openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:0123-1
Rating: important
References: #954018 #956408 #956409 #956411 #956592 #956832
#957988 #958007 #958009 #958493 #958523 #958918
#959006 #959387
Cross-References: CVE-2015-5307 CVE-2015-7504 CVE-2015-7549
CVE-2015-8339 CVE-2015-8340 CVE-2015-8341
CVE-2015-8345 CVE-2015-8504 CVE-2015-8550
CVE-2015-8554 CVE-2015-8555 CVE-2015-8558
CVE-2015-8567 CVE-2015-8568
Affected Products:
openSUSE 13.2
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for xen fixes the following security issues:
– CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory
leakage (boo#959387)
– CVE-2015-8550: xen: paravirtualized drivers incautious about shared
memory contents (XSA-155, boo#957988)
– CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state
results in DoS (boo#959006)
– CVE-2015-7549: xen: qemu pci: null pointer dereference issue (boo#958918)
– CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception
(boo#958493)
– CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164,
boo#958007)
– CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM
initialization (XSA-165, boo#958009)
– boo#958523: xen: ioreq handling possibly susceptible to multiple read
issue (XSA-166)
– CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156,
boo#954018)
– CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing
command block list (boo#956832)
– boo#956592: xen: virtual PMU is unsupported (XSA-163)
– CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues
(XSA-159, boo#956408)
– CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error
(XSA-160, boo#956409)
– CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator
(XSA-162, boo#956411)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE 13.2:
zypper in -t patch openSUSE-2016-35=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.2 (i586 x86_64):
xen-debugsource-4.4.3_08-36.1
xen-devel-4.4.3_08-36.1
xen-libs-4.4.3_08-36.1
xen-libs-debuginfo-4.4.3_08-36.1
xen-tools-domU-4.4.3_08-36.1
xen-tools-domU-debuginfo-4.4.3_08-36.1
– openSUSE 13.2 (x86_64):
xen-4.4.3_08-36.1
xen-doc-html-4.4.3_08-36.1
xen-kmp-default-4.4.3_08_k3.16.7_29-36.1
xen-kmp-default-debuginfo-4.4.3_08_k3.16.7_29-36.1
xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1
xen-kmp-desktop-debuginfo-4.4.3_08_k3.16.7_29-36.1
xen-libs-32bit-4.4.3_08-36.1
xen-libs-debuginfo-32bit-4.4.3_08-36.1
xen-tools-4.4.3_08-36.1
xen-tools-debuginfo-4.4.3_08-36.1
References:
https://www.suse.com/security/cve/CVE-2015-5307.html
https://www.suse.com/security/cve/CVE-2015-7504.html
https://www.suse.com/security/cve/CVE-2015-7549.html
https://www.suse.com/security/cve/CVE-2015-8339.html
https://www.suse.com/security/cve/CVE-2015-8340.html
https://www.suse.com/security/cve/CVE-2015-8341.html
https://www.suse.com/security/cve/CVE-2015-8345.html
https://www.suse.com/security/cve/CVE-2015-8504.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8554.html
https://www.suse.com/security/cve/CVE-2015-8555.html
https://www.suse.com/security/cve/CVE-2015-8558.html
https://www.suse.com/security/cve/CVE-2015-8567.html
https://www.suse.com/security/cve/CVE-2015-8568.html
https://bugzilla.suse.com/954018
https://bugzilla.suse.com/956408
https://bugzilla.suse.com/956409
https://bugzilla.suse.com/956411
https://bugzilla.suse.com/956592
https://bugzilla.suse.com/956832
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/958007
https://bugzilla.suse.com/958009
https://bugzilla.suse.com/958493
https://bugzilla.suse.com/958523
https://bugzilla.suse.com/958918
https://bugzilla.suse.com/959006
https://bugzilla.suse.com/959387
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:0124-1
Rating: important
References: #947165 #950704 #954018 #954405 #956408 #956409
#956411 #956592 #956832 #957988 #958007 #958009
#958493 #958523 #958918 #959006
Cross-References: CVE-2015-5307 CVE-2015-7311 CVE-2015-7504
CVE-2015-7549 CVE-2015-7970 CVE-2015-8104
CVE-2015-8339 CVE-2015-8340 CVE-2015-8341
CVE-2015-8345 CVE-2015-8504 CVE-2015-8550
CVE-2015-8554 CVE-2015-8555 CVE-2015-8558
Affected Products:
openSUSE 13.1
______________________________________________________________________________
An update that solves 15 vulnerabilities and has one errata
is now available.
Description:
This update for xen fixes the following security issues:
– CVE-2015-8550: paravirtualized drivers incautious about shared memory
contents (XSA-155, boo#957988)
– CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in
DoS (boo#959006)
– CVE-2015-7549: qemu pci: null pointer dereference issue (boo#958918)
– CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493)
– CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164,
boo#958007)
– CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization
(XSA-165, boo#958009)
– boo#958523 xen: ioreq handling possibly susceptible to multiple read
issue (XSA-166)
– CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing
command block list (boo#956832)
– boo#956592: xen: virtual PMU is unsupported (XSA-163)
– CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues
(XSA-159, boo#956408)
– CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error
(XSA-160, boo#956409)
– CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator
(XSA-162, boo#956411)
– CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with
qemu-xen (xsa-142, boo#947165)
– CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in
microcode via #DB exception (boo#954405)
– CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156,
boo#954018)
– CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is
not preemptible (XSA-150, boo#950704)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE 13.1:
zypper in -t patch openSUSE-2016-34=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE 13.1 (i586 x86_64):
xen-debugsource-4.3.4_10-53.1
xen-devel-4.3.4_10-53.1
xen-kmp-default-4.3.4_10_k3.11.10_29-53.1
xen-kmp-default-debuginfo-4.3.4_10_k3.11.10_29-53.1
xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1
xen-kmp-desktop-debuginfo-4.3.4_10_k3.11.10_29-53.1
xen-libs-4.3.4_10-53.1
xen-libs-debuginfo-4.3.4_10-53.1
xen-tools-domU-4.3.4_10-53.1
xen-tools-domU-debuginfo-4.3.4_10-53.1
– openSUSE 13.1 (x86_64):
xen-4.3.4_10-53.1
xen-doc-html-4.3.4_10-53.1
xen-libs-32bit-4.3.4_10-53.1
xen-libs-debuginfo-32bit-4.3.4_10-53.1
xen-tools-4.3.4_10-53.1
xen-tools-debuginfo-4.3.4_10-53.1
xen-xend-tools-4.3.4_10-53.1
xen-xend-tools-debuginfo-4.3.4_10-53.1
– openSUSE 13.1 (i586):
xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1
xen-kmp-pae-debuginfo-4.3.4_10_k3.11.10_29-53.1
References:
https://www.suse.com/security/cve/CVE-2015-5307.html
https://www.suse.com/security/cve/CVE-2015-7311.html
https://www.suse.com/security/cve/CVE-2015-7504.html
https://www.suse.com/security/cve/CVE-2015-7549.html
https://www.suse.com/security/cve/CVE-2015-7970.html
https://www.suse.com/security/cve/CVE-2015-8104.html
https://www.suse.com/security/cve/CVE-2015-8339.html
https://www.suse.com/security/cve/CVE-2015-8340.html
https://www.suse.com/security/cve/CVE-2015-8341.html
https://www.suse.com/security/cve/CVE-2015-8345.html
https://www.suse.com/security/cve/CVE-2015-8504.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8554.html
https://www.suse.com/security/cve/CVE-2015-8555.html
https://www.suse.com/security/cve/CVE-2015-8558.html
https://bugzilla.suse.com/947165
https://bugzilla.suse.com/950704
https://bugzilla.suse.com/954018
https://bugzilla.suse.com/954405
https://bugzilla.suse.com/956408
https://bugzilla.suse.com/956409
https://bugzilla.suse.com/956411
https://bugzilla.suse.com/956592
https://bugzilla.suse.com/956832
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/958007
https://bugzilla.suse.com/958009
https://bugzilla.suse.com/958493
https://bugzilla.suse.com/958523
https://bugzilla.suse.com/958918
https://bugzilla.suse.com/959006
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
openSUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:0126-1
Rating: important
References: #954018 #956408 #956409 #956411 #956592 #956832
#957988 #958007 #958009 #958493 #958523 #958918
#959006 #959387
Cross-References: CVE-2015-5307 CVE-2015-7504 CVE-2015-7549
CVE-2015-8339 CVE-2015-8340 CVE-2015-8341
CVE-2015-8345 CVE-2015-8504 CVE-2015-8550
CVE-2015-8554 CVE-2015-8555 CVE-2015-8558
CVE-2015-8567 CVE-2015-8568
Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for xen fixes the following issues:
– CVE-2015-8567,CVE-2015-8568: xen: qemu: net: vmxnet3: host memory
leakage (boo#959387)
– CVE-2015-8550: xen: paravirtualized drivers incautious about shared
memory contents (XSA-155, boo#957988)
– CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state
results in DoS (boo#959006)
– CVE-2015-7549: xen: qemu pci: null pointer dereference issue (boo#958918)
– CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception
(boo#958493)
– CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164,
boo#958007)
– CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM
initialization (XSA-165, boo#958009)
– boo#958523: xen: ioreq handling possibly susceptible to multiple read
issue (XSA-166)
– CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing
command block list (boo#956832)
– CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156,
boo#954018)
– boo#956592: xen: virtual PMU is unsupported (XSA-163)
– CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues
(XSA-159, boo#956408)
– CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error
(XSA-160, boo#956409)
– CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator
(XSA-162, boo#956411)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– openSUSE Leap 42.1:
zypper in -t patch openSUSE-2016-36=1
To bring your system up-to-date, use “zypper patch”.
Package List:
– openSUSE Leap 42.1 (i586 x86_64):
xen-debugsource-4.5.2_04-9.2
xen-devel-4.5.2_04-9.2
xen-libs-4.5.2_04-9.2
xen-libs-debuginfo-4.5.2_04-9.2
xen-tools-domU-4.5.2_04-9.2
xen-tools-domU-debuginfo-4.5.2_04-9.2
– openSUSE Leap 42.1 (x86_64):
xen-4.5.2_04-9.2
xen-doc-html-4.5.2_04-9.2
xen-kmp-default-4.5.2_04_k4.1.13_5-9.2
xen-kmp-default-debuginfo-4.5.2_04_k4.1.13_5-9.2
xen-libs-32bit-4.5.2_04-9.2
xen-libs-debuginfo-32bit-4.5.2_04-9.2
xen-tools-4.5.2_04-9.2
xen-tools-debuginfo-4.5.2_04-9.2
References:
https://www.suse.com/security/cve/CVE-2015-5307.html
https://www.suse.com/security/cve/CVE-2015-7504.html
https://www.suse.com/security/cve/CVE-2015-7549.html
https://www.suse.com/security/cve/CVE-2015-8339.html
https://www.suse.com/security/cve/CVE-2015-8340.html
https://www.suse.com/security/cve/CVE-2015-8341.html
https://www.suse.com/security/cve/CVE-2015-8345.html
https://www.suse.com/security/cve/CVE-2015-8504.html
https://www.suse.com/security/cve/CVE-2015-8550.html
https://www.suse.com/security/cve/CVE-2015-8554.html
https://www.suse.com/security/cve/CVE-2015-8555.html
https://www.suse.com/security/cve/CVE-2015-8558.html
https://www.suse.com/security/cve/CVE-2015-8567.html
https://www.suse.com/security/cve/CVE-2015-8568.html
https://bugzilla.suse.com/954018
https://bugzilla.suse.com/956408
https://bugzilla.suse.com/956409
https://bugzilla.suse.com/956411
https://bugzilla.suse.com/956592
https://bugzilla.suse.com/956832
https://bugzilla.suse.com/957988
https://bugzilla.suse.com/958007
https://bugzilla.suse.com/958009
https://bugzilla.suse.com/958493
https://bugzilla.suse.com/958523
https://bugzilla.suse.com/958918
https://bugzilla.suse.com/959006
https://bugzilla.suse.com/959387
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
7e