drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in xen
Name: |
Zwei Probleme in xen |
|
ID: |
SUSE-SU-2018:3332-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE OpenStack Cloud 7, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Enterprise Storage 4, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL |
|
Datum: |
Di, 23. Oktober 2018, 18:42 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468 |
|
Applikationen: |
Xen |
|
Originalnachricht |
SUSE Security Update: Security update for xen ______________________________________________________________________________
Announcement ID: SUSE-SU-2018:3332-1 Rating: moderate References: #1094508 #1103276 #1111014 Cross-References: CVE-2018-15468 CVE-2018-17963 Affected Products: SUSE OpenStack Cloud 7 SUSE Linux Enterprise Server for SAP 12-SP2 SUSE Linux Enterprise Server 12-SP2-LTSS SUSE Linux Enterprise Server 12-SP2-BCL SUSE Enterprise Storage 4 ______________________________________________________________________________
An update that solves two vulnerabilities and has one errata is now available.
Description:
This update for xen fixes the following issues:
- CVE-2018-17963: qemu_deliver_packet_iov accepted packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. (bsc#1111014) - CVE-2018-15468: The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) could have locked up the entire host, causing a Denial of Service. (XSA-269) (bsc#1103276)
Non security issues fixed:
- Kernel oops in fs/dcache.c called by d_materialise_unique() (bsc#1094508)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 7:
zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2398=1
- SUSE Linux Enterprise Server for SAP 12-SP2:
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2398=1
- SUSE Linux Enterprise Server 12-SP2-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2398=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2018-2398=1
- SUSE Enterprise Storage 4:
zypper in -t patch SUSE-Storage-4-2018-2398=1
Package List:
- SUSE OpenStack Cloud 7 (x86_64):
xen-4.7.6_05-43.42.1 xen-debugsource-4.7.6_05-43.42.1 xen-doc-html-4.7.6_05-43.42.1 xen-libs-32bit-4.7.6_05-43.42.1 xen-libs-4.7.6_05-43.42.1 xen-libs-debuginfo-32bit-4.7.6_05-43.42.1 xen-libs-debuginfo-4.7.6_05-43.42.1 xen-tools-4.7.6_05-43.42.1 xen-tools-debuginfo-4.7.6_05-43.42.1 xen-tools-domU-4.7.6_05-43.42.1 xen-tools-domU-debuginfo-4.7.6_05-43.42.1
- SUSE Linux Enterprise Server for SAP 12-SP2 (x86_64):
xen-4.7.6_05-43.42.1 xen-debugsource-4.7.6_05-43.42.1 xen-doc-html-4.7.6_05-43.42.1 xen-libs-32bit-4.7.6_05-43.42.1 xen-libs-4.7.6_05-43.42.1 xen-libs-debuginfo-32bit-4.7.6_05-43.42.1 xen-libs-debuginfo-4.7.6_05-43.42.1 xen-tools-4.7.6_05-43.42.1 xen-tools-debuginfo-4.7.6_05-43.42.1 xen-tools-domU-4.7.6_05-43.42.1 xen-tools-domU-debuginfo-4.7.6_05-43.42.1
- SUSE Linux Enterprise Server 12-SP2-LTSS (x86_64):
xen-4.7.6_05-43.42.1 xen-debugsource-4.7.6_05-43.42.1 xen-doc-html-4.7.6_05-43.42.1 xen-libs-32bit-4.7.6_05-43.42.1 xen-libs-4.7.6_05-43.42.1 xen-libs-debuginfo-32bit-4.7.6_05-43.42.1 xen-libs-debuginfo-4.7.6_05-43.42.1 xen-tools-4.7.6_05-43.42.1 xen-tools-debuginfo-4.7.6_05-43.42.1 xen-tools-domU-4.7.6_05-43.42.1 xen-tools-domU-debuginfo-4.7.6_05-43.42.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
xen-4.7.6_05-43.42.1 xen-debugsource-4.7.6_05-43.42.1 xen-doc-html-4.7.6_05-43.42.1 xen-libs-32bit-4.7.6_05-43.42.1 xen-libs-4.7.6_05-43.42.1 xen-libs-debuginfo-32bit-4.7.6_05-43.42.1 xen-libs-debuginfo-4.7.6_05-43.42.1 xen-tools-4.7.6_05-43.42.1 xen-tools-debuginfo-4.7.6_05-43.42.1 xen-tools-domU-4.7.6_05-43.42.1 xen-tools-domU-debuginfo-4.7.6_05-43.42.1
- SUSE Enterprise Storage 4 (x86_64):
xen-4.7.6_05-43.42.1 xen-debugsource-4.7.6_05-43.42.1 xen-doc-html-4.7.6_05-43.42.1 xen-libs-32bit-4.7.6_05-43.42.1 xen-libs-4.7.6_05-43.42.1 xen-libs-debuginfo-32bit-4.7.6_05-43.42.1 xen-libs-debuginfo-4.7.6_05-43.42.1 xen-tools-4.7.6_05-43.42.1 xen-tools-debuginfo-4.7.6_05-43.42.1 xen-tools-domU-4.7.6_05-43.42.1 xen-tools-domU-debuginfo-4.7.6_05-43.42.1
References:
https://www.suse.com/security/cve/CVE-2018-15468.html https://www.suse.com/security/cve/CVE-2018-17963.html https://bugzilla.suse.com/1094508 https://bugzilla.suse.com/1103276 https://bugzilla.suse.com/1111014
_______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
|
|
|
|