Jump to content


Photo

[security-announce] SUSE-SU-2013:1075-1: important: Security update for Xen


  • Please log in to reply
No replies to this topic

#1 News

News

    stranger

  • Members
  • 66363 posts

Posted 25 June 2013 - 07:07 PM

SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:1075-1
Rating: important
References: #801663 #809662 #813673 #813675 #813677 #814709
#816156 #816159 #816163 #819416 #820917 #820919
#820920
Cross-References: CVE-2013-1917 CVE-2013-1918 CVE-2013-1919
CVE-2013-1920 CVE-2013-1952 CVE-2013-1964
CVE-2013-2072 CVE-2013-2076 CVE-2013-2077
CVE-2013-2078
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________

An update that solves 10 vulnerabilities and has three
fixes is now available.

Description:


XEN has been updated to 4.1.5 c/s 23509 to fix various bugs
and security issues.

The following security issues have been fixed:

*

CVE-2013-1918: Certain page table manipulation
operations in Xen 4.1.x, 4.2.x, and earlier were not
preemptible, which allowed local PV kernels to cause a
denial of service via vectors related to deep page table
traversal.

*

CVE-2013-1952: Xen 4.x, when using Intel VT-d for a
bus mastering capable PCI device, did not properly check
the source when accessing a bridge devices interrupt
remapping table entries for MSI interrupts, which allowed
local guest domains to cause a denial of service (interrupt
injection) via unspecified vectors.

*

CVE-2013-2076: A information leak in the XSAVE/XRSTOR
instructions could be used to determine state of floating
point operations in other domains.

*

CVE-2013-2077: A denial of service (hypervisor crash)
was possible due to missing exception recovery on XRSTOR,
that could be used to crash the machine by PV guest users.

*

CVE-2013-2078: A denial of service (hypervisor crash)
was possible due to missing exception recovery on XSETBV,
that could be used to crash the machine by PV guest users.

*

CVE-2013-2072: Systems which allow untrusted
administrators to configure guest vcpu affinity may be
exploited to trigger a buffer overrun and corrupt memory.

*

CVE-2013-1917: Xen 3.1 through 4.x, when running
64-bit hosts on Intel CPUs, did not clear the NT flag when
using an IRET after a SYSENTER instruction, which allowed
PV guest users to cause a denial of service (hypervisor
crash) by triggering a #GP fault, which is not properly
handled by another IRET instruction.

*

CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly
restrict access to IRQs, which allowed local stub domain
clients to gain access to IRQs and cause a denial of
service via vectors related to "passed-through IRQs or PCI
devices."

*

CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when
the hypervisor is running "under memory pressure" and the
Xen Security Module (XSM) is enabled, used the wrong
ordering of operations when extending the per-domain event
channel tracking table, which caused a use-after-free and
allowed local guest kernels to inject arbitrary events and
gain privileges via unspecified vectors.

*

CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly
released a grant reference when releasing a non-v1,
non-transitive grant, which allowed local guest
administrators to cause a denial of service (host crash),
obtain sensitive information, or possible have other
impacts via unspecified vectors.

Bugfixes:

*

Upstream patches from Jan
26956-x86-mm-preemptible-cleanup.patch
27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.pat
ch 27079-fix-XSA-46-regression-with-xend-xm.patch
27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointe
rs.patch

*

Update to Xen 4.1.5 c/s 23509 There were many
xen.spec file patches dropped as now being included in the
4.1.5 tarball.

*

bnc#809662 - can't use pv-grub to start domU (pygrub
does work) xen.spec

*

Upstream patches from Jan
26702-powernow-add-fixups-for-AMD-P-state-figures.patch
26704-x86-MCA-suppress-bank-clearing-for-certain-injected-ev
ents.patch
26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-m
appings.patch
26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-message
s.patch
26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
26737-ACPI-APEI-Add-apei_exec_run_optional.patch
26742-IOMMU-properly-check-whether-interrupt-remapping-is-en
abled.patch 26743-VT-d-deal-with-5500-5520-X58-errata.patch
26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.pat
ch
26749-x86-reserve-pages-when-SandyBridge-integrated-graphics
.patch
26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vect
ors.patch
26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mo
de.patch
26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-
pages.patch
26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-cr
ash.patch

*

bnc#814709 - Unable to create XEN virtual machines in
SLED 11 SP2 on Kyoto xend-cpuinfo-model-name.patch

*

Upstream patches from Jan
26536-xenoprof-div-by-0.patch
26578-AMD-IOMMU-replace-BUG_ON.patch
26656-x86-fix-null-pointer-dereference-in-intel_get_extended
_msrs.patch 26659-AMD-IOMMU-erratum-746-workaround.patch
26660-x86-fix-CMCI-injection.patch
26672-vmx-fix-handling-of-NMI-VMEXIT.patch
26673-Avoid-stale-pointer-when-moving-domain-to-another-cpup
ool.patch
26676-fix-compat-memory-exchange-op-splitting.patch
26677-x86-make-certain-memory-sub-ops-return-valid-values.pa
tch 26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
26683-credit1-Use-atomic-bit-operations-for-the-flags-struct
ure.patch 26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

* CVE-2013-1917

* CVE-2013-1918

* CVE-2013-1919

* CVE-2013-1920

* CVE-2013-1952

* CVE-2013-1964

* CVE-2013-2072

* CVE-2013-2076

* CVE-2013-2077

* CVE-2013-2078



Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP2:

zypper in -t patch sdksp2-xen-201305-7798

- SUSE Linux Enterprise Server 11 SP2 for VMware:

zypper in -t patch slessp2-xen-201305-7798

- SUSE Linux Enterprise Server 11 SP2:

zypper in -t patch slessp2-xen-201305-7798

- SUSE Linux Enterprise Desktop 11 SP2:

zypper in -t patch sledsp2-xen-201305-7798

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):

xen-devel-4.1.5_02-0.5.1

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):

xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1

- SUSE Linux Enterprise Server 11 SP2 (i586 x86_64):

xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1
xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1
xen-libs-4.1.5_02-0.5.1
xen-tools-domU-4.1.5_02-0.5.1

- SUSE Linux Enterprise Server 11 SP2 (x86_64):

xen-4.1.5_02-0.5.1
xen-doc-html-4.1.5_02-0.5.1
xen-doc-pdf-4.1.5_02-0.5.1
xen-libs-32bit-4.1.5_02-0.5.1
xen-tools-4.1.5_02-0.5.1

- SUSE Linux Enterprise Server 11 SP2 (i586):

xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1

- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):

xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1
xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1
xen-libs-4.1.5_02-0.5.1
xen-tools-domU-4.1.5_02-0.5.1

- SUSE Linux Enterprise Desktop 11 SP2 (x86_64):

xen-4.1.5_02-0.5.1
xen-doc-html-4.1.5_02-0.5.1
xen-doc-pdf-4.1.5_02-0.5.1
xen-libs-32bit-4.1.5_02-0.5.1
xen-tools-4.1.5_02-0.5.1

- SUSE Linux Enterprise Desktop 11 SP2 (i586):

xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1


References:

http://support.novel...-2013-1917.html
http://support.novel...-2013-1918.html
http://support.novel...-2013-1919.html
http://support.novel...-2013-1920.html
http://support.novel...-2013-1952.html
http://support.novel...-2013-1964.html
http://support.novel...-2013-2072.html
http://support.novel...-2013-2076.html
http://support.novel...-2013-2077.html
http://support.novel...-2013-2078.html
https://bugzilla.novell.com/801663
https://bugzilla.novell.com/809662
https://bugzilla.novell.com/813673
https://bugzilla.novell.com/813675
https://bugzilla.novell.com/813677
https://bugzilla.novell.com/814709
https://bugzilla.novell.com/816156
https://bugzilla.novell.com/816159
https://bugzilla.novell.com/816163
https://bugzilla.novell.com/819416
https://bugzilla.novell.com/820917
https://bugzilla.novell.com/820919
https://bugzilla.novell.com/820920
http://download.nove...4ed2eba64f84f0d

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org
For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org







0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

IPB Skin By Virteq