Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2065-1

Опубликовано: 13 июн. 2022
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361: Fixed IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues (XSA-400) (bsc#1197426)
  • CVE-2022-26362: Fixed race condition in typeref acquisition (bsc#1199965)
  • CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (bsc#1199966)

Список пакетов

Image SLES15-SP3-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-CHOST-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-CHOST-BYOS-EC2
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-CHOST-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-HPC-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-HPC-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-HPC-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-1-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-1-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-2-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-Micro-5-2-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAP-BYOS-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAP-BYOS-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAP-BYOS-GCE
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAPCAL-Azure
xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAPCAL-EC2-HVM
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-SAPCAL-GCE
xen-libs-4.14.5_02-150300.3.29.1
SUSE Linux Enterprise Micro 5.1
xen-libs-4.14.5_02-150300.3.29.1
SUSE Linux Enterprise Micro 5.2
xen-libs-4.14.5_02-150300.3.29.1
SUSE Linux Enterprise Module for Basesystem 15 SP3
xen-libs-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
SUSE Linux Enterprise Module for Server Applications 15 SP3
xen-4.14.5_02-150300.3.29.1
xen-devel-4.14.5_02-150300.3.29.1
xen-tools-4.14.5_02-150300.3.29.1
xen-tools-xendomains-wait-disk-4.14.5_02-150300.3.29.1
openSUSE Leap 15.3
xen-4.14.5_02-150300.3.29.1
xen-devel-4.14.5_02-150300.3.29.1
xen-doc-html-4.14.5_02-150300.3.29.1
xen-libs-4.14.5_02-150300.3.29.1
xen-libs-32bit-4.14.5_02-150300.3.29.1
xen-tools-4.14.5_02-150300.3.29.1
xen-tools-domU-4.14.5_02-150300.3.29.1
xen-tools-xendomains-wait-disk-4.14.5_02-150300.3.29.1

Описание

IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки

Описание

x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.


Затронутые продукты
Image SLES15-SP3-BYOS-Azure:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-libs-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-EC2-HVM:xen-tools-domU-4.14.5_02-150300.3.29.1
Image SLES15-SP3-BYOS-GCE:xen-libs-4.14.5_02-150300.3.29.1

Ссылки
Уязвимость SUSE-SU-2022:2065-1