SUSE-SU-2018:2401-1: important: Security update for xen

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Aug 17 04:14:01 MDT 2018


   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:2401-1
Rating:             important
References:         #1027519 #1091107 #1103276 
Cross-References:   CVE-2018-3646
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE CaaS Platform ALL
                    SUSE CaaS Platform 3.0
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for xen fixes the following security issues:

   - CVE-2018-3646: Systems with microprocessors utilizing speculative
     execution and address translations may have allowed unauthorized
     disclosure of information residing in the L1 data cache to an attacker
     with local user access with guest OS privilege via a terminal page fault
     and a side-channel analysis (bsc#1091107, bsc#1027519).
   - Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a
     malicious or buggy guest administrator can lock up the entire host
     (bsc#1103276)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1656=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1656=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1656=1

   - SUSE CaaS Platform ALL:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.

   - SUSE CaaS Platform 3.0:

      To install this update, use the SUSE CaaS Platform Velum dashboard.
      It will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):

      xen-debugsource-4.9.2_10-3.41.1
      xen-devel-4.9.2_10-3.41.1

   - SUSE Linux Enterprise Server 12-SP3 (x86_64):

      xen-4.9.2_10-3.41.1
      xen-debugsource-4.9.2_10-3.41.1
      xen-doc-html-4.9.2_10-3.41.1
      xen-libs-32bit-4.9.2_10-3.41.1
      xen-libs-4.9.2_10-3.41.1
      xen-libs-debuginfo-32bit-4.9.2_10-3.41.1
      xen-libs-debuginfo-4.9.2_10-3.41.1
      xen-tools-4.9.2_10-3.41.1
      xen-tools-debuginfo-4.9.2_10-3.41.1
      xen-tools-domU-4.9.2_10-3.41.1
      xen-tools-domU-debuginfo-4.9.2_10-3.41.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      xen-4.9.2_10-3.41.1
      xen-debugsource-4.9.2_10-3.41.1
      xen-libs-32bit-4.9.2_10-3.41.1
      xen-libs-4.9.2_10-3.41.1
      xen-libs-debuginfo-32bit-4.9.2_10-3.41.1
      xen-libs-debuginfo-4.9.2_10-3.41.1

   - SUSE CaaS Platform ALL (x86_64):

      xen-debugsource-4.9.2_10-3.41.1
      xen-libs-4.9.2_10-3.41.1
      xen-libs-debuginfo-4.9.2_10-3.41.1
      xen-tools-domU-4.9.2_10-3.41.1
      xen-tools-domU-debuginfo-4.9.2_10-3.41.1

   - SUSE CaaS Platform 3.0 (x86_64):

      xen-debugsource-4.9.2_10-3.41.1
      xen-libs-4.9.2_10-3.41.1
      xen-libs-debuginfo-4.9.2_10-3.41.1
      xen-tools-domU-4.9.2_10-3.41.1
      xen-tools-domU-debuginfo-4.9.2_10-3.41.1


References:

   https://www.suse.com/security/cve/CVE-2018-3646.html
   https://bugzilla.suse.com/1027519
   https://bugzilla.suse.com/1091107
   https://bugzilla.suse.com/1103276



More information about the sle-updates mailing list