Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2023:4476-1

Опубликовано: 17 нояб. 2023
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).

  • CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).

  • CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).

  • CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).

  • CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).

  • CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).

  • CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).

  • Upstream bug fixes (bsc#1027519)

Список пакетов

Image SLES15-SP4-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS-Aliyun
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-HPC-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Hardened-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Hardened-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Hardened-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Hardened-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-3-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-Micro-5-4-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-BYOS
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAP-Hardened-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAPCAL
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAPCAL-Azure
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAPCAL-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SAPCAL-GCE
xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
SUSE Linux Enterprise Micro 5.3
xen-libs-4.16.5_08-150400.4.40.1
SUSE Linux Enterprise Micro 5.4
xen-libs-4.16.5_08-150400.4.40.1
SUSE Linux Enterprise Module for Basesystem 15 SP4
xen-libs-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
SUSE Linux Enterprise Module for Server Applications 15 SP4
xen-4.16.5_08-150400.4.40.1
xen-devel-4.16.5_08-150400.4.40.1
xen-tools-4.16.5_08-150400.4.40.1
xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1
openSUSE Leap 15.4
xen-4.16.5_08-150400.4.40.1
xen-devel-4.16.5_08-150400.4.40.1
xen-doc-html-4.16.5_08-150400.4.40.1
xen-libs-4.16.5_08-150400.4.40.1
xen-libs-32bit-4.16.5_08-150400.4.40.1
xen-tools-4.16.5_08-150400.4.40.1
xen-tools-domU-4.16.5_08-150400.4.40.1
xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1
openSUSE Leap Micro 5.3
xen-libs-4.16.5_08-150400.4.40.1
openSUSE Leap Micro 5.4
xen-libs-4.16.5_08-150400.4.40.1

Описание

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. Since Xen itself needs to be mapped when PV guests run, Xen and shadowed PV guests run directly the respective shadow page tables. For 64-bit PV guests this means running on the shadow of the guest root page table. In the course of dealing with shortage of memory in the shadow pool associated with a domain, shadows of page tables may be torn down. This tearing down may include the shadow root page table that the CPU in question is presently running on. While a precaution exists to supposedly prevent the tearing down of the underlying live page table, the time window covered by that precaution isn't large enough.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project ("An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub's XFS file system implementation.") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

The current setup of the quarantine page tables assumes that the quarantine domain (dom_io) has been initialized with an address width of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels. However dom_io being a PV domain gets the AMD-Vi IOMMU page tables levels based on the maximum (hot pluggable) RAM address, and hence on systems with no RAM above the 512GB mark only 3 page-table levels are configured in the IOMMU. On systems without RAM above the 512GB boundary amd_iommu_quarantine_init() will setup page tables for the scratch page with 4 levels, while the IOMMU will be configured to use 3 levels only, resulting in the last page table directory (PDE) effectively becoming a page table entry (PTE), and hence a device in quarantine mode gaining write access to the page destined to be a PDE. Due to this page table level mismatch, the sink page the device gets read/write access to is no longer cleared between device assignment, possibly leading to data leaks.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки

Описание

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. It was believed that the mitigations always operated in contexts with IRQs disabled. However, the original XSA-254 fix for Meltdown (XPTI) deliberately left interrupts enabled on two entry paths; one unconditionally, and one conditionally on whether XPTI was active. As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations are not active together by default. Therefore, there is a race condition whereby a malicious PV guest can bypass BTC/SRSO protections and launch a BTC/SRSO attack against Xen.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.5_08-150400.4.40.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.5_08-150400.4.40.1

Ссылки
Уязвимость SUSE-SU-2023:4476-1