SUSE-SU-2018:3332-1: moderate: Security update for xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Oct 23 10:15:17 MDT 2018


   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:3332-1
Rating:             moderate
References:         #1094508 #1103276 #1111014 
Cross-References:   CVE-2018-15468 CVE-2018-17963
Affected Products:
                    SUSE OpenStack Cloud 7
                    SUSE Linux Enterprise Server for SAP 12-SP2
                    SUSE Linux Enterprise Server 12-SP2-LTSS
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Enterprise Storage 4
______________________________________________________________________________

   An update that solves two vulnerabilities and has one
   errata is now available.

Description:

   This update for xen fixes the following issues:

   - CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater
     than INT_MAX, which allows attackers to cause a denial of service or
     possibly have unspecified other impact. (bsc#1111014)
   - CVE-2018-15468: The DEBUGCTL MSR contains several debugging features,
     some of which virtualise cleanly, but some do not. In particular, Branch
     Trace Store is not virtualised by the processor, and software has to be
     careful to configure it suitably not to lock up the core. As a result,
     it must only be available to fully trusted guests. Unfortunately, in the
     case that vPMU is disabled, all value checking was skipped, allowing the
     guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy
     guest administrator (on Intel x86 HVM or PVH) could have locked up the
     entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

   Non security issues fixed:

   - Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud 7:

      zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2398=1

   - SUSE Linux Enterprise Server for SAP 12-SP2:

      zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2398=1

   - SUSE Linux Enterprise Server 12-SP2-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2398=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2398=1

   - SUSE Enterprise Storage 4:

      zypper in -t patch SUSE-Storage-4-2018-2398=1



Package List:

   - SUSE OpenStack Cloud 7 (x86_64):

      xen-4.7.6_05-43.42.1
      xen-debugsource-4.7.6_05-43.42.1
      xen-doc-html-4.7.6_05-43.42.1
      xen-libs-32bit-4.7.6_05-43.42.1
      xen-libs-4.7.6_05-43.42.1
      xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
      xen-libs-debuginfo-4.7.6_05-43.42.1
      xen-tools-4.7.6_05-43.42.1
      xen-tools-debuginfo-4.7.6_05-43.42.1
      xen-tools-domU-4.7.6_05-43.42.1
      xen-tools-domU-debuginfo-4.7.6_05-43.42.1

   - SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

      xen-4.7.6_05-43.42.1
      xen-debugsource-4.7.6_05-43.42.1
      xen-doc-html-4.7.6_05-43.42.1
      xen-libs-32bit-4.7.6_05-43.42.1
      xen-libs-4.7.6_05-43.42.1
      xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
      xen-libs-debuginfo-4.7.6_05-43.42.1
      xen-tools-4.7.6_05-43.42.1
      xen-tools-debuginfo-4.7.6_05-43.42.1
      xen-tools-domU-4.7.6_05-43.42.1
      xen-tools-domU-debuginfo-4.7.6_05-43.42.1

   - SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

      xen-4.7.6_05-43.42.1
      xen-debugsource-4.7.6_05-43.42.1
      xen-doc-html-4.7.6_05-43.42.1
      xen-libs-32bit-4.7.6_05-43.42.1
      xen-libs-4.7.6_05-43.42.1
      xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
      xen-libs-debuginfo-4.7.6_05-43.42.1
      xen-tools-4.7.6_05-43.42.1
      xen-tools-debuginfo-4.7.6_05-43.42.1
      xen-tools-domU-4.7.6_05-43.42.1
      xen-tools-domU-debuginfo-4.7.6_05-43.42.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

      xen-4.7.6_05-43.42.1
      xen-debugsource-4.7.6_05-43.42.1
      xen-doc-html-4.7.6_05-43.42.1
      xen-libs-32bit-4.7.6_05-43.42.1
      xen-libs-4.7.6_05-43.42.1
      xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
      xen-libs-debuginfo-4.7.6_05-43.42.1
      xen-tools-4.7.6_05-43.42.1
      xen-tools-debuginfo-4.7.6_05-43.42.1
      xen-tools-domU-4.7.6_05-43.42.1
      xen-tools-domU-debuginfo-4.7.6_05-43.42.1

   - SUSE Enterprise Storage 4 (x86_64):

      xen-4.7.6_05-43.42.1
      xen-debugsource-4.7.6_05-43.42.1
      xen-doc-html-4.7.6_05-43.42.1
      xen-libs-32bit-4.7.6_05-43.42.1
      xen-libs-4.7.6_05-43.42.1
      xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
      xen-libs-debuginfo-4.7.6_05-43.42.1
      xen-tools-4.7.6_05-43.42.1
      xen-tools-debuginfo-4.7.6_05-43.42.1
      xen-tools-domU-4.7.6_05-43.42.1
      xen-tools-domU-debuginfo-4.7.6_05-43.42.1


References:

   https://www.suse.com/security/cve/CVE-2018-15468.html
   https://www.suse.com/security/cve/CVE-2018-17963.html
   https://bugzilla.suse.com/1094508
   https://bugzilla.suse.com/1103276
   https://bugzilla.suse.com/1111014



More information about the sle-security-updates mailing list