openSUSE Security Update: Security Update for Xen
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2012:1174-1
Rating:             important
References:         #744771 #762484 #773393 #773401 #776995 #777084 
                    #777090 #777091 
Cross-References:   CVE-2012-2625 CVE-2012-3432 CVE-2012-3433
                    CVE-2012-3494 CVE-2012-3496 CVE-2012-3515
                   
Affected Products:
                    openSUSE 11.4
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has two fixes
   is now available.

Description:

   Security Update for Xen

   Following fixes were done:
   - bnc#776995 - attaching scsi control luns with pvscsi
   - xend/pvscsi: fix passing of SCSI control LUNs
   xen-bug776995-pvscsi-no-devname.patch
   - xend/pvscsi: fix usage of persistant device names for
   SCSI devices xen-bug776995-pvscsi-persistent-names.patch
   - xend/pvscsi: update sysfs parser for Linux 3.0
   xen-bug776995-pvscsi-sysfs-parser.patch

   - bnc#777090 - VUL-0: CVE-2012-3494: xen: hypercall
   set_debugreg vulnerability (XSA-12)
   CVE-2012-3494-xsa12.patch
   - bnc#777091 - VUL-0: CVE-2012-3496: xen:
   XENMEM_populate_physmap DoS vulnerability (XSA-14)
   CVE-2012-3496-xsa14.patch
   - bnc#777084 - VUL-0: CVE-2012-3515: xen: Qemu VT100
   emulation vulnerability (XSA-17) CVE-2012-3515-xsa17.patch

   - bnc#744771 - VM with passed through PCI card fails to
   reboot under dom0 load 24888-pci-release-devices.patch

   - Upstream patches from Jan
   25431-x86-EDD-MBR-sig-check.patch
   25459-page-list-splice.patch
   25478-x86-unknown-NMI-deadlock.patch
   25480-x86_64-sysret-canonical.patch
   25481-x86_64-AMD-erratum-121.patch
   25485-x86_64-canonical-checks.patch
   25587-param-parse-limit.patch 25617-vtd-qinval-addr.patch
   25688-x86-nr_irqs_gsi.patch

   - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy
   p2m teardown host DoS vulnerability
   CVE-2012-3433-xsa11.patch
   - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user
   mode MMIO emulation DoS
   25682-x86-inconsistent-io-state.patch

   - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader
   doesn't check the size of the bzip2 or lzma compressed
   kernel, leading to denial of service
   25589-pygrub-size-limits.patch


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 11.4:

      zypper in -t patch openSUSE-2012-596

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 11.4 (i586 x86_64):

      xen-4.0.3_04-45.1
      xen-debugsource-4.0.3_04-45.1
      xen-devel-4.0.3_04-45.1
      xen-doc-html-4.0.3_04-45.1
      xen-doc-pdf-4.0.3_04-45.1
      xen-kmp-default-4.0.3_04_k2.6.37.6_0.20-45.1
      xen-kmp-default-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1
      xen-kmp-desktop-4.0.3_04_k2.6.37.6_0.20-45.1
      xen-kmp-desktop-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1
      xen-libs-4.0.3_04-45.1
      xen-libs-debuginfo-4.0.3_04-45.1
      xen-tools-4.0.3_04-45.1
      xen-tools-debuginfo-4.0.3_04-45.1
      xen-tools-domU-4.0.3_04-45.1
      xen-tools-domU-debuginfo-4.0.3_04-45.1

   - openSUSE 11.4 (i586):

      xen-kmp-pae-4.0.3_04_k2.6.37.6_0.20-45.1
      xen-kmp-pae-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1


References:

   https://www.suse.com/security/cve/CVE-2012-2625.html
   https://www.suse.com/security/cve/CVE-2012-3432.html
   https://www.suse.com/security/cve/CVE-2012-3433.html
   https://www.suse.com/security/cve/CVE-2012-3494.html
   https://www.suse.com/security/cve/CVE-2012-3496.html
   https://www.suse.com/security/cve/CVE-2012-3515.html
   https://bugzilla.novell.com/744771
   https://bugzilla.novell.com/762484
   https://bugzilla.novell.com/773393
   https://bugzilla.novell.com/773401
   https://bugzilla.novell.com/776995
   https://bugzilla.novell.com/777084
   https://bugzilla.novell.com/777090
   https://bugzilla.novell.com/777091

openSUSE: 2012:1174-1: important: Security Update for Xen

September 14, 2012
An update that solves 6 vulnerabilities and has two fixes An update that solves 6 vulnerabilities and has two fixes An update that solves 6 vulnerabilities and has two fixes is now...

Description

Security Update for Xen Following fixes were done: - bnc#776995 - attaching scsi control luns with pvscsi - xend/pvscsi: fix passing of SCSI control LUNs xen-bug776995-pvscsi-no-devname.patch - xend/pvscsi: fix usage of persistant device names for SCSI devices xen-bug776995-pvscsi-persistent-names.patch - xend/pvscsi: update sysfs parser for Linux 3.0 xen-bug776995-pvscsi-sysfs-parser.patch - bnc#777090 - VUL-0: CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12) CVE-2012-3494-xsa12.patch - bnc#777091 - VUL-0: CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch - bnc#777084 - VUL-0: CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17) CVE-2012-3515-xsa17.patch - bnc#744771 - VM with passed through PCI card fails to reboot under dom0 load 24888-pci-release-devices.patch - Upstream patches from Jan 25431-x86-EDD-MBR-sig-check.patch 25459-page-list-splice.patch 25478-x86-unknown-NMI-deadlock.patch 25480-x86_64-sysret-canonical.patch 25481-x86_64-AMD-erratum-121.patch 25485-x86_64-canonical-checks.patch 25587-param-parse-limit.patch 25617-vtd-qinval-addr.patch 25688-x86-nr_irqs_gsi.patch - bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m teardown host DoS vulnerability CVE-2012-3433-xsa11.patch - bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO emulation DoS 25682-x86-inconsistent-io-state.patch - bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service 25589-pygrub-size-limits.patch

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch openSUSE-2012-596 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 11.4 (i586 x86_64): xen-4.0.3_04-45.1 xen-debugsource-4.0.3_04-45.1 xen-devel-4.0.3_04-45.1 xen-doc-html-4.0.3_04-45.1 xen-doc-pdf-4.0.3_04-45.1 xen-kmp-default-4.0.3_04_k2.6.37.6_0.20-45.1 xen-kmp-default-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1 xen-kmp-desktop-4.0.3_04_k2.6.37.6_0.20-45.1 xen-kmp-desktop-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1 xen-libs-4.0.3_04-45.1 xen-libs-debuginfo-4.0.3_04-45.1 xen-tools-4.0.3_04-45.1 xen-tools-debuginfo-4.0.3_04-45.1 xen-tools-domU-4.0.3_04-45.1 xen-tools-domU-debuginfo-4.0.3_04-45.1 - openSUSE 11.4 (i586): xen-kmp-pae-4.0.3_04_k2.6.37.6_0.20-45.1 xen-kmp-pae-debuginfo-4.0.3_04_k2.6.37.6_0.20-45.1


References

https://www.suse.com/security/cve/CVE-2012-2625.html https://www.suse.com/security/cve/CVE-2012-3432.html https://www.suse.com/security/cve/CVE-2012-3433.html https://www.suse.com/security/cve/CVE-2012-3494.html https://www.suse.com/security/cve/CVE-2012-3496.html https://www.suse.com/security/cve/CVE-2012-3515.html https://bugzilla.novell.com/744771 https://bugzilla.novell.com/762484 https://bugzilla.novell.com/773393 https://bugzilla.novell.com/773401 https://bugzilla.novell.com/776995 https://bugzilla.novell.com/777084 https://bugzilla.novell.com/777090 https://bugzilla.novell.com/777091


Severity
Announcement ID: openSUSE-SU-2012:1174-1
Rating: important
Affected Products: openSUSE 11.4

Related News