SUSE-SU-2015:0745-1: moderate: Security update for Xen
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Apr 21 12:05:48 MDT 2015
SUSE Security Update: Security update for Xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0745-1
Rating: moderate
References: #918995 #918998 #919464 #922705 #922706
Cross-References: CVE-2015-2044 CVE-2015-2045 CVE-2015-2151
CVE-2015-2756
Affected Products:
SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
The Virtualization service XEN was updated to fix various bugs and
security issues.
The following security issues have been fixed:
*
CVE-2015-2756: XSA-126: Unmediated PCI command register access in
qemu could have lead to denial of service attacks against the host, if PCI
cards are passed through to guests.
*
XSA-125: Long latency MMIO mapping operations were not preemptible.
*
CVE-2015-2151: XSA-123: Instructions with register operands ignored
eventual segment overrides encoded for them. Due to an insufficiently
conditional assignment such a bogus segment override could have, however,
corrupted a pointer used subsequently to store the result of the
instruction.
*
CVE-2015-2045: XSA-122: The code handling certain sub-operations of
the HYPERVISOR_xen_version hypercall failed to fully initialize all fields
of structures subsequently copied back to guest memory. Due to this
hypervisor stack contents were copied into the destination of the
operation, thus becoming visible to the guest.
*
CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
with certain system devices checked whether the access size by the guest
is a supported one. When the access size is unsupported these routines
failed to set the data to be returned to the guest for read accesses, so
that hypervisor stack contents were copied into the destination of the
operation, thus becoming visible to the guest.
Security Issues:
* CVE-2015-2044
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044>
* CVE-2015-2045
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045>
* CVE-2015-2151
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151>
* CVE-2015-2756
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756>
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-xen-201503=10562
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64):
xen-4.0.3_21548_18-0.15.1
xen-doc-html-4.0.3_21548_18-0.15.1
xen-doc-pdf-4.0.3_21548_18-0.15.1
xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.15.1
xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.15.1
xen-libs-4.0.3_21548_18-0.15.1
xen-tools-4.0.3_21548_18-0.15.1
xen-tools-domU-4.0.3_21548_18-0.15.1
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586):
xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1
References:
https://www.suse.com/security/cve/CVE-2015-2044.html
https://www.suse.com/security/cve/CVE-2015-2045.html
https://www.suse.com/security/cve/CVE-2015-2151.html
https://www.suse.com/security/cve/CVE-2015-2756.html
https://bugzilla.suse.com/918995
https://bugzilla.suse.com/918998
https://bugzilla.suse.com/919464
https://bugzilla.suse.com/922705
https://bugzilla.suse.com/922706
https://download.suse.com/patch/finder/?keywords=95ca29a75abc84ada300aaa08a5ad840
More information about the sle-security-updates
mailing list