crash the qemu process resulting in a Denial of Service (DoS). (bsc#1114423)

Other bugs fixed:

  • Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
  • Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
  • Fixed an issue with live migrations, which used to fail when spectre is enabled on xen boot cmdline (bsc#1116380)
  • Upstream bug fixes (bsc#1027519)

Список пакетов

SUSE Enterprise Storage 4
xen-4.7.6_05-43.45.1
xen-doc-html-4.7.6_05-43.45.1
xen-libs-4.7.6_05-43.45.1
xen-libs-32bit-4.7.6_05-43.45.1
xen-tools-4.7.6_05-43.45.1
xen-tools-domU-4.7.6_05-43.45.1
SUSE Linux Enterprise Server 12 SP2-BCL
xen-4.7.6_05-43.45.1
xen-doc-html-4.7.6_05-43.45.1
xen-libs-4.7.6_05-43.45.1
xen-libs-32bit-4.7.6_05-43.45.1
xen-tools-4.7.6_05-43.45.1
xen-tools-domU-4.7.6_05-43.45.1
SUSE Linux Enterprise Server 12 SP2-LTSS
xen-4.7.6_05-43.45.1
xen-doc-html-4.7.6_05-43.45.1
xen-libs-4.7.6_05-43.45.1
xen-libs-32bit-4.7.6_05-43.45.1
xen-tools-4.7.6_05-43.45.1
xen-tools-domU-4.7.6_05-43.45.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
xen-4.7.6_05-43.45.1
xen-doc-html-4.7.6_05-43.45.1
xen-libs-4.7.6_05-43.45.1
xen-libs-32bit-4.7.6_05-43.45.1
xen-tools-4.7.6_05-43.45.1
xen-tools-domU-4.7.6_05-43.45.1
SUSE OpenStack Cloud 7
xen-4.7.6_05-43.45.1
xen-doc-html-4.7.6_05-43.45.1
xen-libs-4.7.6_05-43.45.1
xen-libs-32bit-4.7.6_05-43.45.1
xen-tools-4.7.6_05-43.45.1
xen-tools-domU-4.7.6_05-43.45.1

Описание

In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки

Описание

The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.6_05-43.45.1
SUSE Enterprise Storage 4:xen-libs-4.7.6_05-43.45.1

Ссылки
Уязвимость SUSE-SU-2019:0020-1