You are here
Home > Preporuke > Ranjivosti programskog paketa qemu

Ranjivosti programskog paketa qemu

  • Detalji os-a: LSU
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for Xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2015:0927-1
Rating: important
References: #910441 #927967 #929339
Cross-References: CVE-2015-3456
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Desktop 11 SP3
______________________________________________________________________________

An update that solves one vulnerability and has two fixes
is now available.

Description:

Xen was updated to fix two security issues and a bug:

* CVE-2015-3456: A buffer overflow in the floppy drive emulation,
which could be used to carry out denial of service attacks or
potential code execution against the host. This vulnerability is
also known as VENOM.
* CVE-2015-3340: Xen did not initialize certain fields, which allowed
certain remote service domains to obtain sensitive information from
memory via a (1) XEN_DOMCTL_gettscinfo or (2)
XEN_SYSCTL_getdomaininfolist request.
* An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

* CVE-2015-3456
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456>
* CVE-2015-3340
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340>

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 11 SP3:

zypper in -t patch sdksp3-xen=10673

– SUSE Linux Enterprise Server 11 SP3:

zypper in -t patch slessp3-xen=10673

– SUSE Linux Enterprise Desktop 11 SP3:

zypper in -t patch sledsp3-xen=10673

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

xen-devel-4.2.5_06-0.7.1

– SUSE Linux Enterprise Server 11 SP3 (i586 x86_64):

xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
xen-libs-4.2.5_06-0.7.1
xen-tools-domU-4.2.5_06-0.7.1

– SUSE Linux Enterprise Server 11 SP3 (x86_64):

xen-4.2.5_06-0.7.1
xen-doc-html-4.2.5_06-0.7.1
xen-doc-pdf-4.2.5_06-0.7.1
xen-libs-32bit-4.2.5_06-0.7.1
xen-tools-4.2.5_06-0.7.1

– SUSE Linux Enterprise Server 11 SP3 (i586):

xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1

– SUSE Linux Enterprise Desktop 11 SP3 (i586 x86_64):

xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1
xen-libs-4.2.5_06-0.7.1
xen-tools-domU-4.2.5_06-0.7.1

– SUSE Linux Enterprise Desktop 11 SP3 (x86_64):

xen-4.2.5_06-0.7.1
xen-doc-html-4.2.5_06-0.7.1
xen-doc-pdf-4.2.5_06-0.7.1
xen-libs-32bit-4.2.5_06-0.7.1
xen-tools-4.2.5_06-0.7.1

– SUSE Linux Enterprise Desktop 11 SP3 (i586):

xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1

References:

https://www.suse.com/security/cve/CVE-2015-3456.html
https://bugzilla.suse.com/910441
https://bugzilla.suse.com/927967
https://bugzilla.suse.com/929339
https://download.suse.com/patch/finder/?keywords=beaa1b0c2d4c1d543469208fc416ea1e


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorTomislav Protega
Cert idNCERT-REF-2015-05-0006-ADV
CveCVE-2015-3456 CVE-2015-3340
ID izvornikaSUSE-SU-2015:0927-1
ProizvodXen
Izvorhttp://www.suse.com
Top
More in Preporuke
Sigurnosni propust programskog paketa fuse

Otkriven je sigurnosni propust u programskom paketu fuse za Debian. Ranjivost je uzrokovana neispravnim filtriranjem varijabli okruženja prije izvršavanja naredbi...

Close