SUSE-SU-2015:0745-1: moderate: Security update for Xen

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Apr 21 12:05:48 MDT 2015


   SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0745-1
Rating:             moderate
References:         #918995 #918998 #919464 #922705 #922706 
Cross-References:   CVE-2015-2044 CVE-2015-2045 CVE-2015-2151
                    CVE-2015-2756
Affected Products:
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that solves four vulnerabilities and has one
   errata is now available.

Description:


   The Virtualization service XEN was updated to fix various bugs and
   security issues.

   The following security issues have been fixed:

       *

         CVE-2015-2756: XSA-126: Unmediated PCI command register access in
   qemu could have lead to denial of service attacks against the host, if PCI
   cards are passed through to guests.

       *

         XSA-125: Long latency MMIO mapping operations were not preemptible.

       *

         CVE-2015-2151: XSA-123: Instructions with register operands ignored
   eventual segment overrides encoded for them. Due to an insufficiently
   conditional assignment such a bogus segment override could have, however,
   corrupted a pointer used subsequently to store the result of the
   instruction.

       *

         CVE-2015-2045: XSA-122: The code handling certain sub-operations of
   the HYPERVISOR_xen_version hypercall failed to fully initialize all fields
   of structures subsequently copied back to guest memory. Due to this
   hypervisor stack contents were copied into the destination of the
   operation, thus becoming visible to the guest.

       *

         CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
   with certain system devices checked whether the access size by the guest
   is a supported one. When the access size is unsupported these routines
   failed to set the data to be returned to the guest for read accesses, so
   that hypervisor stack contents were copied into the destination of the
   operation, thus becoming visible to the guest.

   Security Issues:

       * CVE-2015-2044
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044>
       * CVE-2015-2045
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045>
       * CVE-2015-2151
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151>
       * CVE-2015-2756
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756>


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-xen-201503=10562

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 x86_64):

      xen-4.0.3_21548_18-0.15.1
      xen-doc-html-4.0.3_21548_18-0.15.1
      xen-doc-pdf-4.0.3_21548_18-0.15.1
      xen-kmp-default-4.0.3_21548_18_2.6.32.59_0.19-0.15.1
      xen-kmp-trace-4.0.3_21548_18_2.6.32.59_0.19-0.15.1
      xen-libs-4.0.3_21548_18-0.15.1
      xen-tools-4.0.3_21548_18-0.15.1
      xen-tools-domU-4.0.3_21548_18-0.15.1

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586):

      xen-kmp-pae-4.0.3_21548_18_2.6.32.59_0.19-0.15.1


References:

   https://www.suse.com/security/cve/CVE-2015-2044.html
   https://www.suse.com/security/cve/CVE-2015-2045.html
   https://www.suse.com/security/cve/CVE-2015-2151.html
   https://www.suse.com/security/cve/CVE-2015-2756.html
   https://bugzilla.suse.com/918995
   https://bugzilla.suse.com/918998
   https://bugzilla.suse.com/919464
   https://bugzilla.suse.com/922705
   https://bugzilla.suse.com/922706
   https://download.suse.com/patch/finder/?keywords=95ca29a75abc84ada300aaa08a5ad840



More information about the sle-updates mailing list