[SUSE-SU-2015:2338-1] Security update for xen

Severity Moderate
Affected Packages 22
CVEs 13

Security update for xen

  This update fixes the following security issues:
  • bsc#955399 - Fix xm migrate --log_progress.
    Due to logic error progress was not logged when requested.

  • bsc#956832 - CVE-2015-8345: xen: qemu: net: eepro100:
    infinite loop in processing command block list

  • bsc#956592 - xen: virtual PMU is unsupported (XSA-163)

  • bsc#956408 - CVE-2015-8339, CVE-2015-8340: xen:
    XENMEM_exchange error handling issues (XSA-159)

  • bsc#956409 - CVE-2015-8341: xen: libxl leak of pv kernel
    and initrd on error (XSA-160)

  • bsc#956411 - CVE-2015-7504: xen: heap buffer overflow
    vulnerability in pcnet emulator (XSA-162)

  • bsc#947165 - CVE-2015-7311: xen: libxl fails to honour
    readonly flag on disks with qemu-xen (xsa-142)

  • bsc#955399 - Fix xm migrate --live. The options were not passed
    due to a merge error. As a result the migration was not live,
    instead the suspended guest was migrated.

  • bsc#954405 - CVE-2015-8104: Xen: guest to host DoS by
    triggering an infinite loop in microcode via #DB exception

  • bsc#954018 - CVE-2015-5307: xen: x86: CPU lockup during
    fault delivery (XSA-156)

  • bsc#950704 - CVE-2015-7970: xen: x86: Long latency
    populate-on-demand operation is not preemptible (XSA-150)

  • bsc#951845 - CVE-2015-7972: xen: x86: populate-on-demand
    balloon size inaccuracy can crash guests (XSA-153)

  • Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

  • bsc#950703 - CVE-2015-7969: xen: leak of main per-domain
    vcpu pointer array (DoS) (XSA-149)

  • bsc#950705 - CVE-2015-7969: xen: x86: leak of per-domain
    profiling-related vcpu pointer array (DoS) (XSA-151)

  • bsc#950706 - CVE-2015-7971: xen: x86: some pmu and
    profiling hypercalls log without rate limiting (XSA-152)

Package Affected Version
pkg:rpm/suse/xen?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools-domU?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools-domU?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools-domU?arch=i586&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-tools-domU?arch=i586&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs?arch=i586&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs?arch=i586&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs-32bit?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-libs-32bit?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sles-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sled-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sles-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sled-11&sp=4 < 4.4.3_06_3.0.101_65-29.1
pkg:rpm/suse/xen-doc-html?arch=x86_64&distro=sles-11&sp=4 < 4.4.3_06-29.1
pkg:rpm/suse/xen-doc-html?arch=x86_64&distro=sled-11&sp=4 < 4.4.3_06-29.1
ID
SUSE-SU-2015:2338-1
Severity
moderate
URL
https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/
Published
2015-12-22T08:41:00
(8 years ago)
Modified
2015-12-22T08:41:00
(8 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_2338-1.json
Suse URL for SUSE-SU-2015:2338-1 https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/
Suse E-Mail link for SUSE-SU-2015:2338-1 https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html
Bugzilla SUSE Bug 947165 https://bugzilla.suse.com/947165
Bugzilla SUSE Bug 950703 https://bugzilla.suse.com/950703
Bugzilla SUSE Bug 950704 https://bugzilla.suse.com/950704
Bugzilla SUSE Bug 950705 https://bugzilla.suse.com/950705
Bugzilla SUSE Bug 950706 https://bugzilla.suse.com/950706
Bugzilla SUSE Bug 951845 https://bugzilla.suse.com/951845
Bugzilla SUSE Bug 954018 https://bugzilla.suse.com/954018
Bugzilla SUSE Bug 954405 https://bugzilla.suse.com/954405
Bugzilla SUSE Bug 955399 https://bugzilla.suse.com/955399
Bugzilla SUSE Bug 956408 https://bugzilla.suse.com/956408
Bugzilla SUSE Bug 956409 https://bugzilla.suse.com/956409
Bugzilla SUSE Bug 956411 https://bugzilla.suse.com/956411
Bugzilla SUSE Bug 956592 https://bugzilla.suse.com/956592
Bugzilla SUSE Bug 956832 https://bugzilla.suse.com/956832
CVE SUSE CVE CVE-2015-5307 page https://www.suse.com/security/cve/CVE-2015-5307/
CVE SUSE CVE CVE-2015-7311 page https://www.suse.com/security/cve/CVE-2015-7311/
CVE SUSE CVE CVE-2015-7504 page https://www.suse.com/security/cve/CVE-2015-7504/
CVE SUSE CVE CVE-2015-7835 page https://www.suse.com/security/cve/CVE-2015-7835/
CVE SUSE CVE CVE-2015-7969 page https://www.suse.com/security/cve/CVE-2015-7969/
CVE SUSE CVE CVE-2015-7970 page https://www.suse.com/security/cve/CVE-2015-7970/
CVE SUSE CVE CVE-2015-7971 page https://www.suse.com/security/cve/CVE-2015-7971/
CVE SUSE CVE CVE-2015-7972 page https://www.suse.com/security/cve/CVE-2015-7972/
CVE SUSE CVE CVE-2015-8104 page https://www.suse.com/security/cve/CVE-2015-8104/
CVE SUSE CVE CVE-2015-8339 page https://www.suse.com/security/cve/CVE-2015-8339/
CVE SUSE CVE CVE-2015-8340 page https://www.suse.com/security/cve/CVE-2015-8340/
CVE SUSE CVE CVE-2015-8341 page https://www.suse.com/security/cve/CVE-2015-8341/
CVE SUSE CVE CVE-2015-8345 page https://www.suse.com/security/cve/CVE-2015-8345/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/xen?arch=x86_64&distro=sles-11&sp=4 suse xen < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen?arch=x86_64&distro=sled-11&sp=4 suse xen < 4.4.3_06-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-tools?arch=x86_64&distro=sles-11&sp=4 suse xen-tools < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-tools?arch=x86_64&distro=sled-11&sp=4 suse xen-tools < 4.4.3_06-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-tools-domU?arch=x86_64&distro=sles-11&sp=4 suse xen-tools-domU < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-tools-domU?arch=x86_64&distro=sled-11&sp=4 suse xen-tools-domU < 4.4.3_06-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-tools-domU?arch=i586&distro=sles-11&sp=4 suse xen-tools-domU < 4.4.3_06-29.1 sles-11 i586
Affected pkg:rpm/suse/xen-tools-domU?arch=i586&distro=sled-11&sp=4 suse xen-tools-domU < 4.4.3_06-29.1 sled-11 i586
Affected pkg:rpm/suse/xen-libs?arch=x86_64&distro=sles-11&sp=4 suse xen-libs < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-libs?arch=x86_64&distro=sled-11&sp=4 suse xen-libs < 4.4.3_06-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-libs?arch=i586&distro=sles-11&sp=4 suse xen-libs < 4.4.3_06-29.1 sles-11 i586
Affected pkg:rpm/suse/xen-libs?arch=i586&distro=sled-11&sp=4 suse xen-libs < 4.4.3_06-29.1 sled-11 i586
Affected pkg:rpm/suse/xen-libs-32bit?arch=x86_64&distro=sles-11&sp=4 suse xen-libs-32bit < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-libs-32bit?arch=x86_64&distro=sled-11&sp=4 suse xen-libs-32bit < 4.4.3_06-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sles-11&sp=4 suse xen-kmp-pae < 4.4.3_06_3.0.101_65-29.1 sles-11 i586
Affected pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sled-11&sp=4 suse xen-kmp-pae < 4.4.3_06_3.0.101_65-29.1 sled-11 i586
Affected pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sles-11&sp=4 suse xen-kmp-default < 4.4.3_06_3.0.101_65-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sled-11&sp=4 suse xen-kmp-default < 4.4.3_06_3.0.101_65-29.1 sled-11 x86_64
Affected pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sles-11&sp=4 suse xen-kmp-default < 4.4.3_06_3.0.101_65-29.1 sles-11 i586
Affected pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sled-11&sp=4 suse xen-kmp-default < 4.4.3_06_3.0.101_65-29.1 sled-11 i586
Affected pkg:rpm/suse/xen-doc-html?arch=x86_64&distro=sles-11&sp=4 suse xen-doc-html < 4.4.3_06-29.1 sles-11 x86_64
Affected pkg:rpm/suse/xen-doc-html?arch=x86_64&distro=sled-11&sp=4 suse xen-doc-html < 4.4.3_06-29.1 sled-11 x86_64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...