Nacionalni CERT

Sigurnosni nedostaci programskog paketa xen

<p>SUSE Security Update: Security update for xen<br />______________________________________________________________________________<br /><br />Announcement ID: SUSE-SU-2018:0438-1<br />Rating: important<br />References: #1027519 #1035442 #1051729 #1061081 #1067317 <br /> #1068032 #1070158 #1070159 #1070160 #1070163 <br /> #1074562 #1076116 #1076180 <br />Cross-References: CVE-2017-15595 CVE-2017-17563 CVE-2017-17564<br /> CVE-2017-17565 CVE-2017-17566 CVE-2017-18030<br /> CVE-2017-5715 CVE-2017-5753 CVE-2017-5754<br /> CVE-2018-5683<br />Affected Products:<br /> SUSE Linux Enterprise Software Development Kit 12-SP3<br /> SUSE Linux Enterprise Server 12-SP3<br /> SUSE Linux Enterprise Desktop 12-SP3<br /> SUSE CaaS Platform ALL<br />______________________________________________________________________________<br /><br /> An update that solves 10 vulnerabilities and has three<br /> fixes is now available.<br /><br />Description:<br /><br /> This update for xen fixes several issues.<br /><br /> These security issues were fixed:<br /><br /> - CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks<br /> via side effects of speculative execution, aka "Spectre" and "Meltdown"<br /> attacks (bsc#1074562, bsc#1068032)<br /> - CVE-2017-15595: x86 PV guest OS users were able to cause a DoS<br /> (unbounded recursion, stack consumption, and hypervisor crash) or<br /> possibly gain privileges via crafted page-table stacking (bsc#1061081)<br /> - CVE-2017-17566: Prevent PV guest OS users to cause a denial of service<br /> (host OS crash) or gain host OS privileges in shadow mode by mapping a<br /> certain auxiliary page (bsc#1070158).<br /> - CVE-2017-17563: Prevent guest OS users to cause a denial of service<br /> (host OS crash) or gain host OS privileges by leveraging an incorrect<br /> mask for reference-count overflow checking in shadow mode (bsc#1070159).<br /> - CVE-2017-17564: Prevent guest OS users to cause a denial of service<br /> (host OS crash) or gain host OS privileges by leveraging incorrect error<br /> handling for reference counting in shadow mode (bsc#1070160).<br /> - CVE-2017-17565: Prevent PV guest OS users to cause a denial of service<br /> (host OS crash) if shadow mode and log-dirty mode are in place, because<br /> of an incorrect assertion related to M2P (bsc#1070163).<br /> - CVE-2018-5683: The vga_draw_text function allowed local OS guest<br /> privileged users to cause a denial of service (out-of-bounds read and<br /> QEMU process crash) by leveraging improper memory address validation<br /> (bsc#1076116).<br /> - CVE-2017-18030: The cirrus_invalidate_region function allowed local OS<br /> guest privileged users to cause a denial of service (out-of-bounds array<br /> access and QEMU process crash) via vectors related to negative pitch<br /> (bsc#1076180).<br /><br /> These non-security issues were fixed:<br /><br /> - bsc#1067317: pass cache=writeback|unsafe|directsync to qemu depending on<br /> the libxl disk settings<br /> - bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2<br /> - bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100<br /> seconds. If many domUs shutdown in parallel the backends couldn't keep up<br /> - bsc#1027519: Added several upstream patches<br /><br /><br />Patch Instructions:<br /><br /> To install this SUSE Security Update use YaST online_update.<br /> Alternatively you can run the command listed for your product:<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP3:<br /><br /> zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-302=1<br /><br /> - SUSE Linux Enterprise Server 12-SP3:<br /><br /> zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-302=1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP3:<br /><br /> zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-302=1<br /><br /> - SUSE CaaS Platform ALL:<br /><br /> zypper in -t patch SUSE-CAASP-ALL-2018-302=1<br /><br /> To bring your system up-to-date, use "zypper patch".<br /><br /><br />Package List:<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):<br /><br /> xen-debugsource-4.9.1_08-3.26.1<br /> xen-devel-4.9.1_08-3.26.1<br /><br /> - SUSE Linux Enterprise Server 12-SP3 (x86_64):<br /><br /> xen-4.9.1_08-3.26.1<br /> xen-debugsource-4.9.1_08-3.26.1<br /> xen-doc-html-4.9.1_08-3.26.1<br /> xen-libs-32bit-4.9.1_08-3.26.1<br /> xen-libs-4.9.1_08-3.26.1<br /> xen-libs-debuginfo-32bit-4.9.1_08-3.26.1<br /> xen-libs-debuginfo-4.9.1_08-3.26.1<br /> xen-tools-4.9.1_08-3.26.1<br /> xen-tools-debuginfo-4.9.1_08-3.26.1<br /> xen-tools-domU-4.9.1_08-3.26.1<br /> xen-tools-domU-debuginfo-4.9.1_08-3.26.1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):<br /><br /> xen-4.9.1_08-3.26.1<br /> xen-debugsource-4.9.1_08-3.26.1<br /> xen-libs-32bit-4.9.1_08-3.26.1<br /> xen-libs-4.9.1_08-3.26.1<br /> xen-libs-debuginfo-32bit-4.9.1_08-3.26.1<br /> xen-libs-debuginfo-4.9.1_08-3.26.1<br /><br /> - SUSE CaaS Platform ALL (x86_64):<br /><br /> xen-debugsource-4.9.1_08-3.26.1<br /> xen-libs-4.9.1_08-3.26.1<br /> xen-libs-debuginfo-4.9.1_08-3.26.1<br /> xen-tools-domU-4.9.1_08-3.26.1<br /> xen-tools-domU-debuginfo-4.9.1_08-3.26.1<br /><br /><br />References:<br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />-- <br />To unsubscribe, e-mail:<br />For additional commands, e-mail:</p>
Otkriveni su sigurnosni nedostaci u programskom paketu xen za operacijski sustav SUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju otkrivanje osjetljivih informacija, izazivanje DoS stanja ili stjecanje viših ovlasti. Savjetuje se ažuriranje izdanim zakrpama.