Mailinglist Archive: opensuse-security-announce (32 mails)

< Previous Next >
[security-announce] openSUSE-SU-2015:1092-1: important: Security update for xen
openSUSE Security Update: Security update for xen

Announcement ID: openSUSE-SU-2015:1092-1
Rating: important
References: #861318 #882089 #895528 #901488 #903680 #906689
#910254 #912011 #918995 #918998 #919098 #919464
#919663 #921842 #922705 #922706 #922709 #923758
#927967 #929339 #931625 #931626 #931627 #931628
#932770 #932790 #932996
Cross-References: CVE-2014-3615 CVE-2015-2044 CVE-2015-2045
CVE-2015-2151 CVE-2015-2152 CVE-2015-2751
CVE-2015-2752 CVE-2015-2756 CVE-2015-3209
CVE-2015-3340 CVE-2015-3456 CVE-2015-4103
CVE-2015-4104 CVE-2015-4105 CVE-2015-4106
CVE-2015-4163 CVE-2015-4164
Affected Products:
openSUSE 13.2

An update that solves 17 vulnerabilities and has 10 fixes
is now available.


Xen was updated to 4.4.2 to fix multiple vulnerabilities and non-security

The following vulnerabilities were fixed:

* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu (XSA-128) (boo#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests
(XSA-129) (boo#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages
(XSA-130) (boo#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (boo#932996)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to
host escape (XSA-135) (boo#932770)
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation,
which could be used to denial of service attacks or potential code
execution against the host. ()
* CVE-2015-3340: Xen did not initialize certain fields, which allowed
certain remote service domains to obtain sensitive information from
memory via a (1) XEN_DOMCTL_gettscinfo or (2)
XEN_SYSCTL_getdomaininfolist request. ()
* CVE-2015-2752: Long latency MMIO mapping operations are not preemptible
(XSA-125 boo#922705)
* CVE-2015-2756: Unmediated PCI command register access in qemu (XSA-126
* CVE-2015-2751: Certain domctl operations may be abused to lock up the
host (XSA-127 boo#922709)
* CVE-2015-2151: Hypervisor memory corruption due to x86 emulator flaw
(boo#919464 XSA-123)
* CVE-2015-2045: Information leak through version information hypercall
(boo#918998 XSA-122)
* CVE-2015-2044: Information leak via internal x86 system device emulation
(boo#918995 (XSA-121)
* CVE-2015-2152: HVM qemu unexpectedly enabling emulated VGA graphics
backends (boo#919663 XSA-119)
* CVE-2014-3615: information leakage when guest sets high resolution

The following non-security bugs were fixed:

* xentop: Fix memory leak on read failure
* boo#923758: xen dmesg contains bogus output in early boot
* boo#921842: Xentop doesn't display disk statistics for VMs using qdisks
* boo#919098: L3: XEN blktap device intermittently fails to connect
* boo#882089: Windows 2012 R2 fails to boot up with greater than 60 vcpus
* boo#903680: Problems with detecting free loop devices on Xen guest
* boo#861318: xentop reports "Found interface vif101.0 but domain 101 does
not exist."
* boo#901488: Intel ixgbe driver assigns rx/tx queues per core resulting
in irq problems on servers with a large amount of CPU cores
* boo#910254: SLES11 SP3 Xen VT-d igb NIC doesn't work
* boo#912011: high ping latency after upgrade to latest SLES11SP3 on xen
* boo#906689: let systemd schedule xencommons after
and so that xendomains has access to remote shares

The following functionality was enabled or enhanced:

* Enable spice support in qemu for x86_64
* Add Qxl vga support
* Enhancement to virsh/libvirtd "send-key" command (FATE#317240)
* Add domain_migrate_constraints_set API to Xend's http interface

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2015-434=1

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 13.2 (i586 x86_64):


- openSUSE 13.2 (x86_64):



To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages