|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2018:2401-1 (xen)

From:  <sle-security-updates@lists.suse.com>
To:  <sle-security-updates@lists.suse.com>
Subject:  SUSE-SU-2018:2401-1: important: Security update for xen
Date:  Fri, 17 Aug 2018 12:14:02 +0200
Message-ID:  <20180817101402.4C6E9F7C0@maintenance.suse.de>

SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:2401-1 Rating: important References: #1027519 #1091107 #1103276 Cross-References: CVE-2018-3646 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP3 SUSE Linux Enterprise Server 12-SP3 SUSE Linux Enterprise Desktop 12-SP3 SUSE CaaS Platform ALL SUSE CaaS Platform 3.0 ______________________________________________________________________________ An update that solves one vulnerability and has two fixes is now available. Description: This update for xen fixes the following security issues: - CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bsc#1091107, bsc#1027519). - Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or buggy guest administrator can lock up the entire host (bsc#1103276) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1656=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1656=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1656=1 - SUSE CaaS Platform ALL: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. - SUSE CaaS Platform 3.0: To install this update, use the SUSE CaaS Platform Velum dashboard. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64): xen-debugsource-4.9.2_10-3.41.1 xen-devel-4.9.2_10-3.41.1 - SUSE Linux Enterprise Server 12-SP3 (x86_64): xen-4.9.2_10-3.41.1 xen-debugsource-4.9.2_10-3.41.1 xen-doc-html-4.9.2_10-3.41.1 xen-libs-32bit-4.9.2_10-3.41.1 xen-libs-4.9.2_10-3.41.1 xen-libs-debuginfo-32bit-4.9.2_10-3.41.1 xen-libs-debuginfo-4.9.2_10-3.41.1 xen-tools-4.9.2_10-3.41.1 xen-tools-debuginfo-4.9.2_10-3.41.1 xen-tools-domU-4.9.2_10-3.41.1 xen-tools-domU-debuginfo-4.9.2_10-3.41.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): xen-4.9.2_10-3.41.1 xen-debugsource-4.9.2_10-3.41.1 xen-libs-32bit-4.9.2_10-3.41.1 xen-libs-4.9.2_10-3.41.1 xen-libs-debuginfo-32bit-4.9.2_10-3.41.1 xen-libs-debuginfo-4.9.2_10-3.41.1 - SUSE CaaS Platform ALL (x86_64): xen-debugsource-4.9.2_10-3.41.1 xen-libs-4.9.2_10-3.41.1 xen-libs-debuginfo-4.9.2_10-3.41.1 xen-tools-domU-4.9.2_10-3.41.1 xen-tools-domU-debuginfo-4.9.2_10-3.41.1 - SUSE CaaS Platform 3.0 (x86_64): xen-debugsource-4.9.2_10-3.41.1 xen-libs-4.9.2_10-3.41.1 xen-libs-debuginfo-4.9.2_10-3.41.1 xen-tools-domU-4.9.2_10-3.41.1 xen-tools-domU-debuginfo-4.9.2_10-3.41.1 References: https://www.suse.com/security/cve/CVE-2018-3646.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1091107 https://bugzilla.suse.com/1103276 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds