openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2017:3194-1
Rating:             important
References:         #1027519 #1055047 #1061075 #1063123 #1068187 
                    #1068191 
Cross-References:   CVE-2017-15289 CVE-2017-15597
Affected Products:
                    openSUSE Leap 42.2
______________________________________________________________________________

   An update that solves two vulnerabilities and has four
   fixes is now available.

Description:

   This update for xen to version 4.7.4 (bsc#1027519) fixes several issues.

   This new feature was added:

   - Support migration of HVM domains larger than 1 TB

   These security issues were fixed:

   - bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD)
     code allowed for DoS (XSA-246)
   - bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged
     guests to retain a writable mapping of freed memory leading to
     information leaks, privilege escalation or DoS (XSA-247).
   - CVE-2017-15289: The mode4and5 write functions allowed local OS guest
     privileged users to cause a denial of service (out-of-bounds write
     access and Qemu process crash) via vectors related to dst calculation
     (bsc#1063123)
   - CVE-2017-15597: A grant copy operation being done on a grant of a dying
     domain allowed a malicious guest administrator to corrupt hypervisor
     memory, allowing for DoS or potentially privilege escalation and
     information leaks (bsc#1061075).

   This non-security issue was fixed:

   - bsc#1055047: Fixed --initrd-inject option in virt-install

   This update was imported from the SUSE:SLE-12-SP2:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.2:

      zypper in -t patch openSUSE-2017-1322=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE Leap 42.2 (i586 x86_64):

      xen-debugsource-4.7.4_02-11.21.1
      xen-devel-4.7.4_02-11.21.1
      xen-libs-4.7.4_02-11.21.1
      xen-libs-debuginfo-4.7.4_02-11.21.1
      xen-tools-domU-4.7.4_02-11.21.1
      xen-tools-domU-debuginfo-4.7.4_02-11.21.1

   - openSUSE Leap 42.2 (x86_64):

      xen-4.7.4_02-11.21.1
      xen-doc-html-4.7.4_02-11.21.1
      xen-libs-32bit-4.7.4_02-11.21.1
      xen-libs-debuginfo-32bit-4.7.4_02-11.21.1
      xen-tools-4.7.4_02-11.21.1
      xen-tools-debuginfo-4.7.4_02-11.21.1


References:

   https://www.suse.com/security/cve/CVE-2017-15289.html
   https://www.suse.com/security/cve/CVE-2017-15597.html
   https://bugzilla.suse.com/1027519
   https://bugzilla.suse.com/1055047
   https://bugzilla.suse.com/1061075
   https://bugzilla.suse.com/1063123
   https://bugzilla.suse.com/1068187
   https://bugzilla.suse.com/1068191

openSUSE: 2017:3194-1: important: xen

December 2, 2017
An update that solves two vulnerabilities and has four An update that solves two vulnerabilities and has four An update that solves two vulnerabilities and has four fixes is now av...

Description

This update for xen to version 4.7.4 (bsc#1027519) fixes several issues. This new feature was added: - Support migration of HVM domains larger than 1 TB These security issues were fixed: - bsc#1068187: Failure to recognize errors in the Populate on Demand (PoD) code allowed for DoS (XSA-246) - bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests to retain a writable mapping of freed memory leading to information leaks, privilege escalation or DoS (XSA-247). - CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation (bsc#1063123) - CVE-2017-15597: A grant copy operation being done on a grant of a dying domain allowed a malicious guest administrator to corrupt hypervisor memory, allowing for DoS or potentially privilege escalation and information leaks (bsc#1061075). This non-security issue was fixed: - bsc#1055047: Fixed --initrd-inject option in virt-install This update was imported from the SUSE:SLE-12-SP2:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-1322=1 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE Leap 42.2 (i586 x86_64): xen-debugsource-4.7.4_02-11.21.1 xen-devel-4.7.4_02-11.21.1 xen-libs-4.7.4_02-11.21.1 xen-libs-debuginfo-4.7.4_02-11.21.1 xen-tools-domU-4.7.4_02-11.21.1 xen-tools-domU-debuginfo-4.7.4_02-11.21.1 - openSUSE Leap 42.2 (x86_64): xen-4.7.4_02-11.21.1 xen-doc-html-4.7.4_02-11.21.1 xen-libs-32bit-4.7.4_02-11.21.1 xen-libs-debuginfo-32bit-4.7.4_02-11.21.1 xen-tools-4.7.4_02-11.21.1 xen-tools-debuginfo-4.7.4_02-11.21.1


References

https://www.suse.com/security/cve/CVE-2017-15289.html https://www.suse.com/security/cve/CVE-2017-15597.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1055047 https://bugzilla.suse.com/1061075 https://bugzilla.suse.com/1063123 https://bugzilla.suse.com/1068187 https://bugzilla.suse.com/1068191


Severity
Announcement ID: openSUSE-SU-2017:3194-1
Rating: important
Affected Products: openSUSE Leap 42.2

Related News