SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0022-1
Rating:             important
References:         #826717 #866902 #882089 #889526 #896023 #897614 
                    #897906 #898772 #900292 #901317 #903357 #903359 
                    #903850 #903967 #903970 #905465 #905467 #906439 
                    
Cross-References:   CVE-2013-3495 CVE-2014-5146 CVE-2014-5149
                    CVE-2014-8594 CVE-2014-8595 CVE-2014-8866
                    CVE-2014-8867 CVE-2014-9030
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that solves 8 vulnerabilities and has 10 fixes is
   now available.

Description:

   xen was updated to fix nine security issues.

   These security issues were fixed:
   - Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling
     (CVE-2014-9030).
   - Insufficient bounding of "REP MOVS" to MMIO emulated inside the
     hypervisor (CVE-2014-8867).
   - Excessive checking in compatibility mode hypercall argument translation
     (CVE-2014-8866).
   - Guest user mode triggerable VM exits not handled by hypervisor
     (bnc#9038500).
   - Missing privilege level checks in x86 emulation of far branches
     (CVE-2014-8595).
   - Insufficient restrictions on certain MMU update hypercalls
     (CVE-2014-8594).
   - Long latency virtual-mmu operations are not preemptible (CVE-2014-5146,
     CVE-2014-5149).
   - Intel VT-d Interrupt Remapping engines can be evaded by native NMI
     interrupts  (CVE-2013-3495).

   These non-security issues were fixed:
   - Corrupted save/restore test leaves orphaned data in xenstore
     (bnc#903357).
   - Temporary migration name is not cleaned up after migration (bnc#903359).
   - Xen save/restore of HVM guests cuts off disk and networking
     (bnc#866902).
   - increase limit domUloader to 32MB (bnc#901317).
   - XEN Host crashes when assigning non-VF device (SR-IOV) to guest
     (bnc#898772).
   - Windows 2012 R2 fails to boot up with greater than 60 vcpus (bnc#882089).
   - Restrict requires on grub2-x86_64-xen to x86_64 hosts
   - Change default dump directory (bsc#900292).
   - Update xen2libvirt.py to better detect and handle file formats
   - libxc: check return values on mmap() and madvise() on
     xc_alloc_hypercall_buffer() (bnc#897906).
   - Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available
     (bnc#897614).
   - Adjust xentop column layout (bnc#896023).


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2015-8

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-8

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-8

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12 (x86_64):

      xen-debugsource-4.4.1_08-5.2
      xen-devel-4.4.1_08-5.2

   - SUSE Linux Enterprise Server 12 (x86_64):

      xen-4.4.1_08-5.2
      xen-debugsource-4.4.1_08-5.2
      xen-doc-html-4.4.1_08-5.2
      xen-kmp-default-4.4.1_08_k3.12.28_4-5.2
      xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2
      xen-libs-32bit-4.4.1_08-5.2
      xen-libs-4.4.1_08-5.2
      xen-libs-debuginfo-32bit-4.4.1_08-5.2
      xen-libs-debuginfo-4.4.1_08-5.2
      xen-tools-4.4.1_08-5.2
      xen-tools-debuginfo-4.4.1_08-5.2
      xen-tools-domU-4.4.1_08-5.2
      xen-tools-domU-debuginfo-4.4.1_08-5.2

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      xen-4.4.1_08-5.2
      xen-debugsource-4.4.1_08-5.2
      xen-kmp-default-4.4.1_08_k3.12.28_4-5.2
      xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2
      xen-libs-32bit-4.4.1_08-5.2
      xen-libs-4.4.1_08-5.2
      xen-libs-debuginfo-32bit-4.4.1_08-5.2
      xen-libs-debuginfo-4.4.1_08-5.2


References:

   https://support.novell.com/security/cve/CVE-2013-3495.html
   https://support.novell.com/security/cve/CVE-2014-5146.html
   https://support.novell.com/security/cve/CVE-2014-5149.html
   https://support.novell.com/security/cve/CVE-2014-8594.html
   https://support.novell.com/security/cve/CVE-2014-8595.html
   https://support.novell.com/security/cve/CVE-2014-8866.html
   https://support.novell.com/security/cve/CVE-2014-8867.html
   https://support.novell.com/security/cve/CVE-2014-9030.html
   https://bugzilla.suse.com/show_bug.cgi?id=826717
   https://bugzilla.suse.com/show_bug.cgi?id=866902
   https://bugzilla.suse.com/show_bug.cgi?id=882089
   https://bugzilla.suse.com/show_bug.cgi?id=889526
   https://bugzilla.suse.com/show_bug.cgi?id=896023
   https://bugzilla.suse.com/show_bug.cgi?id=897614
   https://bugzilla.suse.com/show_bug.cgi?id=897906
   https://bugzilla.suse.com/show_bug.cgi?id=898772
   https://bugzilla.suse.com/show_bug.cgi?id=900292
   https://bugzilla.suse.com/show_bug.cgi?id=901317
   https://bugzilla.suse.com/show_bug.cgi?id=903357
   https://bugzilla.suse.com/show_bug.cgi?id=903359
   https://bugzilla.suse.com/show_bug.cgi?id=903850
   https://bugzilla.suse.com/show_bug.cgi?id=903967
   https://bugzilla.suse.com/show_bug.cgi?id=903970
   https://bugzilla.suse.com/show_bug.cgi?id=905465
   https://bugzilla.suse.com/show_bug.cgi?id=905467
   https://bugzilla.suse.com/show_bug.cgi?id=906439

SuSE: 2015:0022-1: important: xen

January 9, 2015
An update that solves 8 vulnerabilities and has 10 fixes is An update that solves 8 vulnerabilities and has 10 fixes is An update that solves 8 vulnerabilities and has 10 fixes is ...

Summary

xen was updated to fix nine security issues. These security issues were fixed: - Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030). - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (CVE-2014-8867). - Excessive checking in compatibility mode hypercall argument translation (CVE-2014-8866). - Guest user mode triggerable VM exits not handled by hypervisor (bnc#9038500). - Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). - Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594). - Long latency virtual-mmu operations are not preemptible (CVE-2014-5146, CVE-2014-5149). - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts (CVE-2013-3495). These non-security issues were fixed: - Corrupted save/restore test leaves orphaned data in xenstore (bnc#903357). - Temporary migration name is not cleaned up after migration (bnc#903359). - Xen save/restore of HVM guests cuts off disk and networking (bnc#866902). - increase limit domUloader to 32MB (bnc#901317). - XEN Host crashes when assigning non-VF device (SR-IOV) to guest (bnc#898772). - Windows 2012 R2 fails to boot up with greater than 60 vcpus (bnc#882089). - Restrict requires on grub2-x86_64-xen to x86_64 hosts - Change default dump directory (bsc#900292). - Update xen2libvirt.py to better detect and handle file formats - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() (bnc#897906). - Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available (bnc#897614). - Adjust xentop column layout (bnc#896023). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12: zypper in -t patch SUSE-SLE-SDK-12-2015-8 - SUSE Linux Enterprise Server 12: zypper in -t patch SUSE-SLE-SERVER-12-2015-8 - SUSE Linux Enterprise Desktop 12: zypper in -t patch SUSE-SLE-DESKTOP-12-2015-8 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12 (x86_64): xen-debugsource-4.4.1_08-5.2 xen-devel-4.4.1_08-5.2 - SUSE Linux Enterprise Server 12 (x86_64): xen-4.4.1_08-5.2 xen-debugsource-4.4.1_08-5.2 xen-doc-html-4.4.1_08-5.2 xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2 xen-libs-32bit-4.4.1_08-5.2 xen-libs-4.4.1_08-5.2 xen-libs-debuginfo-32bit-4.4.1_08-5.2 xen-libs-debuginfo-4.4.1_08-5.2 xen-tools-4.4.1_08-5.2 xen-tools-debuginfo-4.4.1_08-5.2 xen-tools-domU-4.4.1_08-5.2 xen-tools-domU-debuginfo-4.4.1_08-5.2 - SUSE Linux Enterprise Desktop 12 (x86_64): xen-4.4.1_08-5.2 xen-debugsource-4.4.1_08-5.2 xen-kmp-default-4.4.1_08_k3.12.28_4-5.2 xen-kmp-default-debuginfo-4.4.1_08_k3.12.28_4-5.2 xen-libs-32bit-4.4.1_08-5.2 xen-libs-4.4.1_08-5.2 xen-libs-debuginfo-32bit-4.4.1_08-5.2 xen-libs-debuginfo-4.4.1_08-5.2

References

#826717 #866902 #882089 #889526 #896023 #897614

#897906 #898772 #900292 #901317 #903357 #903359

#903850 #903967 #903970 #905465 #905467 #906439

Cross- CVE-2013-3495 CVE-2014-5146 CVE-2014-5149

CVE-2014-8594 CVE-2014-8595 CVE-2014-8866

CVE-2014-8867 CVE-2014-9030

Affected Products:

SUSE Linux Enterprise Software Development Kit 12

SUSE Linux Enterprise Server 12

SUSE Linux Enterprise Desktop 12

https://support.novell.com/security/cve/CVE-2013-3495.html

https://support.novell.com/security/cve/CVE-2014-5146.html

https://support.novell.com/security/cve/CVE-2014-5149.html

https://support.novell.com/security/cve/CVE-2014-8594.html

https://support.novell.com/security/cve/CVE-2014-8595.html

https://support.novell.com/security/cve/CVE-2014-8866.html

https://support.novell.com/security/cve/CVE-2014-8867.html

https://support.novell.com/security/cve/CVE-2014-9030.html

https://bugzilla.suse.com/show_bug.cgi?id=826717

https://bugzilla.suse.com/show_bug.cgi?id=866902

https://bugzilla.suse.com/show_bug.cgi?id=882089

https://bugzilla.suse.com/show_bug.cgi?id=889526

https://bugzilla.suse.com/show_bug.cgi?id=896023

https://bugzilla.suse.com/show_bug.cgi?id=897614

https://bugzilla.suse.com/show_bug.cgi?id=897906

https://bugzilla.suse.com/show_bug.cgi?id=898772

https://bugzilla.suse.com/show_bug.cgi?id=900292

https://bugzilla.suse.com/show_bug.cgi?id=901317

https://bugzilla.suse.com/show_bug.cgi?id=903357

https://bugzilla.suse.com/show_bug.cgi?id=903359

https://bugzilla.suse.com/show_bug.cgi?id=903850

https://bugzilla.suse.com/show_bug.cgi?id=903967

https://bugzilla.suse.com/show_bug.cgi?id=903970

https://bugzilla.suse.com/show_bug.cgi?id=905465

https://bugzilla.suse.com/show_bug.cgi?id=905467

https://bugzilla.suse.com/show_bug.cgi?id=906439

Severity
Announcement ID: SUSE-SU-2015:0022-1
Rating: important