Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in xen
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in xen
ID: SUSE-SU-2018:3332-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Enterprise Storage 4, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL
Datum: Di, 23. Oktober 2018, 18:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
Applikationen: Xen

Originalnachricht

   SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID: SUSE-SU-2018:3332-1
Rating: moderate
References: #1094508 #1103276 #1111014
Cross-References: CVE-2018-15468 CVE-2018-17963
Affected Products:
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Server for SAP 12-SP2
SUSE Linux Enterprise Server 12-SP2-LTSS
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Enterprise Storage 4
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for xen fixes the following issues:

- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater
than INT_MAX, which allows attackers to cause a denial of service or
possibly have unspecified other impact. (bsc#1111014)
- CVE-2018-15468: The DEBUGCTL MSR contains several debugging features,
some of which virtualise cleanly, but some do not. In particular, Branch
Trace Store is not virtualised by the processor, and software has to be
careful to configure it suitably not to lock up the core. As a result,
it must only be available to fully trusted guests. Unfortunately, in the
case that vPMU is disabled, all value checking was skipped, allowing the
guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy
guest administrator (on Intel x86 HVM or PVH) could have locked up the
entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)

Non security issues fixed:

- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE OpenStack Cloud 7:

zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2398=1

- SUSE Linux Enterprise Server for SAP 12-SP2:

zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2398=1

- SUSE Linux Enterprise Server 12-SP2-LTSS:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2398=1

- SUSE Linux Enterprise Server 12-SP2-BCL:

zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2398=1

- SUSE Enterprise Storage 4:

zypper in -t patch SUSE-Storage-4-2018-2398=1



Package List:

- SUSE OpenStack Cloud 7 (x86_64):

xen-4.7.6_05-43.42.1
xen-debugsource-4.7.6_05-43.42.1
xen-doc-html-4.7.6_05-43.42.1
xen-libs-32bit-4.7.6_05-43.42.1
xen-libs-4.7.6_05-43.42.1
xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
xen-libs-debuginfo-4.7.6_05-43.42.1
xen-tools-4.7.6_05-43.42.1
xen-tools-debuginfo-4.7.6_05-43.42.1
xen-tools-domU-4.7.6_05-43.42.1
xen-tools-domU-debuginfo-4.7.6_05-43.42.1

- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):

xen-4.7.6_05-43.42.1
xen-debugsource-4.7.6_05-43.42.1
xen-doc-html-4.7.6_05-43.42.1
xen-libs-32bit-4.7.6_05-43.42.1
xen-libs-4.7.6_05-43.42.1
xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
xen-libs-debuginfo-4.7.6_05-43.42.1
xen-tools-4.7.6_05-43.42.1
xen-tools-debuginfo-4.7.6_05-43.42.1
xen-tools-domU-4.7.6_05-43.42.1
xen-tools-domU-debuginfo-4.7.6_05-43.42.1

- SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):

xen-4.7.6_05-43.42.1
xen-debugsource-4.7.6_05-43.42.1
xen-doc-html-4.7.6_05-43.42.1
xen-libs-32bit-4.7.6_05-43.42.1
xen-libs-4.7.6_05-43.42.1
xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
xen-libs-debuginfo-4.7.6_05-43.42.1
xen-tools-4.7.6_05-43.42.1
xen-tools-debuginfo-4.7.6_05-43.42.1
xen-tools-domU-4.7.6_05-43.42.1
xen-tools-domU-debuginfo-4.7.6_05-43.42.1

- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):

xen-4.7.6_05-43.42.1
xen-debugsource-4.7.6_05-43.42.1
xen-doc-html-4.7.6_05-43.42.1
xen-libs-32bit-4.7.6_05-43.42.1
xen-libs-4.7.6_05-43.42.1
xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
xen-libs-debuginfo-4.7.6_05-43.42.1
xen-tools-4.7.6_05-43.42.1
xen-tools-debuginfo-4.7.6_05-43.42.1
xen-tools-domU-4.7.6_05-43.42.1
xen-tools-domU-debuginfo-4.7.6_05-43.42.1

- SUSE Enterprise Storage 4 (x86_64):

xen-4.7.6_05-43.42.1
xen-debugsource-4.7.6_05-43.42.1
xen-doc-html-4.7.6_05-43.42.1
xen-libs-32bit-4.7.6_05-43.42.1
xen-libs-4.7.6_05-43.42.1
xen-libs-debuginfo-32bit-4.7.6_05-43.42.1
xen-libs-debuginfo-4.7.6_05-43.42.1
xen-tools-4.7.6_05-43.42.1
xen-tools-debuginfo-4.7.6_05-43.42.1
xen-tools-domU-4.7.6_05-43.42.1
xen-tools-domU-debuginfo-4.7.6_05-43.42.1


References:

https://www.suse.com/security/cve/CVE-2018-15468.html
https://www.suse.com/security/cve/CVE-2018-17963.html
https://bugzilla.suse.com/1094508
https://bugzilla.suse.com/1103276
https://bugzilla.suse.com/1111014

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung