SUSE-SU-2020:3742-1: important: Security update for xen
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Dec 10 07:17:46 MST 2020
SUSE Security Update: Security update for xen
______________________________________________________________________________
Announcement ID: SUSE-SU-2020:3742-1
Rating: important
References: #1177409 #1177412 #1177413 #1177414 #1178591
#1178963
Cross-References: CVE-2020-27670 CVE-2020-27671 CVE-2020-27672
CVE-2020-27674 CVE-2020-28368
Affected Products:
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
______________________________________________________________________________
An update that solves 5 vulnerabilities and has one errata
is now available.
Description:
This update for xen fixes the following issues:
- bsc#1178963 - stack corruption from XSA-346 change (XSA-355)
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave
stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code
(XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes
(XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates
(XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS
attack aka XSA-351
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 7:
zypper in -t patch SUSE-OpenStack-Cloud-7-2020-3742=1
- SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3742=1
- SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3742=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-3742=1
Package List:
- SUSE OpenStack Cloud 7 (x86_64):
xen-4.7.6_12-43.70.1
xen-debugsource-4.7.6_12-43.70.1
xen-doc-html-4.7.6_12-43.70.1
xen-libs-32bit-4.7.6_12-43.70.1
xen-libs-4.7.6_12-43.70.1
xen-libs-debuginfo-32bit-4.7.6_12-43.70.1
xen-libs-debuginfo-4.7.6_12-43.70.1
xen-tools-4.7.6_12-43.70.1
xen-tools-debuginfo-4.7.6_12-43.70.1
xen-tools-domU-4.7.6_12-43.70.1
xen-tools-domU-debuginfo-4.7.6_12-43.70.1
- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
xen-4.7.6_12-43.70.1
xen-debugsource-4.7.6_12-43.70.1
xen-doc-html-4.7.6_12-43.70.1
xen-libs-32bit-4.7.6_12-43.70.1
xen-libs-4.7.6_12-43.70.1
xen-libs-debuginfo-32bit-4.7.6_12-43.70.1
xen-libs-debuginfo-4.7.6_12-43.70.1
xen-tools-4.7.6_12-43.70.1
xen-tools-debuginfo-4.7.6_12-43.70.1
xen-tools-domU-4.7.6_12-43.70.1
xen-tools-domU-debuginfo-4.7.6_12-43.70.1
- SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
xen-4.7.6_12-43.70.1
xen-debugsource-4.7.6_12-43.70.1
xen-doc-html-4.7.6_12-43.70.1
xen-libs-32bit-4.7.6_12-43.70.1
xen-libs-4.7.6_12-43.70.1
xen-libs-debuginfo-32bit-4.7.6_12-43.70.1
xen-libs-debuginfo-4.7.6_12-43.70.1
xen-tools-4.7.6_12-43.70.1
xen-tools-debuginfo-4.7.6_12-43.70.1
xen-tools-domU-4.7.6_12-43.70.1
xen-tools-domU-debuginfo-4.7.6_12-43.70.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
xen-4.7.6_12-43.70.1
xen-debugsource-4.7.6_12-43.70.1
xen-doc-html-4.7.6_12-43.70.1
xen-libs-32bit-4.7.6_12-43.70.1
xen-libs-4.7.6_12-43.70.1
xen-libs-debuginfo-32bit-4.7.6_12-43.70.1
xen-libs-debuginfo-4.7.6_12-43.70.1
xen-tools-4.7.6_12-43.70.1
xen-tools-debuginfo-4.7.6_12-43.70.1
xen-tools-domU-4.7.6_12-43.70.1
xen-tools-domU-debuginfo-4.7.6_12-43.70.1
References:
https://www.suse.com/security/cve/CVE-2020-27670.html
https://www.suse.com/security/cve/CVE-2020-27671.html
https://www.suse.com/security/cve/CVE-2020-27672.html
https://www.suse.com/security/cve/CVE-2020-27674.html
https://www.suse.com/security/cve/CVE-2020-28368.html
https://bugzilla.suse.com/1177409
https://bugzilla.suse.com/1177412
https://bugzilla.suse.com/1177413
https://bugzilla.suse.com/1177414
https://bugzilla.suse.com/1178591
https://bugzilla.suse.com/1178963
More information about the sle-security-updates
mailing list