SUSE-SU-2015:0927-1: important: Security update for Xen

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu May 21 16:04:45 MDT 2015


   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0927-1
Rating:             important
References:         #910441 #927967 #929339 
Cross-References:   CVE-2015-3456
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3
                    SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:


   Xen was updated to fix two security issues and a bug:

       * CVE-2015-3456: A buffer overflow in the floppy drive emulation,
         which could be used to carry out denial of service attacks or
         potential code execution against the host. This vulnerability is
         also known as VENOM.
       * CVE-2015-3340: Xen did not initialize certain fields, which allowed
         certain remote service domains to obtain sensitive information from
         memory via a (1) XEN_DOMCTL_gettscinfo or (2)
         XEN_SYSCTL_getdomaininfolist request.
       * An exception in setCPUAffinity when restoring guests. (bsc#910441)

   Security Issues:

       * CVE-2015-3456
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456>
       * CVE-2015-3340
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340>


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-xen=10673

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-xen=10673

   - SUSE Linux Enterprise Desktop 11 SP3:

      zypper in -t patch sledsp3-xen=10673

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      xen-devel-4.2.5_06-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

      xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
      xen-libs-4.2.5_06-0.7.1
      xen-tools-domU-4.2.5_06-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (x86_64):

      xen-4.2.5_06-0.7.1
      xen-doc-html-4.2.5_06-0.7.1
      xen-doc-pdf-4.2.5_06-0.7.1
      xen-libs-32bit-4.2.5_06-0.7.1
      xen-tools-4.2.5_06-0.7.1

   - SUSE Linux Enterprise Server 11 SP3 (i586):

      xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

      xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
      xen-libs-4.2.5_06-0.7.1
      xen-tools-domU-4.2.5_06-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

      xen-4.2.5_06-0.7.1
      xen-doc-html-4.2.5_06-0.7.1
      xen-doc-pdf-4.2.5_06-0.7.1
      xen-libs-32bit-4.2.5_06-0.7.1
      xen-tools-4.2.5_06-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP3 (i586):

      xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1


References:

   https://www.suse.com/security/cve/CVE-2015-3456.html
   https://bugzilla.suse.com/910441
   https://bugzilla.suse.com/927967
   https://bugzilla.suse.com/929339
   https://download.suse.com/patch/finder/?keywords=beaa1b0c2d4c1d543469208fc416ea1e



More information about the sle-updates mailing list