SUSE-SU-2013:0599-1: moderate: Security update for Xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Apr 3 09:04:35 MDT 2013


   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0599-1
Rating:             moderate
References:         #793927 #794316 #797014 #797031 #797523 #798188 
                    #799694 #800156 #800275 #802690 #805094 #806736 
                    
Cross-References:   CVE-2012-5634 CVE-2012-6075 CVE-2013-0153
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
                    SUSE Linux Enterprise Server 11 SP2 for VMware
                    SUSE Linux Enterprise Server 11 SP2
                    SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has 9 fixes
   is now available.

Description:


   XEN has been updated to fix various bugs and security
   issues:

   *

   CVE-2013-0153: (XSA 36) To avoid an erratum in early
   hardware, the Xen AMD IOMMU code by default choose to use a
   single interrupt remapping table for the whole system. This
   sharing implied that any guest with a passed through PCI
   device that is bus mastering capable can inject interrupts
   into other guests, including domain 0. This has been
   disabled for AMD chipsets not capable of it.

   *

   CVE-2012-6075: qemu: The e1000 had overflows under
   some conditions, potentially corrupting memory.

   *

   CVE-2013-0154: (XSA 37) Hypervisor crash due to
   incorrect ASSERT (debug build only)

   *

   CVE-2012-5634: (XSA-33) A VT-d interrupt remapping
   source validation flaw was fixed.

   Also the following bugs have been fixed:

   * bnc#805094 - xen hot plug attach/detach fails
   * bnc#802690 - domain locking can prevent a live
   migration from completing
   * bnc#797014 - no way to control live migrations o fix
   logic error in stdiostream_progress o restore logging in
   xc_save o add options to control migration tunables
   * bnc#806736: enabling xentrace crashes hypervisor
   * Upstream patches from Jan
   26287-sched-credit-pick-idle.patch
   26501-VMX-simplify-CR0-update.patch
   26502-VMX-disable-SMEP-when-not-paging.patch
   26516-ACPI-parse-table-retval.patch (Replaces
   CVE-2013-0153-xsa36.patch)
   26517-AMD-IOMMU-clear-irtes.patch (Replaces
   CVE-2013-0153-xsa36.patch)
   26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch
   (Replaces CVE-2013-0153-xsa36.patch)
   26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
   CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
   26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
   CVE-2013-0153-xsa36.patch)
   * bnc#798188 - Add $network to xend initscript
   dependencies
   * bnc#799694 - Unable to dvd or cdrom-boot DomU after
   xen-tools update Fixed with update to Xen version 4.1.4
   * bnc#800156 - L3: HP iLo Generate NMI function not
   working in XEN kernel
   * Upstream patches from Jan
   26404-x86-forward-both-NMI-kinds.patch
   26427-x86-AMD-enable-WC+.patch
   * bnc#793927 - Xen VMs with more than 2 disks randomly
   fail to start
   * Upstream patches from Jan
   26332-x86-compat-show-guest-stack-mfn.patch
   26333-x86-get_page_type-assert.patch (Replaces
   CVE-2013-0154-xsa37.patch)
   26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
   CVE-2012-5634-xsa33.patch)
   26370-libxc-x86-initial-mapping-fit.patch
   * Update to Xen 4.1.4 c/s 23432
   * Update xenpaging.guest-memusage.patch add rule for
   xenmem to avoid spurious build failures
   * Upstream patches from Jan
   26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch
   26188-x86-time-scale-asm.patch
   26200-IOMMU-debug-verbose.patch
   26203-x86-HAP-dirty-vram-leak.patch
   26229-gnttab-version-switch.patch (Replaces
   CVE-2012-5510-xsa26.patch)
   26230-x86-HVM-limit-batches.patch (Replaces
   CVE-2012-5511-xsa27.patch)
   26231-memory-exchange-checks.patch (Replaces
   CVE-2012-5513-xsa29.patch)
   26232-x86-mark-PoD-error-path.patch (Replaces
   CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
   (Replaces CVE-2012-5515-xsa31.patch)
   26235-IOMMU-ATS-max-queue-depth.patch
   26272-x86-EFI-makefile-cflags-filter.patch
   26294-x86-AMD-Fam15-way-access-filter.patch
   CVE-2013-0154-xsa37.patch
   * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch.
   Modify the EFI Makefile to do additional filtering.

   Security Issue references:

   * CVE-2013-0153
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153
   >
   * CVE-2012-6075
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075
   >
   * CVE-2012-5634
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-xen-7492

   - SUSE Linux Enterprise Server 11 SP2 for VMware:

      zypper in -t patch slessp2-xen-7492

   - SUSE Linux Enterprise Server 11 SP2:

      zypper in -t patch slessp2-xen-7492

   - SUSE Linux Enterprise Desktop 11 SP2:

      zypper in -t patch sledsp2-xen-7492

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):

      xen-devel-4.1.4_02-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

      xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

      xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1
      xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1
      xen-libs-4.1.4_02-0.5.1
      xen-tools-domU-4.1.4_02-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (x86_64):

      xen-4.1.4_02-0.5.1
      xen-doc-html-4.1.4_02-0.5.1
      xen-doc-pdf-4.1.4_02-0.5.1
      xen-libs-32bit-4.1.4_02-0.5.1
      xen-tools-4.1.4_02-0.5.1

   - SUSE Linux Enterprise Server 11 SP2 (i586):

      xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

      xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1
      xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1
      xen-libs-4.1.4_02-0.5.1
      xen-tools-domU-4.1.4_02-0.5.1

   - SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

      xen-4.1.4_02-0.5.1
      xen-doc-html-4.1.4_02-0.5.1
      xen-doc-pdf-4.1.4_02-0.5.1
      xen-libs-32bit-4.1.4_02-0.5.1
      xen-tools-4.1.4_02-0.5.1

   - SUSE Linux Enterprise Desktop 11 SP2 (i586):

      xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2012-5634.html
   http://support.novell.com/security/cve/CVE-2012-6075.html
   http://support.novell.com/security/cve/CVE-2013-0153.html
   https://bugzilla.novell.com/793927
   https://bugzilla.novell.com/794316
   https://bugzilla.novell.com/797014
   https://bugzilla.novell.com/797031
   https://bugzilla.novell.com/797523
   https://bugzilla.novell.com/798188
   https://bugzilla.novell.com/799694
   https://bugzilla.novell.com/800156
   https://bugzilla.novell.com/800275
   https://bugzilla.novell.com/802690
   https://bugzilla.novell.com/805094
   https://bugzilla.novell.com/806736
   http://download.novell.com/patch/finder/?keywords=6ce1ad48227bea66786cefd7aba4662f



More information about the sle-security-updates mailing list