Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4184-1

Опубликовано: 24 окт. 2023
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2023-34323: Fixed a potential crash in C Xenstored due to an incorrect assertion (XSA-440) (bsc#1215744).
  • CVE-2023-34326: Fixed a missing IOMMU TLB flush on x86 AMD systems with IOMMU hardware and PCI passthrough enabled (XSA-442) (bsc#1215746).
  • CVE-2023-34325: Fixed multiple parsing issues in libfsimage (XSA-443) (bsc#1215747).
  • CVE-2023-34327, CVE-2023-34328: Fixed multiple issues with AMD x86 debugging functionality for guests (XSA-444) (bsc#1215748).

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
xen-4.12.4_40-150100.3.95.1
xen-devel-4.12.4_40-150100.3.95.1
xen-libs-4.12.4_40-150100.3.95.1
xen-tools-4.12.4_40-150100.3.95.1
xen-tools-domU-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise Server 15 SP1-LTSS
xen-4.12.4_40-150100.3.95.1
xen-devel-4.12.4_40-150100.3.95.1
xen-libs-4.12.4_40-150100.3.95.1
xen-tools-4.12.4_40-150100.3.95.1
xen-tools-domU-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
xen-4.12.4_40-150100.3.95.1
xen-devel-4.12.4_40-150100.3.95.1
xen-libs-4.12.4_40-150100.3.95.1
xen-tools-4.12.4_40-150100.3.95.1
xen-tools-domU-4.12.4_40-150100.3.95.1

Описание

When a transaction is committed, C Xenstored will first check the quota is correct before attempting to commit any nodes. It would be possible that accounting is temporarily negative if a node has been removed outside of the transaction. Unfortunately, some versions of C Xenstored are assuming that the quota cannot be negative and are using assert() to confirm it. This will lead to C Xenstored crash when tools are built without -DNDEBUG (this is the default).


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_40-150100.3.95.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project ("An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub's XFS file system implementation.") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_40-150100.3.95.1

Ссылки

Описание

The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_40-150100.3.95.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_40-150100.3.95.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_40-150100.3.95.1
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_40-150100.3.95.1

Ссылки