Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4054-1

Опубликовано: 12 окт. 2023
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)
  • CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)
  • CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)
  • CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)
  • CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)

Список пакетов

Image SLES15-SP5-Azure-3P
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-Aliyun
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-GDC
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-HPC-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-HPC-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-HPC-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-HPC-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Hardened-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Hardened-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Hardened-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-BYOS
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Micro-5-5-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Azure-3P
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Hardened-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAP-Hardened-GCE
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAPCAL-Azure
xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAPCAL-EC2
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
Image SLES15-SP5-SAPCAL-GCE
xen-libs-4.17.2_06-150500.3.12.1
SUSE Linux Enterprise Micro 5.5
xen-libs-4.17.2_06-150500.3.12.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
xen-libs-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
SUSE Linux Enterprise Module for Server Applications 15 SP5
xen-4.17.2_06-150500.3.12.1
xen-devel-4.17.2_06-150500.3.12.1
xen-tools-4.17.2_06-150500.3.12.1
xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1
openSUSE Leap 15.5
xen-4.17.2_06-150500.3.12.1
xen-devel-4.17.2_06-150500.3.12.1
xen-doc-html-4.17.2_06-150500.3.12.1
xen-libs-4.17.2_06-150500.3.12.1
xen-libs-32bit-4.17.2_06-150500.3.12.1
xen-tools-4.17.2_06-150500.3.12.1
xen-tools-domU-4.17.2_06-150500.3.12.1
xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1

Описание

When a transaction is committed, C Xenstored will first check the quota is correct before attempting to commit any nodes. It would be possible that accounting is temporarily negative if a node has been removed outside of the transaction. Unfortunately, some versions of C Xenstored are assuming that the quota cannot be negative and are using assert() to confirm it. This will lead to C Xenstored crash when tools are built without -DNDEBUG (this is the default).


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.2_06-150500.3.12.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project ("An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub's XFS file system implementation.") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.2_06-150500.3.12.1

Ссылки

Описание

The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.2_06-150500.3.12.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.2_06-150500.3.12.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.2_06-150500.3.12.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.2_06-150500.3.12.1

Ссылки