openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2015:0256-1
Rating:             important
References:         #826717 #866902 #882089 #889526 #896023 #897906 
                    #898772 #900292 #901317 #903357 #903359 #903850 
                    #903967 #903970 #904255 #905465 #905467 #906439 
                    #906996 #910681 
Cross-References:   CVE-2013-3495 CVE-2014-5146 CVE-2014-5149
                    CVE-2014-8594 CVE-2014-8595 CVE-2014-8866
                    CVE-2014-8867 CVE-2014-9030 CVE-2014-9065
                    CVE-2014-9066 CVE-2015-0361
Affected Products:
                    openSUSE 13.2
______________________________________________________________________________

   An update that solves 11 vulnerabilities and has 9 fixes is
   now available.

Description:


   The XEN virtualization was updated to fix bugs and security issues:

   Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to use
   after free on hvm guest teardown

   CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

   CVE-2014-9030: XSA-113: Guest effectable page reference leak in
   MMU_MACHPHYS_UPDATE handling

   CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO
   emulated inside the hypervisor

   CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode
   hypercall argument translation

   CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86
   emulation of far branches

   CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU
   update hypercalls

   CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be
   evaded by native NMI interrupts

   CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu
   operations are not preemptible

   Bugs fixed:
   - Restore missing fixes from block-dmmd script

   - bnc#904255 - XEN boot hangs in early boot on UEFI system

   - Fix missing banner by restoring figlet program

   - bnc#903357 - Corrupted save/restore test leaves orphaned data in xenstore

   - bnc#903359 - Temporary migration name is not cleaned up after migration

   - bnc#903850 - Xen: guest user mode triggerable VM exits not handled by
     hypervisor

   - bnc#866902 - Xen save/restore of HVM guests cuts off disk and networking

   - bnc#901317 - increase limit domUloader to 32MB

   - bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device
     (SR-IOV) to guest

   - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus

   - bsc#900292 - xl: change default dump directory

   - Update xen2libvirt.py to better detect and handle file formats

   - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus


   - bnc#897906 - libxc: check return values on mmap() and madvise()
     on xc_alloc_hypercall_buffer()

   - bnc#896023 - Adjust xentop column layout


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.2:

      zypper in -t patch openSUSE-2015-129=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.2 (i586 x86_64):

      xen-debugsource-4.4.1_08-9.1
      xen-devel-4.4.1_08-9.1
      xen-libs-4.4.1_08-9.1
      xen-libs-debuginfo-4.4.1_08-9.1
      xen-tools-domU-4.4.1_08-9.1
      xen-tools-domU-debuginfo-4.4.1_08-9.1

   - openSUSE 13.2 (x86_64):

      xen-4.4.1_08-9.1
      xen-doc-html-4.4.1_08-9.1
      xen-kmp-default-4.4.1_08_k3.16.7_7-9.1
      xen-kmp-default-debuginfo-4.4.1_08_k3.16.7_7-9.1
      xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1
      xen-kmp-desktop-debuginfo-4.4.1_08_k3.16.7_7-9.1
      xen-libs-32bit-4.4.1_08-9.1
      xen-libs-debuginfo-32bit-4.4.1_08-9.1
      xen-tools-4.4.1_08-9.1
      xen-tools-debuginfo-4.4.1_08-9.1


References:

   https://www.suse.com/security/cve/CVE-2013-3495.html
   https://www.suse.com/security/cve/CVE-2014-5146.html
   https://www.suse.com/security/cve/CVE-2014-5149.html
   https://www.suse.com/security/cve/CVE-2014-8594.html
   https://www.suse.com/security/cve/CVE-2014-8595.html
   https://www.suse.com/security/cve/CVE-2014-8866.html
   https://www.suse.com/security/cve/CVE-2014-8867.html
   https://www.suse.com/security/cve/CVE-2014-9030.html
   https://www.suse.com/security/cve/CVE-2014-9065.html
   https://www.suse.com/security/cve/CVE-2014-9066.html
   https://www.suse.com/security/cve/CVE-2015-0361.html
   https://bugzilla.suse.com/show_bug.cgi?id=826717
   https://bugzilla.suse.com/show_bug.cgi?id=866902
   https://bugzilla.suse.com/show_bug.cgi?id=882089
   https://bugzilla.suse.com/show_bug.cgi?id=889526
   https://bugzilla.suse.com/show_bug.cgi?id=896023
   https://bugzilla.suse.com/show_bug.cgi?id=897906
   https://bugzilla.suse.com/show_bug.cgi?id=898772
   https://bugzilla.suse.com/show_bug.cgi?id=900292
   https://bugzilla.suse.com/show_bug.cgi?id=901317
   https://bugzilla.suse.com/show_bug.cgi?id=903357
   https://bugzilla.suse.com/show_bug.cgi?id=903359
   https://bugzilla.suse.com/show_bug.cgi?id=903850
   https://bugzilla.suse.com/show_bug.cgi?id=903967
   https://bugzilla.suse.com/show_bug.cgi?id=903970
   https://bugzilla.suse.com/show_bug.cgi?id=904255
   https://bugzilla.suse.com/show_bug.cgi?id=905465
   https://bugzilla.suse.com/show_bug.cgi?id=905467
   https://bugzilla.suse.com/show_bug.cgi?id=906439
   https://bugzilla.suse.com/show_bug.cgi?id=906996
   https://bugzilla.suse.com/show_bug.cgi?id=910681

-- 

openSUSE: 2015:0256-1: important: xen

February 11, 2015
An update that solves 11 vulnerabilities and has 9 fixes is now available.

Description

The XEN virtualization was updated to fix bugs and security issues: Security issues fixed: CVE-2015-0361: XSA-116: xen: xen crash due to use after free on hvm guest teardown CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation CVE-2014-9030: XSA-113: Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode hypercall argument translation CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86 emulation of far branches CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU update hypercalls CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible Bugs fixed: - Restore missing fixes from block-dmmd script - bnc#904255 - XEN boot hangs in early boot on UEFI system - Fix missing banner by restoring figlet program - bnc#903357 - Corrupted save/restore test leaves orphaned data in xenstore - bnc#903359 - Temporary migration name is not cleaned up after migration - bnc#903850 - Xen: guest user mode triggerable VM exits not handled by hypervisor - bnc#866902 - Xen save/restore of HVM guests cuts off disk and networking - bnc#901317 - increase limit domUloader to 32MB - bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus - bsc#900292 - xl: change default dump directory - Update xen2libvirt.py to better detect and handle file formats - bnc#882089 - Windows 2012 R2 fails to boot up with greater than 60 vcpus - bnc#897906 - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() - bnc#896023 - Adjust xentop column layout

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2015-129=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.2 (i586 x86_64): xen-debugsource-4.4.1_08-9.1 xen-devel-4.4.1_08-9.1 xen-libs-4.4.1_08-9.1 xen-libs-debuginfo-4.4.1_08-9.1 xen-tools-domU-4.4.1_08-9.1 xen-tools-domU-debuginfo-4.4.1_08-9.1 - openSUSE 13.2 (x86_64): xen-4.4.1_08-9.1 xen-doc-html-4.4.1_08-9.1 xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 xen-kmp-default-debuginfo-4.4.1_08_k3.16.7_7-9.1 xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 xen-kmp-desktop-debuginfo-4.4.1_08_k3.16.7_7-9.1 xen-libs-32bit-4.4.1_08-9.1 xen-libs-debuginfo-32bit-4.4.1_08-9.1 xen-tools-4.4.1_08-9.1 xen-tools-debuginfo-4.4.1_08-9.1


References

https://www.suse.com/security/cve/CVE-2013-3495.html https://www.suse.com/security/cve/CVE-2014-5146.html https://www.suse.com/security/cve/CVE-2014-5149.html https://www.suse.com/security/cve/CVE-2014-8594.html https://www.suse.com/security/cve/CVE-2014-8595.html https://www.suse.com/security/cve/CVE-2014-8866.html https://www.suse.com/security/cve/CVE-2014-8867.html https://www.suse.com/security/cve/CVE-2014-9030.html https://www.suse.com/security/cve/CVE-2014-9065.html https://www.suse.com/security/cve/CVE-2014-9066.html https://www.suse.com/security/cve/CVE-2015-0361.html https://bugzilla.suse.com/show_bug.cgi?id=826717 https://bugzilla.suse.com/show_bug.cgi?id=866902 https://bugzilla.suse.com/show_bug.cgi?id=882089 https://bugzilla.suse.com/show_bug.cgi?id=889526 https://bugzilla.suse.com/show_bug.cgi?id=896023 https://bugzilla.suse.com/show_bug.cgi?id=897906 https://bugzilla.suse.com/show_bug.cgi?id=898772 https://bugzilla.suse.com/show_bug.cgi?id=900292 https://bugzilla.suse.com/show_bug.cgi?id=901317 https://bugzilla.suse.com/show_bug.cgi?id=903357 https://bugzilla.suse.com/show_bug.cgi?id=903359 https://bugzilla.suse.com/show_bug.cgi?id=903850 https://bugzilla.suse.com/show_bug.cgi?id=903967 https://bugzilla.suse.com/show_bug.cgi?id=903970 https://bugzilla.suse.com/show_bug.cgi?id=904255 https://bugzilla.suse.com/show_bug.cgi?id=905465 https://bugzilla.suse.com/show_bug.cgi?id=905467 https://bugzilla.suse.com/show_bug.cgi?id=906439 https://bugzilla.suse.com/show_bug.cgi?id=906996 https://bugzilla.suse.com/show_bug.cgi?id=910681--


Severity
Announcement ID: openSUSE-SU-2015:0256-1
Rating: important
Affected Products: openSUSE 13.2 le.

Related News