Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:2535-1

Опубликовано: 19 июн. 2023
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security fixes:

  • CVE-2022-42336: Fix an issue where guests configuring AMD Speculative Store Bypass Disable would have no effect (XSA-431) (bsc#1211433).
  • CVE-2022-42335: Fixed an issue where guests running under shadow mode with a PCI devices passed through could force the hypervisor to dereference arbitrary memory, leading to a denial of service (XSA-430) (bsc#1210315).

Non-security fixes:

  • Fixed a build warning false positive (bsc#1210570).
  • Added missing debug-info to xen-syms (bsc#1209237).
  • Updated to version 4.17.1 (bsc#1027519).
  • Fixed a failure during VM destruction when using host-assisted kexec and kdump (bsc#1209245).
  • Other upstream fixes (bsc#1027519).

Список пакетов

Image SLES15-SP5-Azure-3P
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Basic
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Standard
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-Aliyun
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-GDC
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-EC2-ECS-HVM
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-HPC-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Hardened-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Hardened-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Hardened-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Micro-5-5-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure-3P
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAP-Hardened-GCE
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAPCAL-Azure
xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAPCAL-EC2
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
Image SLES15-SP5-SAPCAL-GCE
xen-libs-4.17.1_04-150500.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
xen-libs-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP5
xen-4.17.1_04-150500.3.3.1
xen-devel-4.17.1_04-150500.3.3.1
xen-tools-4.17.1_04-150500.3.3.1
xen-tools-xendomains-wait-disk-4.17.1_04-150500.3.3.1
openSUSE Leap 15.5
xen-4.17.1_04-150500.3.3.1
xen-devel-4.17.1_04-150500.3.3.1
xen-doc-html-4.17.1_04-150500.3.3.1
xen-libs-4.17.1_04-150500.3.3.1
xen-libs-32bit-4.17.1_04-150500.3.3.1
xen-tools-4.17.1_04-150500.3.3.1
xen-tools-domU-4.17.1_04-150500.3.3.1
xen-tools-xendomains-wait-disk-4.17.1_04-150500.3.3.1

Описание

x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for shadow page handling it is possible for a guest with a PCI device passed through to cause the hypervisor to access an arbitrary pointer partially under guest control.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.1_04-150500.3.3.1

Ссылки

Описание

Mishandling of guest SSBD selection on AMD hardware The current logic to set SSBD on AMD Family 17h and Hygon Family 18h processors requires that the setting of SSBD is coordinated at a core level, as the setting is shared between threads. Logic was introduced to keep track of how many threads require SSBD active in order to coordinate it, such logic relies on using a per-core counter of threads that have SSBD active. When running on the mentioned hardware, it's possible for a guest to under or overflow the thread counter, because each write to VIRT_SPEC_CTRL.SSBD by the guest gets propagated to the helper that does the per-core active accounting. Underflowing the counter causes the value to get saturated, and thus attempts for guests running on the same core to set SSBD won't have effect because the hypervisor assumes it's already active.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.1_04-150500.3.3.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.1_04-150500.3.3.1

Ссылки
Уязвимость SUSE-SU-2023:2535-1