SuSE: 2015:0022-1: important: xen
Summary
xen was updated to fix nine security issues. These security issues were fixed: - Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030). - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (CVE-2014-8867). - Excessive checking in compatibility mode hypercall argument translation (CVE-2014-8866). - Guest user mode triggerable VM exits not handled by hypervisor (bnc#9038500). - Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). - Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594). - Long latency virtual-mmu operations are not preemptible (CVE-2014-5146, CVE-2014-5149). - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts (CVE-2013-3495). These non-security issues were fixed: - Corrupted save/restore test leaves orphaned data in xenstore (bnc#903357). - Temporary m...
Read the Full AdvisoryReferences
#826717 #866902 #882089 #889526 #896023 #897614
#897906 #898772 #900292 #901317 #903357 #903359
#903850 #903967 #903970 #905465 #905467 #906439
Cross- CVE-2013-3495 CVE-2014-5146 CVE-2014-5149
CVE-2014-8594 CVE-2014-8595 CVE-2014-8866
CVE-2014-8867 CVE-2014-9030
Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
https://www.suse.com/security/cve/CVE-2013-3495.html
https://www.suse.com/security/cve/CVE-2014-5146.html
https://www.suse.com/security/cve/CVE-2014-5149.html
https://www.suse.com/security/cve/CVE-2014-8594.html
https://www.suse.com/security/cve/CVE-2014-8595.html
https://www.suse.com/security/cve/CVE-2014-8866.html
https://www.suse.com/security/cve/CVE-2014-8867.html
https://www.suse.com/security/cve/CVE-2014-9030....
Read the Full Advisory