SB2012091302 - SUSE Linux update for Xen



SB2012091302 - SUSE Linux update for Xen

Published: September 13, 2012

Security Bulletin ID SB2012091302
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3494)

The vulnerability allows a local non-authenticated attacker to perform service disruption.

The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.


2) Configuration (CVE-ID: CVE-2012-3496)

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.


3) Input validation error (CVE-ID: CVE-2012-3515)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."


Remediation

Install update from vendor's website.