SUSE-SU-2015:0747-1: moderate: Security update for Xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Apr 21 12:08:10 MDT 2015


   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0747-1
Rating:             moderate
References:         #918995 #918998 #919341 #919464 #922705 #922706 
                    
Cross-References:   CVE-2015-2044 CVE-2015-2045 CVE-2015-2151
                    CVE-2015-2756
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that solves four vulnerabilities and has two
   fixes is now available.

Description:


   The Virtualization service XEN was updated to fix various bugs and
   security issues.

   The following security issues have been fixed:

       *

         CVE-2015-2756: XSA-126: Unmediated PCI command register access in
   qemu could have lead to denial of service attacks against the host, if PCI
   cards are passed through to guests.

       *

         XSA-125: Long latency MMIO mapping operations were not preemptible.

       *

         CVE-2015-2151: XSA-123: Instructions with register operands ignored
   eventual segment overrides encoded for them. Due to an insufficiently
   conditional assignment such a bogus segment override could have, however,
   corrupted a pointer used subsequently to store the result of the
   instruction.

       *

         CVE-2015-2045: XSA-122: The code handling certain sub-operations of
   the HYPERVISOR_xen_version hypercall failed to fully initialize all fields
   of structures subsequently copied back to guest memory. Due to this
   hypervisor stack contents were copied into the destination of the
   operation, thus becoming visible to the guest.

       *

         CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
   with certain system devices checked whether the access size by the guest
   is a supported one. When the access size is unsupported these routines
   failed to set the data to be returned to the guest for read accesses, so
   that hypervisor stack contents were copied into the destination of the
   operation, thus becoming visible to the guest.

   Also fixed:

       * Fully virtualized guest install from network source failed with
         'cannot find guest domain' in XEN. (bsc#919341)

   Security Issues:

       * CVE-2015-2044
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044>
       * CVE-2015-2045
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045>
       * CVE-2015-2151
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151>
       * CVE-2015-2756
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756>


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-xen-201503=10560

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-xen-201503=10560

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-xen-201503=10560

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      xen-devel-4.2.5_04-0.9.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

      xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
      xen-libs-4.2.5_04-0.9.1
      xen-tools-domU-4.2.5_04-0.9.1

   - SUSE Linux Enterprise Server 11 SP3 (x86_64):

      xen-4.2.5_04-0.9.1
      xen-doc-html-4.2.5_04-0.9.1
      xen-doc-pdf-4.2.5_04-0.9.1
      xen-libs-32bit-4.2.5_04-0.9.1
      xen-tools-4.2.5_04-0.9.1

   - SUSE Linux Enterprise Server 11 SP3 (i586):

      xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1
      xen-libs-4.2.5_04-0.9.1
      xen-tools-domU-4.2.5_04-0.9.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      xen-4.2.5_04-0.9.1
      xen-doc-html-4.2.5_04-0.9.1
      xen-doc-pdf-4.2.5_04-0.9.1
      xen-libs-32bit-4.2.5_04-0.9.1
      xen-tools-4.2.5_04-0.9.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586):

      xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1


References:

   https://www.suse.com/security/cve/CVE-2015-2044.html
   https://www.suse.com/security/cve/CVE-2015-2045.html
   https://www.suse.com/security/cve/CVE-2015-2151.html
   https://www.suse.com/security/cve/CVE-2015-2756.html
   https://bugzilla.suse.com/918995
   https://bugzilla.suse.com/918998
   https://bugzilla.suse.com/919341
   https://bugzilla.suse.com/919464
   https://bugzilla.suse.com/922705
   https://bugzilla.suse.com/922706
   https://download.suse.com/patch/finder/?keywords=aa82c3238c3cf27f4383a113bdf38b8e



More information about the sle-security-updates mailing list