Security update for xen

SUSE Security Update: Security update for xen
Announcement ID: SUSE-SU-2014:1710-1
Rating: moderate
References: #826717 #867910 #875668 #880751 #895798 #895799 #895802 #897657 #901317 #903850 #903967 #903970 #905465 #905467 #906439
Affected Products:
  • SUSE Linux Enterprise Server 11 SP2 LTSS

  • An update that solves 13 vulnerabilities and has two fixes is now available.

    Description:


    xen was updated to fix 14 security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
    (CVE-2014-9030).
    * Insufficient bounding of "REP MOVS" to MMIO emulated inside the
    hypervisor (CVE-2014-8867).
    * Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW
    emulation (CVE-2014-7155).
    * Hypervisor heap contents leaked to guests (CVE-2014-4021).
    * Missing privilege level checks in x86 emulation of far branches
    (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
    (CVE-2014-8594).
    * Intel VT-d Interrupt Remapping engines can be evaded by native NMI
    interrupts (CVE-2013-3495).
    * Missing privilege level checks in x86 emulation of software
    interrupts (CVE-2014-7156).
    * Race condition in HVMOP_track_dirty_vram (CVE-2014-7154).
    * Improper MSR range used for x2APIC emulation (CVE-2014-7188).
    * HVMOP_set_mem_type allows invalid P2M entries to be created
    (CVE-2014-3124).
    * HVMOP_set_mem_access is not preemptible (CVE-2014-2599).
    * Excessive checking in compatibility mode hypercall argument
    translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
    (bnc#903850).

    This non-security bug was fixed:

    * Increase limit domUloader to 32MB (bnc#901317).

    Security Issues:

    * CVE-2014-9030

    * CVE-2014-8867

    * CVE-2014-7155

    * CVE-2014-4021

    * CVE-2014-8595

    * CVE-2014-8594

    * CVE-2013-3495

    * CVE-2014-7156

    * CVE-2014-7154

    * CVE-2014-7188

    * CVE-2014-3124

    * CVE-2014-2599

    * CVE-2014-8866

    Special Instructions and Notes:

    Please reboot the system after installing this update.

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP2 LTSS:
      zypper in -t patch slessp2-xen-11sp2-20141204-10081

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP2 LTSS (i586 x86_64):
      • xen-devel-4.1.6_08-0.5.1
      • xen-kmp-default-4.1.6_08_3.0.101_0.7.23-0.5.1
      • xen-kmp-trace-4.1.6_08_3.0.101_0.7.23-0.5.1
      • xen-libs-4.1.6_08-0.5.1
      • xen-tools-domU-4.1.6_08-0.5.1
    • SUSE Linux Enterprise Server 11 SP2 LTSS (x86_64):
      • xen-4.1.6_08-0.5.1
      • xen-doc-html-4.1.6_08-0.5.1
      • xen-doc-pdf-4.1.6_08-0.5.1
      • xen-libs-32bit-4.1.6_08-0.5.1
      • xen-tools-4.1.6_08-0.5.1
    • SUSE Linux Enterprise Server 11 SP2 LTSS (i586):
      • xen-kmp-pae-4.1.6_08_3.0.101_0.7.23-0.5.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-3495.html
    • http://support.novell.com/security/cve/CVE-2014-2599.html
    • http://support.novell.com/security/cve/CVE-2014-3124.html
    • http://support.novell.com/security/cve/CVE-2014-4021.html
    • http://support.novell.com/security/cve/CVE-2014-7154.html
    • http://support.novell.com/security/cve/CVE-2014-7155.html
    • http://support.novell.com/security/cve/CVE-2014-7156.html
    • http://support.novell.com/security/cve/CVE-2014-7188.html
    • http://support.novell.com/security/cve/CVE-2014-8594.html
    • http://support.novell.com/security/cve/CVE-2014-8595.html
    • http://support.novell.com/security/cve/CVE-2014-8866.html
    • http://support.novell.com/security/cve/CVE-2014-8867.html
    • http://support.novell.com/security/cve/CVE-2014-9030.html
    • https://bugzilla.suse.com/show_bug.cgi?id=826717
    • https://bugzilla.suse.com/show_bug.cgi?id=867910
    • https://bugzilla.suse.com/show_bug.cgi?id=875668
    • https://bugzilla.suse.com/show_bug.cgi?id=880751
    • https://bugzilla.suse.com/show_bug.cgi?id=895798
    • https://bugzilla.suse.com/show_bug.cgi?id=895799
    • https://bugzilla.suse.com/show_bug.cgi?id=895802
    • https://bugzilla.suse.com/show_bug.cgi?id=897657
    • https://bugzilla.suse.com/show_bug.cgi?id=901317
    • https://bugzilla.suse.com/show_bug.cgi?id=903850
    • https://bugzilla.suse.com/show_bug.cgi?id=903967
    • https://bugzilla.suse.com/show_bug.cgi?id=903970
    • https://bugzilla.suse.com/show_bug.cgi?id=905465
    • https://bugzilla.suse.com/show_bug.cgi?id=905467
    • https://bugzilla.suse.com/show_bug.cgi?id=906439
    • http://download.suse.com/patch/finder/?keywords=c3ad0fd02909cf041596ac8a665c5844