SUSE-SU-2018:0909-1: important: Security update for xen

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Apr 10 10:07:39 MDT 2018


   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2018:0909-1
Rating:             important
References:         #1027519 #1072834 #1074562 #1080635 #1080662 
                    #1087251 
Cross-References:   CVE-2017-5715 CVE-2017-5753 CVE-2017-5754
                    CVE-2018-7540 CVE-2018-7541
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available.

Description:



   This update for xen fixes the following issues:

   Update to Xen 4.7.5 bug fix only release (bsc#1027519)

   Security issues fixed:

   - CVE-2018-7540: Fixed DoS via non-preemptable L3/L4 pagetable freeing
     (XSA-252) (bsc#1080635)
   - CVE-2018-7541: A grant table v2 -> v1 transition may crash Xen (XSA-255)
     (bsc#1080662)
   - CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 Fixed information leaks via
     side effects of speculative execution (XSA-254). Includes Spectre v2
     mitigation. (bsc#1074562)


   - Preserve xen-syms from xen-dbg.gz to allow processing vmcores with
     crash(1) (bsc#1087251)
   - Xen HVM: Fixed unchecked MSR access error (bsc#1072834)
   - Add script, udev rule and systemd service to watch for vcpu
     online/offline events in a HVM domU They are triggered via xl vcpu-set
      domU N (fate#324965)
   - Make sure tools and tools-domU require libs from the very same build


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-612=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-612=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-612=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):

      xen-debugsource-4.7.5_02-43.27.1
      xen-devel-4.7.5_02-43.27.1

   - SUSE Linux Enterprise Server 12-SP2 (x86_64):

      xen-4.7.5_02-43.27.1
      xen-debugsource-4.7.5_02-43.27.1
      xen-doc-html-4.7.5_02-43.27.1
      xen-libs-32bit-4.7.5_02-43.27.1
      xen-libs-4.7.5_02-43.27.1
      xen-libs-debuginfo-32bit-4.7.5_02-43.27.1
      xen-libs-debuginfo-4.7.5_02-43.27.1
      xen-tools-4.7.5_02-43.27.1
      xen-tools-debuginfo-4.7.5_02-43.27.1
      xen-tools-domU-4.7.5_02-43.27.1
      xen-tools-domU-debuginfo-4.7.5_02-43.27.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      xen-4.7.5_02-43.27.1
      xen-debugsource-4.7.5_02-43.27.1
      xen-libs-32bit-4.7.5_02-43.27.1
      xen-libs-4.7.5_02-43.27.1
      xen-libs-debuginfo-32bit-4.7.5_02-43.27.1
      xen-libs-debuginfo-4.7.5_02-43.27.1


References:

   https://www.suse.com/security/cve/CVE-2017-5715.html
   https://www.suse.com/security/cve/CVE-2017-5753.html
   https://www.suse.com/security/cve/CVE-2017-5754.html
   https://www.suse.com/security/cve/CVE-2018-7540.html
   https://www.suse.com/security/cve/CVE-2018-7541.html
   https://bugzilla.suse.com/1027519
   https://bugzilla.suse.com/1072834
   https://bugzilla.suse.com/1074562
   https://bugzilla.suse.com/1080635
   https://bugzilla.suse.com/1080662
   https://bugzilla.suse.com/1087251



More information about the sle-security-updates mailing list