openSUSE Security Update: xen: security and bugfix update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1279-1 Rating: important References: #798770 #820873 #833483 #842006 #858178 #862608 #864801 #865682 #867910 #878841 #880751 #881900 #891539 #895798 #895799 #895802 #896023 #897657 Cross-References: CVE-2013-4344 CVE-2013-4540 CVE-2014-2599 CVE-2014-3967 CVE-2014-3968 CVE-2014-4021 CVE-2014-7154 CVE-2014-7155 CVE-2014-7156 CVE-2014-7188 Affected Products: openSUSE 12.3 ______________________________________________________________________________ An update that solves 10 vulnerabilities and has 8 fixes is now available. Description: XEN was updated to fix various bugs and security issues. Security issues fixed: - bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation - bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts - bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation - bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram - bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load - bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests - bnc#878841 - CVE-2014-3967,CVE-2014-3968: XSA-96: Vulnerabilities in HVM MSI injection - bnc#867910 - CVE-2014-2599: XSA-89: HVMOP_set_mem_access is not preemptible - bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow Other bugs fixed: - bnc#896023 - Adjust xentop column layout - bnc#891539 - xend: fix netif convertToDeviceNumber for running domains - bnc#820873 - The "long" option doesn't work with "xl list" - bnc#881900 - XEN kernel panic do_device_not_available() - bnc#833483 - Boot Failure with xen kernel in UEFI mode with error "No memory for trampoline" - bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released - bnc#858178 - [HP HPS Bug]: SLES11sp3 XEN kiso version cause softlockup on 8 blades npar(480 cpu) - bnc#865682 - Local attach support for PHY backends using scripts - bnc#798770 - Improve multipath support for npiv devices Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.3: zypper in -t patch openSUSE-2014-579 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.3 (i586 x86_64): xen-debugsource-4.2.4_04-1.32.1 xen-devel-4.2.4_04-1.32.1 xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 xen-kmp-default-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1 xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 xen-kmp-desktop-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1 xen-libs-4.2.4_04-1.32.1 xen-libs-debuginfo-4.2.4_04-1.32.1 xen-tools-domU-4.2.4_04-1.32.1 xen-tools-domU-debuginfo-4.2.4_04-1.32.1 - openSUSE 12.3 (x86_64): xen-4.2.4_04-1.32.1 xen-doc-html-4.2.4_04-1.32.1 xen-doc-pdf-4.2.4_04-1.32.1 xen-libs-32bit-4.2.4_04-1.32.1 xen-libs-debuginfo-32bit-4.2.4_04-1.32.1 xen-tools-4.2.4_04-1.32.1 xen-tools-debuginfo-4.2.4_04-1.32.1 - openSUSE 12.3 (i586): xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 xen-kmp-pae-debuginfo-4.2.4_04_k3.7.10_1.40-1.32.1 References: http://support.novell.com/security/cve/CVE-2013-4344.html http://support.novell.com/security/cve/CVE-2013-4540.html http://support.novell.com/security/cve/CVE-2014-2599.html http://support.novell.com/security/cve/CVE-2014-3967.html http://support.novell.com/security/cve/CVE-2014-3968.html http://support.novell.com/security/cve/CVE-2014-4021.html http://support.novell.com/security/cve/CVE-2014-7154.html http://support.novell.com/security/cve/CVE-2014-7155.html http://support.novell.com/security/cve/CVE-2014-7156.html http://support.novell.com/security/cve/CVE-2014-7188.html https://bugzilla.suse.com/show_bug.cgi?id=798770 https://bugzilla.suse.com/show_bug.cgi?id=820873 https://bugzilla.suse.com/show_bug.cgi?id=833483 https://bugzilla.suse.com/show_bug.cgi?id=842006 https://bugzilla.suse.com/show_bug.cgi?id=858178 https://bugzilla.suse.com/show_bug.cgi?id=862608 https://bugzilla.suse.com/show_bug.cgi?id=864801 https://bugzilla.suse.com/show_bug.cgi?id=865682 https://bugzilla.suse.com/show_bug.cgi?id=867910 https://bugzilla.suse.com/show_bug.cgi?id=878841 https://bugzilla.suse.com/show_bug.cgi?id=880751 https://bugzilla.suse.com/show_bug.cgi?id=881900 https://bugzilla.suse.com/show_bug.cgi?id=891539 https://bugzilla.suse.com/show_bug.cgi?id=895798 https://bugzilla.suse.com/show_bug.cgi?id=895799 https://bugzilla.suse.com/show_bug.cgi?id=895802 https://bugzilla.suse.com/show_bug.cgi?id=896023 https://bugzilla.suse.com/show_bug.cgi?id=897657 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org