SUSE-SU-2018:0039-1: important: Security update for kvm

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Jan 8 10:08:27 MST 2018


   SUSE Security Update: Security update for kvm
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0039-1
Rating:             important
References:         #1026612 #1068032 
Cross-References:   CVE-2017-2633 CVE-2017-5715
Affected Products:
                    SUSE Linux Enterprise Server 11-SP3-LTSS
                    SUSE Linux Enterprise Point of Sale 11-SP3
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:



   This update for kvm fixes the following issues:

   A security flaw mitigation has been applied:

   - CVE-2017-5715: QEMU was updated to allow passing through new MSR and
     CPUID flags from the host VM to the CPU, to allow enabling/disabling
     branch prediction features in the Intel CPU. (bsc#1068032)

   Also a security fix has been applied:

   - CVE-2017-2633: Fix various out of bounds access issues in the QEMU vnc
     infrastructure (bsc#1026612)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP3-LTSS:

      zypper in -t patch slessp3-kvm-13397=1

   - SUSE Linux Enterprise Point of Sale 11-SP3:

      zypper in -t patch sleposp3-kvm-13397=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64):

      kvm-1.4.2-53.14.1

   - SUSE Linux Enterprise Point of Sale 11-SP3 (i586):

      kvm-1.4.2-53.14.1


References:

   https://www.suse.com/security/cve/CVE-2017-2633.html
   https://www.suse.com/security/cve/CVE-2017-5715.html
   https://bugzilla.suse.com/1026612
   https://bugzilla.suse.com/1068032



More information about the sle-security-updates mailing list