SUSE-SU-2018:2401-1: important: Security update for xen
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Aug 17 04:14:02 MDT 2018
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2018:2401-1
Rating: important
References: #1027519 #1091107 #1103276
Cross-References: CVE-2018-3646
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3
SUSE CaaS Platform ALL
SUSE CaaS Platform 3.0
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for xen fixes the following security issues:
- CVE-2018-3646: Systems with microprocessors utilizing speculative
execution and address translations may have allowed unauthorized
disclosure of information residing in the L1 data cache to an attacker
with local user access with guest OS privilege via a terminal page fault
and a side-channel analysis (bsc#1091107, bsc#1027519).
- Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a
malicious or buggy guest administrator can lock up the entire host
(bsc#1103276)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 12-SP3:
zypper in -t patch SUSE-SLE-SDK-12-SP3-2018-1656=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-1656=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2018-1656=1
- SUSE CaaS Platform ALL:
To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
- SUSE CaaS Platform 3.0:
To install this update, use the SUSE CaaS Platform Velum dashboard.
It will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 x86_64):
xen-debugsource-4.9.2_10-3.41.1
xen-devel-4.9.2_10-3.41.1
- SUSE Linux Enterprise Server 12-SP3 (x86_64):
xen-4.9.2_10-3.41.1
xen-debugsource-4.9.2_10-3.41.1
xen-doc-html-4.9.2_10-3.41.1
xen-libs-32bit-4.9.2_10-3.41.1
xen-libs-4.9.2_10-3.41.1
xen-libs-debuginfo-32bit-4.9.2_10-3.41.1
xen-libs-debuginfo-4.9.2_10-3.41.1
xen-tools-4.9.2_10-3.41.1
xen-tools-debuginfo-4.9.2_10-3.41.1
xen-tools-domU-4.9.2_10-3.41.1
xen-tools-domU-debuginfo-4.9.2_10-3.41.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
xen-4.9.2_10-3.41.1
xen-debugsource-4.9.2_10-3.41.1
xen-libs-32bit-4.9.2_10-3.41.1
xen-libs-4.9.2_10-3.41.1
xen-libs-debuginfo-32bit-4.9.2_10-3.41.1
xen-libs-debuginfo-4.9.2_10-3.41.1
- SUSE CaaS Platform ALL (x86_64):
xen-debugsource-4.9.2_10-3.41.1
xen-libs-4.9.2_10-3.41.1
xen-libs-debuginfo-4.9.2_10-3.41.1
xen-tools-domU-4.9.2_10-3.41.1
xen-tools-domU-debuginfo-4.9.2_10-3.41.1
- SUSE CaaS Platform 3.0 (x86_64):
xen-debugsource-4.9.2_10-3.41.1
xen-libs-4.9.2_10-3.41.1
xen-libs-debuginfo-4.9.2_10-3.41.1
xen-tools-domU-4.9.2_10-3.41.1
xen-tools-domU-debuginfo-4.9.2_10-3.41.1
References:
https://www.suse.com/security/cve/CVE-2018-3646.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1091107
https://bugzilla.suse.com/1103276
More information about the sle-security-updates
mailing list