Security update for xen
SUSE Security Update: Security update for xen
bugs.
The following vulnerabilities were fixed:
- Long latency MMIO mapping operations are not preemptible (XSA-125,
CVE-2015-2752, bnc#922705)
- Unmediated PCI command register access in qemu (XSA-126, CVE-2015-2756,
bnc#922706)
- Certain domctl operations may be abused to lock up the host (XSA-127,
CVE-2015-2751, bnc#922709)
The following non-security bugs were fixed:
- xen dmesg contains bogus output in early boot (bnc#923758)
- Xentop doesn't display disk statistics for VMs using qdisks (bnc#921842)
The following functionality was enabled:
- Enable spice support in qemu for x86_64
- Add Qxl vga support
Announcement ID: | SUSE-SU-2015:0701-1 |
Rating: | moderate |
References: | #921842 #922705 #922706 #922709 #923758 |
Affected Products: |
An update that solves three vulnerabilities and has two fixes is now available.
Description:
Xen was updated 4.4.2_01 to address three security issues and functionalbugs.
The following vulnerabilities were fixed:
- Long latency MMIO mapping operations are not preemptible (XSA-125,
CVE-2015-2752, bnc#922705)
- Unmediated PCI command register access in qemu (XSA-126, CVE-2015-2756,
bnc#922706)
- Certain domctl operations may be abused to lock up the host (XSA-127,
CVE-2015-2751, bnc#922709)
The following non-security bugs were fixed:
- xen dmesg contains bogus output in early boot (bnc#923758)
- Xentop doesn't display disk statistics for VMs using qdisks (bnc#921842)
The following functionality was enabled:
- Enable spice support in qemu for x86_64
- Add Qxl vga support
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12:
zypper in -t patch SUSE-SLE-SDK-12-2015-162=1
- SUSE Linux Enterprise Server 12:
zypper in -t patch SUSE-SLE-SERVER-12-2015-162=1
- SUSE Linux Enterprise Desktop 12:
zypper in -t patch SUSE-SLE-DESKTOP-12-2015-162=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 12 (x86_64):
- xen-debugsource-4.4.2_02-15.1
- xen-devel-4.4.2_02-15.1
- SUSE Linux Enterprise Server 12 (x86_64):
- xen-4.4.2_02-15.1
- xen-debugsource-4.4.2_02-15.1
- xen-doc-html-4.4.2_02-15.1
- xen-kmp-default-4.4.2_02_k3.12.38_44-15.1
- xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1
- xen-libs-32bit-4.4.2_02-15.1
- xen-libs-4.4.2_02-15.1
- xen-libs-debuginfo-32bit-4.4.2_02-15.1
- xen-libs-debuginfo-4.4.2_02-15.1
- xen-tools-4.4.2_02-15.1
- xen-tools-debuginfo-4.4.2_02-15.1
- xen-tools-domU-4.4.2_02-15.1
- xen-tools-domU-debuginfo-4.4.2_02-15.1
- SUSE Linux Enterprise Desktop 12 (x86_64):
- xen-4.4.2_02-15.1
- xen-debugsource-4.4.2_02-15.1
- xen-kmp-default-4.4.2_02_k3.12.38_44-15.1
- xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1
- xen-libs-32bit-4.4.2_02-15.1
- xen-libs-4.4.2_02-15.1
- xen-libs-debuginfo-32bit-4.4.2_02-15.1
- xen-libs-debuginfo-4.4.2_02-15.1
References:
- https://www.suse.com/security/cve/CVE-2015-2751.html
- https://www.suse.com/security/cve/CVE-2015-2752.html
- https://www.suse.com/security/cve/CVE-2015-2756.html
- https://bugzilla.suse.com/921842
- https://bugzilla.suse.com/922705
- https://bugzilla.suse.com/922706
- https://bugzilla.suse.com/922709
- https://bugzilla.suse.com/923758