Описание
Security update for xen
Xen was updated to fix 6 security issues.
These security issues were fixed:
- CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642).
- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705 bsc#950703).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845).
Список пакетов
openSUSE Leap 42.1
Ссылки
- E-Mail link for openSUSE-SU-2015:1965-1
- SUSE Security Ratings
Описание
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
Затронутые продукты
Ссылки
- CVE-2014-0222
- SUSE Bug 877642
- SUSE Bug 950367
- SUSE Bug 964925
Описание
The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
Затронутые продукты
Ссылки
- CVE-2015-4037
- SUSE Bug 932267
- SUSE Bug 950367
Описание
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
Затронутые продукты
Ссылки
- CVE-2015-7835
- SUSE Bug 940929
- SUSE Bug 947159
- SUSE Bug 950367
Описание
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
Затронутые продукты
Ссылки
- CVE-2015-7969
- SUSE Bug 950703
- SUSE Bug 950705
Описание
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
Затронутые продукты
Ссылки
- CVE-2015-7971
- SUSE Bug 950706
Описание
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
Затронутые продукты
Ссылки
- CVE-2015-7972
- SUSE Bug 950704
- SUSE Bug 951845