Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:3980-1

Опубликовано: 12 нояб. 2024
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security issues fixed:

  • CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)
  • CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)
  • CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)

Non-security issues fixed:

  • Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)
  • Upstream bug fixes (bsc#1027519)

Список пакетов

Image SLES15-SP5-Azure-3P
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Basic
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Standard
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-Aliyun
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-GDC
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-HPC-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-HPC-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-HPC-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-HPC-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Hardened-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Hardened-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Hardened-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-BYOS
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-BYOS
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Micro-5-5-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Azure-3P
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Azure-LI-BYOS
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Hardened-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAP-Hardened-GCE
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAPCAL-Azure
xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAPCAL-EC2
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
Image SLES15-SP5-SAPCAL-GCE
xen-libs-4.17.5_06-150500.3.42.1
SUSE Linux Enterprise Micro 5.5
xen-libs-4.17.5_06-150500.3.42.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
xen-libs-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
SUSE Linux Enterprise Module for Server Applications 15 SP5
xen-4.17.5_06-150500.3.42.1
xen-devel-4.17.5_06-150500.3.42.1
xen-tools-4.17.5_06-150500.3.42.1
xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1
openSUSE Leap 15.5
xen-4.17.5_06-150500.3.42.1
xen-devel-4.17.5_06-150500.3.42.1
xen-doc-html-4.17.5_06-150500.3.42.1
xen-libs-4.17.5_06-150500.3.42.1
xen-libs-32bit-4.17.5_06-150500.3.42.1
xen-tools-4.17.5_06-150500.3.42.1
xen-tools-domU-4.17.5_06-150500.3.42.1
xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1
openSUSE Leap Micro 5.5
xen-libs-4.17.5_06-150500.3.42.1

Описание

In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs. It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised. This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set. However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.5_06-150500.3.42.1

Ссылки

Описание

The hypervisor contains code to accelerate VGA memory accesses for HVM guests, when the (virtual) VGA is in "standard" mode. Locking involved there has an unusual discipline, leaving a lock acquired past the return from the function that acquired it. This behavior results in a problem when emulating an instruction with two memory accesses, both of which touch VGA memory (plus some further constraints which aren't relevant here). When emulating the 2nd access, the lock that is already being held would be attempted to be re-acquired, resulting in a deadlock. This deadlock was already found when the code was first introduced, but was analysed incorrectly and the fix was incomplete. Analysis in light of the new finding cannot find a way to make the existing locking discipline work. In staging, this logic has all been removed because it was discovered to be accidentally disabled since Xen 4.7. Therefore, we are fixing the locking problem by backporting the removal of most of the feature. Note that even with the feature disabled, the lock would still be acquired for any accesses to the VGA MMIO region.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.5_06-150500.3.42.1

Ссылки

Описание

PVH guests have their ACPI tables constructed by the toolstack. The construction involves building the tables in local memory, which are then copied into guest memory. While actually used parts of the local memory are filled in correctly, excess space that is being allocated is left with its prior contents.


Затронутые продукты
Image SLES15-SP5-Azure-3P:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Basic:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-Azure-Standard:xen-libs-4.17.5_06-150500.3.42.1
Image SLES15-SP5-BYOS-Azure:xen-libs-4.17.5_06-150500.3.42.1

Ссылки
Уязвимость SUSE-SU-2024:3980-1