SUSE-SU-2015:1157-1: important: Security update for Xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Jun 29 07:05:15 MDT 2015


   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1157-1
Rating:             important
References:         #931625 #931626 #931627 #931628 #932770 #932996 
                    
Cross-References:   CVE-2015-3209 CVE-2015-4103 CVE-2015-4104
                    CVE-2015-4105 CVE-2015-4106 CVE-2015-4163
                    CVE-2015-4164
Affected Products:
                    SUSE Linux Enterprise Server 11 SP2 LTSS
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:


   Xen was updated to fix six security issues:

       * CVE-2015-4103: Potential unintended writes to host MSI message data
         field via qemu. (XSA-128, bsc#931625)
       * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
         (XSA-129, bsc#931626)
       * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
         messages. (XSA-130, bsc#931627)
       * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
         bsc#931628)
       * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
         to host escape. (XSA-135, bsc#932770)
       * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
         bsc#932996)

   Security Issues:

       * CVE-2015-4103
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
       * CVE-2015-4104
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
       * CVE-2015-4105
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
       * CVE-2015-4106
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
       * CVE-2015-4163
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163>
       * CVE-2015-4164
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
       * CVE-2015-3209
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP2 LTSS:

      zypper in -t patch slessp2-xen-201506=10729

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64):

      xen-devel-4.1.6_08-0.13.1
      xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1
      xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1
      xen-libs-4.1.6_08-0.13.1
      xen-tools-domU-4.1.6_08-0.13.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (x86_64):

      xen-4.1.6_08-0.13.1
      xen-doc-html-4.1.6_08-0.13.1
      xen-doc-pdf-4.1.6_08-0.13.1
      xen-libs-32bit-4.1.6_08-0.13.1
      xen-tools-4.1.6_08-0.13.1

   - SUSE Linux Enterprise Server 11 SP2 LTSS (i586):

      xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1


References:

   https://www.suse.com/security/cve/CVE-2015-3209.html
   https://www.suse.com/security/cve/CVE-2015-4103.html
   https://www.suse.com/security/cve/CVE-2015-4104.html
   https://www.suse.com/security/cve/CVE-2015-4105.html
   https://www.suse.com/security/cve/CVE-2015-4106.html
   https://www.suse.com/security/cve/CVE-2015-4163.html
   https://www.suse.com/security/cve/CVE-2015-4164.html
   https://bugzilla.suse.com/931625
   https://bugzilla.suse.com/931626
   https://bugzilla.suse.com/931627
   https://bugzilla.suse.com/931628
   https://bugzilla.suse.com/932770
   https://bugzilla.suse.com/932996
   https://download.suse.com/patch/finder/?keywords=664b696391d543da0f24d6d0b039a056



More information about the sle-security-updates mailing list