Lucene search

K
suseSuseSUSE-SU-2015:1853-1
HistoryOct 30, 2015 - 5:13 p.m.

Security update for xen (important)

2015-10-3017:13:49
lists.opensuse.org
19

EPSS

0.036

Percentile

91.7%

xen was updated to fix nine security issues.

These security issues were fixed:

  • CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary
    files with predictable names, which allowed local users to cause a
    denial of service (instantiation failure) by creating /tmp/qemu-smb.-
    files before the program (bsc#932267).
  • CVE-2014-0222: Integer overflow in the qcow_open function allowed remote
    attackers to cause a denial of service (crash) via a large L2 table in a
    QCOW version 1 image (bsc#877642).
  • CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests
    (bsc#950367).
  • CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on
    disks when using the qemu-xen device model, which allowed local guest
    users to write to a read-only disk image (bsc#947165).
  • CVE-2015-5239: Integer overflow in vnc_client_read() and
    protocol_client_msg() (bsc#944463).
  • CVE-2015-6815: With e1000 NIC emulation support it was possible to enter
    an infinite loop (bsc#944697).
  • CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to
    denial of service (bsc#950703).
  • CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array
    leading to denial of service (bsc#950705).
  • CVE-2015-7971: Some pmu and profiling hypercalls log without rate
    limiting (bsc#950706).

These non-security issues were fixed:

  • bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
  • bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of
    guest with VT-d NIC
  • bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
  • bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has
    been observed
  • bsc#941074: Device 51728 could not be connected. Hotplug scripts not
    working