SUSE-SU-2015:0927-1: important: Security update for Xen
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu May 21 16:04:45 MDT 2015
SUSE Security Update: Security update for Xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:0927-1
Rating: important
References: #910441 #927967 #929339
Cross-References: CVE-2015-3456
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
Xen was updated to fix two security issues and a bug:
* CVE-2015-3456: A buffer overflow in the floppy drive emulation,
which could be used to carry out denial of service attacks or
potential code execution against the host. This vulnerability is
also known as VENOM.
* CVE-2015-3340: Xen did not initialize certain fields, which allowed
certain remote service domains to obtain sensitive information from
memory via a (1) XEN_DOMCTL_gettscinfo or (2)
XEN_SYSCTL_getdomaininfolist request.
* An exception in setCPUAffinity when restoring guests. (bsc#910441)
Security Issues:
* CVE-2015-3456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456>
* CVE-2015-3340
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340>
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP3:
zypper in -t patch sdksp3-xen=10673
- SUSE Linux Enterprise Server 11 SP3:
zypper in -t patch slessp3-xen=10673
- SUSE Linux Enterprise Desktop 11 SP3:
zypper in -t patch sledsp3-xen=10673
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
xen-devel-4.2.5_06-0.7.1
- SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):
xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
xen-libs-4.2.5_06-0.7.1
xen-tools-domU-4.2.5_06-0.7.1
- SUSE Linux Enterprise Server 11 SP3 (x86_64):
xen-4.2.5_06-0.7.1
xen-doc-html-4.2.5_06-0.7.1
xen-doc-pdf-4.2.5_06-0.7.1
xen-libs-32bit-4.2.5_06-0.7.1
xen-tools-4.2.5_06-0.7.1
- SUSE Linux Enterprise Server 11 SP3 (i586):
xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):
xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
xen-libs-4.2.5_06-0.7.1
xen-tools-domU-4.2.5_06-0.7.1
- SUSE Linux Enterprise Desktop 11 SP3 (x86_64):
xen-4.2.5_06-0.7.1
xen-doc-html-4.2.5_06-0.7.1
xen-doc-pdf-4.2.5_06-0.7.1
xen-libs-32bit-4.2.5_06-0.7.1
xen-tools-4.2.5_06-0.7.1
- SUSE Linux Enterprise Desktop 11 SP3 (i586):
xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1
References:
https://www.suse.com/security/cve/CVE-2015-3456.html
https://bugzilla.suse.com/910441
https://bugzilla.suse.com/927967
https://bugzilla.suse.com/929339
https://download.suse.com/patch/finder/?keywords=beaa1b0c2d4c1d543469208fc416ea1e
More information about the sle-security-updates
mailing list