Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:0830-1

Опубликовано: 11 мар. 2024
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2023-46839: Fixed memory access through PCI device with phantom functions (XSA-449) (bsc#1218851).
  • CVE-2023-46840: Fixed Failure to quarantine devices in !HVM builds (XSA-450) (bsc#1219080).
  • CVE-2023-46841: Fixed shadow stack vs exceptions from emulation stubs (XSA-451) (bsc#1219885).

Список пакетов

Image SLES15-SP5-Azure-3P
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Basic
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Standard
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-Aliyun
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-GDC
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-HPC-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-HPC-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-HPC-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-HPC-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Hardened-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Hardened-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Hardened-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-BYOS
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Micro-5-5-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Azure-3P
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Hardened-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAP-Hardened-GCE
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAPCAL-Azure
xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAPCAL-EC2
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
Image SLES15-SP5-SAPCAL-GCE
xen-libs-4.17.3_06-150500.3.24.1
SUSE Linux Enterprise Micro 5.5
xen-libs-4.17.3_06-150500.3.24.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
xen-libs-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
SUSE Linux Enterprise Module for Server Applications 15 SP5
xen-4.17.3_06-150500.3.24.1
xen-devel-4.17.3_06-150500.3.24.1
xen-tools-4.17.3_06-150500.3.24.1
xen-tools-xendomains-wait-disk-4.17.3_06-150500.3.24.1
openSUSE Leap 15.5
xen-4.17.3_06-150500.3.24.1
xen-devel-4.17.3_06-150500.3.24.1
xen-doc-html-4.17.3_06-150500.3.24.1
xen-libs-4.17.3_06-150500.3.24.1
xen-libs-32bit-4.17.3_06-150500.3.24.1
xen-tools-4.17.3_06-150500.3.24.1
xen-tools-domU-4.17.3_06-150500.3.24.1
xen-tools-xendomains-wait-disk-4.17.3_06-150500.3.24.1

Описание

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding requests. Such phantom functions need an IOMMU context setup, but failure to setup the context is not fatal when the device is assigned. Not failing device assignment when such failure happens can lead to the primary device being assigned to a guest, while some of the phantom functions are assigned to a different domain.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.3_06-150500.3.24.1

Ссылки

Описание

Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.3_06-150500.3.24.1

Ссылки

Описание

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return addresses are accompanied by so called "shadow stacks", holding little more than return addresses. Shadow stacks aren't writable by normal instructions, and upon function returns their contents are used to check for possible manipulation of a return address coming from the traditional stack. In particular certain memory accesses need intercepting by Xen. In various cases the necessary emulation involves kind of replaying of the instruction. Such replaying typically involves filling and then invoking of a stub. Such a replayed instruction may raise an exceptions, which is expected and dealt with accordingly. Unfortunately the interaction of both of the above wasn't right: Recovery involves removal of a call frame from the (traditional) stack. The counterpart of this operation for the shadow stack was missing.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.3_06-150500.3.24.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.3_06-150500.3.24.1

Ссылки
Уязвимость SUSE-SU-2024:0830-1