Security update for Xen

SUSE Security Update: Security update for Xen
Announcement ID: SUSE-SU-2012:1044-1
Rating: important
References: #744771 #746702 #762484 #762963 #773393 #773401
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP1
  • SUSE Linux Enterprise Server 11 SP1 for VMware
  • SUSE Linux Enterprise Server 11 SP1
  • SUSE Linux Enterprise Desktop 11 SP1

  • An update that solves three vulnerabilities and has three fixes is now available. It includes one version update.

    Description:


    Xen was updated to fix several security issues:

    *

    CVE-2012-3433: A xen HVM guest destroy p2m teardown
    host DoS vulnerability was fixed, where malicious guest
    could lock/crash the host.

    *

    CVE-2012-3432: A xen HVM guest user mode MMIO
    emulation DoS was fixed.

    *

    CVE-2012-2625: The xen pv bootloader doesn't check
    the size of the bzip2 or lzma compressed kernel, leading to
    denial of service (crash).

    Also the following bug in XEN was fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server
    2008 R2 install, when maxmem > memory

    This update also included bugfixes for:

    * vm-install: - bnc#762963 - ReaR: Unable to recover a
    paravirtualized XEN guest

    Security Issue references:

    * CVE-2012-3432
    >
    * CVE-2012-3433
    >
    * CVE-2012-2625
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP1:
      zypper in -t patch sdksp1-xen-201208-6653
    • SUSE Linux Enterprise Server 11 SP1 for VMware:
      zypper in -t patch slessp1-xen-201208-6653
    • SUSE Linux Enterprise Server 11 SP1:
      zypper in -t patch slessp1-xen-201208-6653
    • SUSE Linux Enterprise Desktop 11 SP1:
      zypper in -t patch sledsp1-xen-201208-6653

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):
    • xen-devel-4.0.3_21548_08-0.7.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):
    • xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
    • SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 0.4.34]:
    • vm-install-0.4.34-0.3.1
    • xen-4.0.3_21548_08-0.7.1
    • xen-doc-html-4.0.3_21548_08-0.7.1
    • xen-doc-pdf-4.0.3_21548_08-0.7.1
    • xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
    • xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
    • xen-libs-4.0.3_21548_08-0.7.1
    • xen-tools-4.0.3_21548_08-0.7.1
    • xen-tools-domU-4.0.3_21548_08-0.7.1
    • SUSE Linux Enterprise Server 11 SP1 (i586):
    • xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
    • SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.4.34]:
    • vm-install-0.4.34-0.3.1
    • xen-4.0.3_21548_08-0.7.1
    • xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
    • xen-libs-4.0.3_21548_08-0.7.1
    • xen-tools-4.0.3_21548_08-0.7.1
    • xen-tools-domU-4.0.3_21548_08-0.7.1
    • SUSE Linux Enterprise Desktop 11 SP1 (i586):
    • xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1

    References:

  • http://support.novell.com/security/cve/CVE-2012-2625.html
  • http://support.novell.com/security/cve/CVE-2012-3432.html
  • http://support.novell.com/security/cve/CVE-2012-3433.html
  • https://bugzilla.novell.com/744771
  • https://bugzilla.novell.com/746702
  • https://bugzilla.novell.com/762484
  • https://bugzilla.novell.com/762963
  • https://bugzilla.novell.com/773393
  • https://bugzilla.novell.com/773401
  • http://download.suse.com/patch/finder/?keywords=872c7f98262a167c6598ea04dc6e81c7