openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2016:0124-1
Rating:             important
References:         #947165 #950704 #954018 #954405 #956408 #956409 
                    #956411 #956592 #956832 #957988 #958007 #958009 
                    #958493 #958523 #958918 #959006 
Cross-References:   CVE-2015-5307 CVE-2015-7311 CVE-2015-7504
                    CVE-2015-7549 CVE-2015-7970 CVE-2015-8104
                    CVE-2015-8339 CVE-2015-8340 CVE-2015-8341
                    CVE-2015-8345 CVE-2015-8504 CVE-2015-8550
                    CVE-2015-8554 CVE-2015-8555 CVE-2015-8558
                   
Affected Products:
                    openSUSE 13.1
______________________________________________________________________________

   An update that solves 15 vulnerabilities and has one errata
   is now available.

Description:


   This update for xen fixes the following security issues:

   - CVE-2015-8550: paravirtualized drivers incautious about shared memory
     contents (XSA-155, boo#957988)
   - CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in
     DoS (boo#959006)
   - CVE-2015-7549: qemu pci: null pointer dereference issue (boo#958918)
   - CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493)
   - CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164,
     boo#958007)
   - CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization
     (XSA-165, boo#958009)
   - boo#958523 xen: ioreq handling possibly susceptible to multiple read
     issue (XSA-166)
   - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing
     command block list (boo#956832)
   - boo#956592: xen: virtual PMU is unsupported (XSA-163)
   - CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues
     (XSA-159, boo#956408)
   - CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error
     (XSA-160, boo#956409)
   - CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator
     (XSA-162, boo#956411)
   - CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with
     qemu-xen (xsa-142, boo#947165)
   - CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in
     microcode via #DB exception (boo#954405)
   - CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156,
     boo#954018)
   - CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is
     not preemptible (XSA-150, boo#950704)


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 13.1:

      zypper in -t patch openSUSE-2016-34=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 13.1 (i586 x86_64):

      xen-debugsource-4.3.4_10-53.1
      xen-devel-4.3.4_10-53.1
      xen-kmp-default-4.3.4_10_k3.11.10_29-53.1
      xen-kmp-default-debuginfo-4.3.4_10_k3.11.10_29-53.1
      xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1
      xen-kmp-desktop-debuginfo-4.3.4_10_k3.11.10_29-53.1
      xen-libs-4.3.4_10-53.1
      xen-libs-debuginfo-4.3.4_10-53.1
      xen-tools-domU-4.3.4_10-53.1
      xen-tools-domU-debuginfo-4.3.4_10-53.1

   - openSUSE 13.1 (x86_64):

      xen-4.3.4_10-53.1
      xen-doc-html-4.3.4_10-53.1
      xen-libs-32bit-4.3.4_10-53.1
      xen-libs-debuginfo-32bit-4.3.4_10-53.1
      xen-tools-4.3.4_10-53.1
      xen-tools-debuginfo-4.3.4_10-53.1
      xen-xend-tools-4.3.4_10-53.1
      xen-xend-tools-debuginfo-4.3.4_10-53.1

   - openSUSE 13.1 (i586):

      xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1
      xen-kmp-pae-debuginfo-4.3.4_10_k3.11.10_29-53.1


References:

   https://www.suse.com/security/cve/CVE-2015-5307.html
   https://www.suse.com/security/cve/CVE-2015-7311.html
   https://www.suse.com/security/cve/CVE-2015-7504.html
   https://www.suse.com/security/cve/CVE-2015-7549.html
   https://www.suse.com/security/cve/CVE-2015-7970.html
   https://www.suse.com/security/cve/CVE-2015-8104.html
   https://www.suse.com/security/cve/CVE-2015-8339.html
   https://www.suse.com/security/cve/CVE-2015-8340.html
   https://www.suse.com/security/cve/CVE-2015-8341.html
   https://www.suse.com/security/cve/CVE-2015-8345.html
   https://www.suse.com/security/cve/CVE-2015-8504.html
   https://www.suse.com/security/cve/CVE-2015-8550.html
   https://www.suse.com/security/cve/CVE-2015-8554.html
   https://www.suse.com/security/cve/CVE-2015-8555.html
   https://www.suse.com/security/cve/CVE-2015-8558.html
   https://bugzilla.suse.com/947165
   https://bugzilla.suse.com/950704
   https://bugzilla.suse.com/954018
   https://bugzilla.suse.com/954405
   https://bugzilla.suse.com/956408
   https://bugzilla.suse.com/956409
   https://bugzilla.suse.com/956411
   https://bugzilla.suse.com/956592
   https://bugzilla.suse.com/956832
   https://bugzilla.suse.com/957988
   https://bugzilla.suse.com/958007
   https://bugzilla.suse.com/958009
   https://bugzilla.suse.com/958493
   https://bugzilla.suse.com/958523
   https://bugzilla.suse.com/958918
   https://bugzilla.suse.com/959006

-- 

openSUSE: 2016:0124-1: important: xen

January 14, 2016
An update that solves 15 vulnerabilities and has one errata is now available.

Description

This update for xen fixes the following security issues: - CVE-2015-8550: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988) - CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006) - CVE-2015-7549: qemu pci: null pointer dereference issue (boo#958918) - CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493) - CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007) - CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009) - boo#958523 xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832) - boo#956592: xen: virtual PMU is unsupported (XSA-163) - CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408) - CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409) - CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411) - CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142, boo#947165) - CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception (boo#954405) - CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018) - CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150, boo#950704)

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2016-34=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 13.1 (i586 x86_64): xen-debugsource-4.3.4_10-53.1 xen-devel-4.3.4_10-53.1 xen-kmp-default-4.3.4_10_k3.11.10_29-53.1 xen-kmp-default-debuginfo-4.3.4_10_k3.11.10_29-53.1 xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1 xen-kmp-desktop-debuginfo-4.3.4_10_k3.11.10_29-53.1 xen-libs-4.3.4_10-53.1 xen-libs-debuginfo-4.3.4_10-53.1 xen-tools-domU-4.3.4_10-53.1 xen-tools-domU-debuginfo-4.3.4_10-53.1 - openSUSE 13.1 (x86_64): xen-4.3.4_10-53.1 xen-doc-html-4.3.4_10-53.1 xen-libs-32bit-4.3.4_10-53.1 xen-libs-debuginfo-32bit-4.3.4_10-53.1 xen-tools-4.3.4_10-53.1 xen-tools-debuginfo-4.3.4_10-53.1 xen-xend-tools-4.3.4_10-53.1 xen-xend-tools-debuginfo-4.3.4_10-53.1 - openSUSE 13.1 (i586): xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1 xen-kmp-pae-debuginfo-4.3.4_10_k3.11.10_29-53.1


References

https://www.suse.com/security/cve/CVE-2015-5307.html https://www.suse.com/security/cve/CVE-2015-7311.html https://www.suse.com/security/cve/CVE-2015-7504.html https://www.suse.com/security/cve/CVE-2015-7549.html https://www.suse.com/security/cve/CVE-2015-7970.html https://www.suse.com/security/cve/CVE-2015-8104.html https://www.suse.com/security/cve/CVE-2015-8339.html https://www.suse.com/security/cve/CVE-2015-8340.html https://www.suse.com/security/cve/CVE-2015-8341.html https://www.suse.com/security/cve/CVE-2015-8345.html https://www.suse.com/security/cve/CVE-2015-8504.html https://www.suse.com/security/cve/CVE-2015-8550.html https://www.suse.com/security/cve/CVE-2015-8554.html https://www.suse.com/security/cve/CVE-2015-8555.html https://www.suse.com/security/cve/CVE-2015-8558.html https://bugzilla.suse.com/947165 https://bugzilla.suse.com/950704 https://bugzilla.suse.com/954018 https://bugzilla.suse.com/954405 https://bugzilla.suse.com/956408 https://bugzilla.suse.com/956409 https://bugzilla.suse.com/956411 https://bugzilla.suse.com/956592 https://bugzilla.suse.com/956832 https://bugzilla.suse.com/957988 https://bugzilla.suse.com/958007 https://bugzilla.suse.com/958009 https://bugzilla.suse.com/958493 https://bugzilla.suse.com/958523 https://bugzilla.suse.com/958918 https://bugzilla.suse.com/959006--


Severity
Announcement ID: openSUSE-SU-2016:0124-1
Rating: important
Affected Products: openSUSE 13.1 le.

Related News