Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2019:2753-1

Опубликовано: 23 окт. 2019
Источник: suse-cvrf

Описание

Security update for xen

This update for xen to version 4.11.2 fixes the following issues:

Security issues fixed:

  • CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator which could have led to Denial of Service (bsc#1149813).
  • CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of service (bsc#1146874).
  • CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU emulator which could have led to execution of arbitrary code with privileges of the QEMU process (bsc#1143797).

Other issues fixed:

  • Fixed an HPS bug which did not allow to install Windows Server 2016 with 2 CPUs setting or above (bsc#1137717).
  • Fixed a segmentation fault in Libvrtd during live migration to a VM (bsc#1145774).
  • Fixed an issue where libxenlight could not create new domain (bsc#1131811).
  • Fixed an issue where attached pci devices were lost after reboot (bsc#1129642).
  • Fixed an issue where Xen could not pre-allocate 1 shadow page (bsc#1145240).

Список пакетов

Image SLES12-SP4-EC2-HVM-BYOS
xen-libs-4.11.2_02-2.14.2
xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM
xen-libs-4.11.2_02-2.14.2
xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS
xen-libs-4.11.2_02-2.14.2
xen-tools-domU-4.11.2_02-2.14.2
SUSE Linux Enterprise Desktop 12 SP4
xen-4.11.2_02-2.14.2
xen-libs-4.11.2_02-2.14.2
xen-libs-32bit-4.11.2_02-2.14.2
SUSE Linux Enterprise Server 12 SP4
xen-4.11.2_02-2.14.2
xen-doc-html-4.11.2_02-2.14.2
xen-libs-4.11.2_02-2.14.2
xen-libs-32bit-4.11.2_02-2.14.2
xen-tools-4.11.2_02-2.14.2
xen-tools-domU-4.11.2_02-2.14.2
SUSE Linux Enterprise Server for SAP Applications 12 SP4
xen-4.11.2_02-2.14.2
xen-doc-html-4.11.2_02-2.14.2
xen-libs-4.11.2_02-2.14.2
xen-libs-32bit-4.11.2_02-2.14.2
xen-tools-4.11.2_02-2.14.2
xen-tools-domU-4.11.2_02-2.14.2
SUSE Linux Enterprise Software Development Kit 12 SP4
xen-devel-4.11.2_02-2.14.2

Описание

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки

Описание

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.


Затронутые продукты
Image SLES12-SP4-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-libs-4.11.2_02-2.14.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS:xen-tools-domU-4.11.2_02-2.14.2

Ссылки
Уязвимость SUSE-SU-2019:2753-1