Security update for xen

SUSE Security Update: Security update for xen
Announcement ID: SUSE-SU-2015:0701-1
Rating: moderate
References: #921842 #922705 #922706 #922709 #923758
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 12
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Desktop 12

  • An update that solves three vulnerabilities and has two fixes is now available.

    Description:

    Xen was updated 4.4.2_01 to address three security issues and functional
    bugs.

    The following vulnerabilities were fixed:
    - Long latency MMIO mapping operations are not preemptible (XSA-125,
    CVE-2015-2752, bnc#922705)
    - Unmediated PCI command register access in qemu (XSA-126, CVE-2015-2756,
    bnc#922706)
    - Certain domctl operations may be abused to lock up the host (XSA-127,
    CVE-2015-2751, bnc#922709)

    The following non-security bugs were fixed:
    - xen dmesg contains bogus output in early boot (bnc#923758)
    - Xentop doesn't display disk statistics for VMs using qdisks (bnc#921842)

    The following functionality was enabled:
    - Enable spice support in qemu for x86_64
    - Add Qxl vga support

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 12:
      zypper in -t patch SUSE-SLE-SDK-12-2015-162=1
    • SUSE Linux Enterprise Server 12:
      zypper in -t patch SUSE-SLE-SERVER-12-2015-162=1
    • SUSE Linux Enterprise Desktop 12:
      zypper in -t patch SUSE-SLE-DESKTOP-12-2015-162=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 12 (x86_64):
      • xen-debugsource-4.4.2_02-15.1
      • xen-devel-4.4.2_02-15.1
    • SUSE Linux Enterprise Server 12 (x86_64):
      • xen-4.4.2_02-15.1
      • xen-debugsource-4.4.2_02-15.1
      • xen-doc-html-4.4.2_02-15.1
      • xen-kmp-default-4.4.2_02_k3.12.38_44-15.1
      • xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1
      • xen-libs-32bit-4.4.2_02-15.1
      • xen-libs-4.4.2_02-15.1
      • xen-libs-debuginfo-32bit-4.4.2_02-15.1
      • xen-libs-debuginfo-4.4.2_02-15.1
      • xen-tools-4.4.2_02-15.1
      • xen-tools-debuginfo-4.4.2_02-15.1
      • xen-tools-domU-4.4.2_02-15.1
      • xen-tools-domU-debuginfo-4.4.2_02-15.1
    • SUSE Linux Enterprise Desktop 12 (x86_64):
      • xen-4.4.2_02-15.1
      • xen-debugsource-4.4.2_02-15.1
      • xen-kmp-default-4.4.2_02_k3.12.38_44-15.1
      • xen-kmp-default-debuginfo-4.4.2_02_k3.12.38_44-15.1
      • xen-libs-32bit-4.4.2_02-15.1
      • xen-libs-4.4.2_02-15.1
      • xen-libs-debuginfo-32bit-4.4.2_02-15.1
      • xen-libs-debuginfo-4.4.2_02-15.1

    References:

    • https://www.suse.com/security/cve/CVE-2015-2751.html
    • https://www.suse.com/security/cve/CVE-2015-2752.html
    • https://www.suse.com/security/cve/CVE-2015-2756.html
    • https://bugzilla.suse.com/921842
    • https://bugzilla.suse.com/922705
    • https://bugzilla.suse.com/922706
    • https://bugzilla.suse.com/922709
    • https://bugzilla.suse.com/923758