Security update for xen
SUSE Patch
security@suse.de
SUSE Security Team
openSUSE-SU-2015:1965-1
Final
1
1
2015-10-31T10:53:53Z
current
2015-10-31T10:53:53Z
2015-10-31T10:53:53Z
cve-database/bin/generate-cvrf.pl
2017-02-24T01:00:00Z
Security update for xen
Xen was updated to fix 6 security issues.
These security issues were fixed:
- CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642).
- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705 bsc#950703).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845).
The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
E-Mail link for openSUSE-SU-2015:1965-1
https://www.suse.com/support/security/rating/
SUSE Security Ratings
openSUSE Leap 42.1
xen-4.5.1_12-3.1
xen-devel-4.5.1_12-3.1
xen-doc-html-4.5.1_12-3.1
xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
xen-libs-4.5.1_12-3.1
xen-libs-32bit-4.5.1_12-3.1
xen-tools-4.5.1_12-3.1
xen-tools-domU-4.5.1_12-3.1
xen-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-devel-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-doc-html-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-kmp-default-4.5.1_12_k4.1.12_1-3.1 as a component of openSUSE Leap 42.1
xen-libs-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-libs-32bit-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-tools-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
xen-tools-domU-4.5.1_12-3.1 as a component of openSUSE Leap 42.1
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
CVE-2014-0222
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
moderate
5.5
AV:A/AC:L/Au:S/C:N/I:N/A:C
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2014-0222.html
CVE-2014-0222
https://bugzilla.suse.com/877642
SUSE Bug 877642
https://bugzilla.suse.com/950367
SUSE Bug 950367
https://bugzilla.suse.com/964925
SUSE Bug 964925
The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
CVE-2015-4037
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2015-4037.html
CVE-2015-4037
https://bugzilla.suse.com/932267
SUSE Bug 932267
https://bugzilla.suse.com/950367
SUSE Bug 950367
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
CVE-2015-7835
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
important
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2015-7835.html
CVE-2015-7835
https://bugzilla.suse.com/940929
SUSE Bug 940929
https://bugzilla.suse.com/947159
SUSE Bug 947159
https://bugzilla.suse.com/950367
SUSE Bug 950367
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
CVE-2015-7969
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2015-7969.html
CVE-2015-7969
https://bugzilla.suse.com/950703
SUSE Bug 950703
https://bugzilla.suse.com/950705
SUSE Bug 950705
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
CVE-2015-7971
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2015-7971.html
CVE-2015-7971
https://bugzilla.suse.com/950706
SUSE Bug 950706
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
CVE-2015-7972
openSUSE Leap 42.1:xen-4.5.1_12-3.1
openSUSE Leap 42.1:xen-devel-4.5.1_12-3.1
openSUSE Leap 42.1:xen-doc-html-4.5.1_12-3.1
openSUSE Leap 42.1:xen-kmp-default-4.5.1_12_k4.1.12_1-3.1
openSUSE Leap 42.1:xen-libs-32bit-4.5.1_12-3.1
openSUSE Leap 42.1:xen-libs-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-4.5.1_12-3.1
openSUSE Leap 42.1:xen-tools-domU-4.5.1_12-3.1
moderate
Please Install the update.
https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
https://www.suse.com/security/cve/CVE-2015-7972.html
CVE-2015-7972
https://bugzilla.suse.com/950704
SUSE Bug 950704
https://bugzilla.suse.com/951845
SUSE Bug 951845