Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: SUSE-SU-2018:0909-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 12-SP2, SUSE Linux Enterprise Software Development Kit 12-SP2, SUSE Linux Enterprise Server 12-SP2
Datum: Di, 10. April 2018, 18:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
Applikationen: Xen

Originalnachricht

   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:0909-1
Rating: important
References: #1027519 #1072834 #1074562 #1080635 #1080662
#1087251
Cross-References: CVE-2017-5715 CVE-2017-5753 CVE-2017-5754
CVE-2018-7540 CVE-2018-7541
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2
SUSE Linux Enterprise Server 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that solves 5 vulnerabilities and has one errata
is now available.

Description:



This update for xen fixes the following issues:

Update to Xen 4.7.5 bug fix only release (bsc#1027519)

Security issues fixed:

- CVE-2018-7540: Fixed DoS via non-preemptable L3/L4 pagetable freeing
(XSA-252) (bsc#1080635)
- CVE-2018-7541: A grant table v2 -> v1 transition may crash Xen
(XSA-255)
(bsc#1080662)
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 Fixed information leaks via
side effects of speculative execution (XSA-254). Includes Spectre v2
mitigation. (bsc#1074562)


- Preserve xen-syms from xen-dbg.gz to allow processing vmcores with
crash(1) (bsc#1087251)
- Xen HVM: Fixed unchecked MSR access error (bsc#1072834)
- Add script, udev rule and systemd service to watch for vcpu
online/offline events in a HVM domU They are triggered via xl vcpu-set
domU N (fate#324965)
- Make sure tools and tools-domU require libs from the very same build


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 12-SP2:

zypper in -t patch SUSE-SLE-SDK-12-SP2-2018-612=1

- SUSE Linux Enterprise Server 12-SP2:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-612=1

- SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2018-612=1



Package List:

- SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 x86_64):

xen-debugsource-4.7.5_02-43.27.1
xen-devel-4.7.5_02-43.27.1

- SUSE Linux Enterprise Server 12-SP2 (x86_64):

xen-4.7.5_02-43.27.1
xen-debugsource-4.7.5_02-43.27.1
xen-doc-html-4.7.5_02-43.27.1
xen-libs-32bit-4.7.5_02-43.27.1
xen-libs-4.7.5_02-43.27.1
xen-libs-debuginfo-32bit-4.7.5_02-43.27.1
xen-libs-debuginfo-4.7.5_02-43.27.1
xen-tools-4.7.5_02-43.27.1
xen-tools-debuginfo-4.7.5_02-43.27.1
xen-tools-domU-4.7.5_02-43.27.1
xen-tools-domU-debuginfo-4.7.5_02-43.27.1

- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

xen-4.7.5_02-43.27.1
xen-debugsource-4.7.5_02-43.27.1
xen-libs-32bit-4.7.5_02-43.27.1
xen-libs-4.7.5_02-43.27.1
xen-libs-debuginfo-32bit-4.7.5_02-43.27.1
xen-libs-debuginfo-4.7.5_02-43.27.1


References:

https://www.suse.com/security/cve/CVE-2017-5715.html
https://www.suse.com/security/cve/CVE-2017-5753.html
https://www.suse.com/security/cve/CVE-2017-5754.html
https://www.suse.com/security/cve/CVE-2018-7540.html
https://www.suse.com/security/cve/CVE-2018-7541.html
https://bugzilla.suse.com/1027519
https://bugzilla.suse.com/1072834
https://bugzilla.suse.com/1074562
https://bugzilla.suse.com/1080635
https://bugzilla.suse.com/1080662
https://bugzilla.suse.com/1087251

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung