SUSE Security Update: Security update for Xen 
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:1044-1
Rating:             important
References:         #744771 #746702 #762484 #762963 #773393 #773401 
                    
Cross-References:   CVE-2012-2625 CVE-2012-3432 CVE-2012-3433
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP1
                    SUSE Linux Enterprise Server 11 SP1 for VMware
                    SUSE Linux Enterprise Server 11 SP1
                    SUSE Linux Enterprise Desktop 11 SP1
______________________________________________________________________________

   An update that solves three vulnerabilities and has three
   fixes is now available. It includes one version update.

Description:


   Xen was updated to fix several security issues:

   *

   CVE-2012-3433: A xen HVM guest destroy p2m teardown
   host DoS vulnerability was fixed, where malicious guest
   could lock/crash the host.

   *

   CVE-2012-3432: A xen HVM guest user mode MMIO
   emulation DoS was fixed.

   *

   CVE-2012-2625: The xen pv bootloader doesn't check
   the size of the bzip2 or lzma compressed kernel, leading to
   denial of service (crash).

   Also the following bug in XEN was fixed:

   * bnc#746702 - Xen HVM DomU crash during Windows Server
   2008 R2 install, when maxmem > memory

   This update also included bugfixes for:

   * vm-install: - bnc#762963 - ReaR: Unable to recover a
   paravirtualized XEN guest

   Security Issue references:

   * CVE-2012-3432
   
   * CVE-2012-3433
   
   * CVE-2012-2625
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP1:

      zypper in -t patch sdksp1-xen-201208-6653

   - SUSE Linux Enterprise Server 11 SP1 for VMware:

      zypper in -t patch slessp1-xen-201208-6653

   - SUSE Linux Enterprise Server 11 SP1:

      zypper in -t patch slessp1-xen-201208-6653

   - SUSE Linux Enterprise Desktop 11 SP1:

      zypper in -t patch sledsp1-xen-201208-6653

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64):

      xen-devel-4.0.3_21548_08-0.7.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64):

      xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1

   - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 0.4.34]:

      vm-install-0.4.34-0.3.1
      xen-4.0.3_21548_08-0.7.1
      xen-doc-html-4.0.3_21548_08-0.7.1
      xen-doc-pdf-4.0.3_21548_08-0.7.1
      xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
      xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
      xen-libs-4.0.3_21548_08-0.7.1
      xen-tools-4.0.3_21548_08-0.7.1
      xen-tools-domU-4.0.3_21548_08-0.7.1

   - SUSE Linux Enterprise Server 11 SP1 (i586):

      xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.4.34]:

      vm-install-0.4.34-0.3.1
      xen-4.0.3_21548_08-0.7.1
      xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1
      xen-libs-4.0.3_21548_08-0.7.1
      xen-tools-4.0.3_21548_08-0.7.1
      xen-tools-domU-4.0.3_21548_08-0.7.1

   - SUSE Linux Enterprise Desktop 11 SP1 (i586):

      xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1


References:

   https://www.suse.com/security/cve/CVE-2012-2625.html
   https://www.suse.com/security/cve/CVE-2012-3432.html
   https://www.suse.com/security/cve/CVE-2012-3433.html
   https://bugzilla.novell.com/744771
   https://bugzilla.novell.com/746702
   https://bugzilla.novell.com/762484
   https://bugzilla.novell.com/762963
   https://bugzilla.novell.com/773393
   https://bugzilla.novell.com/773401
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:1044-1: important: Xen

August 27, 2012
An update that solves three vulnerabilities and has three An update that solves three vulnerabilities and has three An update that solves three vulnerabilities and has three fixes ...

Summary

Xen was updated to fix several security issues: * CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS vulnerability was fixed, where malicious guest could lock/crash the host. * CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was fixed. * CVE-2012-2625: The xen pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel, leading to denial of service (crash). Also the following bug in XEN was fixed: * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2 install, when maxmem > memory This update also included bugfixes for: * vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized XEN guest Security Issue references: * CVE-2012-3432 * CVE-2012-3433 * CVE-2012-2625 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-xen-201208-6653 - SUSE Linux Enterprise Server 11 SP1 for VMware: zypper in -t patch slessp1-xen-201208-6653 - SUSE Linux Enterprise Server 11 SP1: zypper in -t patch slessp1-xen-201208-6653 - SUSE Linux Enterprise Desktop 11 SP1: zypper in -t patch sledsp1-xen-201208-6653 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64): xen-devel-4.0.3_21548_08-0.7.1 - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64): xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586 x86_64) [New Version: 0.4.34]: vm-install-0.4.34-0.3.1 xen-4.0.3_21548_08-0.7.1 xen-doc-html-4.0.3_21548_08-0.7.1 xen-doc-pdf-4.0.3_21548_08-0.7.1 xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 xen-kmp-trace-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 xen-libs-4.0.3_21548_08-0.7.1 xen-tools-4.0.3_21548_08-0.7.1 xen-tools-domU-4.0.3_21548_08-0.7.1 - SUSE Linux Enterprise Server 11 SP1 (i586): xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586 x86_64) [New Version: 0.4.34]: vm-install-0.4.34-0.3.1 xen-4.0.3_21548_08-0.7.1 xen-kmp-default-4.0.3_21548_08_2.6.32.59_0.7-0.7.1 xen-libs-4.0.3_21548_08-0.7.1 xen-tools-4.0.3_21548_08-0.7.1 xen-tools-domU-4.0.3_21548_08-0.7.1 - SUSE Linux Enterprise Desktop 11 SP1 (i586): xen-kmp-pae-4.0.3_21548_08_2.6.32.59_0.7-0.7.1

References

#744771 #746702 #762484 #762963 #773393 #773401

Cross- CVE-2012-2625 CVE-2012-3432 CVE-2012-3433

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP1

SUSE Linux Enterprise Server 11 SP1 for VMware

SUSE Linux Enterprise Server 11 SP1

SUSE Linux Enterprise Desktop 11 SP1

https://www.suse.com/security/cve/CVE-2012-2625.html

https://www.suse.com/security/cve/CVE-2012-3432.html

https://www.suse.com/security/cve/CVE-2012-3433.html

https://bugzilla.novell.com/744771

https://bugzilla.novell.com/746702

https://bugzilla.novell.com/762484

https://bugzilla.novell.com/762963

https://bugzilla.novell.com/773393

https://bugzilla.novell.com/773401

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:1044-1
Rating: important

Related News