Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3423-1

Опубликовано: 24 сент. 2024
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)
  • CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355)
  • CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460, bsc#1228574)
  • CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461, bsc#1228575)
  • CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)

Список пакетов

Image SLES15-SP4-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-HPC-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Hardened-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Hardened-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Hardened-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Hardened-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-BYOS
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3-BYOS
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-3-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-BYOS
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-Micro-5-4-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Azure-LI-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-BYOS
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-BYOS
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAP-Hardened-GCE
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAPCAL
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAPCAL-Azure
xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAPCAL-EC2
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-SAPCAL-GCE
xen-libs-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise Micro 5.3
xen-libs-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise Micro 5.4
xen-libs-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise Server 15 SP4-LTSS
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1
SUSE Manager Proxy 4.3
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1
SUSE Manager Server 4.3
xen-4.16.6_04-150400.4.62.1
xen-devel-4.16.6_04-150400.4.62.1
xen-libs-4.16.6_04-150400.4.62.1
xen-tools-4.16.6_04-150400.4.62.1
xen-tools-domU-4.16.6_04-150400.4.62.1
xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1

Описание

A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.6_04-150400.4.62.1

Ссылки

Описание

An optional feature of PCI MSI called "Multiple Message" allows a device to use multiple consecutive interrupt vectors. Unlike for MSI-X, the setting up of these consecutive vectors needs to happen all in one go. In this handling an error path could be taken in different situations, with or without a particular lock held. This error path wrongly releases the lock even when it is not currently held.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.6_04-150400.4.62.1

Ссылки

Описание

Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. In the logic establishing these mappings, error handling was flawed, resulting in such mappings to potentially remain in place when they should have been removed again. Respective guests would then gain access to memory regions which they aren't supposed to have access to.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.6_04-150400.4.62.1

Ссылки

Описание

When multiple devices share resources and one of them is to be passed through to a guest, security of the entire system and of respective guests individually cannot really be guaranteed without knowing internals of any of the involved guests. Therefore such a configuration cannot really be security-supported, yet making that explicit was so far missing. Resources the sharing of which is known to be problematic include, but are not limited to - - PCI Base Address Registers (BARs) of multiple devices mapping to the same page (4k on x86), - - INTx lines.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.6_04-150400.4.62.1

Ссылки

Описание

In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised. This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set. However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.


Затронутые продукты
Image SLES15-SP4-BYOS-Azure:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-libs-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-EC2:xen-tools-domU-4.16.6_04-150400.4.62.1
Image SLES15-SP4-BYOS-GCE:xen-libs-4.16.6_04-150400.4.62.1

Ссылки
Уязвимость SUSE-SU-2024:3423-1