openSUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2018:2434-1
Rating:             important
References:         #1027519 #1091107 #1103276 
Cross-References:   CVE-2018-3646
Affected Products:
                    openSUSE Leap 42.3
______________________________________________________________________________

   An update that solves one vulnerability and has two fixes
   is now available.

Description:

   This update for xen fixes the following security issues:

   - CVE-2018-3646: Systems with microprocessors utilizing speculative
     execution and address translations may have allowed unauthorized
     disclosure of information residing in the L1 data cache to an attacker
     with local user access with guest OS privilege via a terminal page fault
     and a side-channel analysis (bsc#1091107, bsc#1027519).
   - Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a
     malicious or buggy guest administrator can lock up the entire host
     (bsc#1103276)

   This update was imported from the SUSE:SLE-12-SP3:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 42.3:

      zypper in -t patch openSUSE-2018-910=1



Package List:

   - openSUSE Leap 42.3 (x86_64):

      xen-4.9.2_10-28.1
      xen-debugsource-4.9.2_10-28.1
      xen-devel-4.9.2_10-28.1
      xen-doc-html-4.9.2_10-28.1
      xen-libs-4.9.2_10-28.1
      xen-libs-debuginfo-4.9.2_10-28.1
      xen-tools-4.9.2_10-28.1
      xen-tools-debuginfo-4.9.2_10-28.1
      xen-tools-domU-4.9.2_10-28.1
      xen-tools-domU-debuginfo-4.9.2_10-28.1


References:

   https://www.suse.com/security/cve/CVE-2018-3646.html
   https://bugzilla.suse.com/1027519
   https://bugzilla.suse.com/1091107
   https://bugzilla.suse.com/1103276

-- 

openSUSE: 2018:2434-1: important: xen

August 19, 2018
An update that solves one vulnerability and has two fixes is now available.

Description

This update for xen fixes the following security issues: - CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bsc#1091107, bsc#1027519). - Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or buggy guest administrator can lock up the entire host (bsc#1103276) This update was imported from the SUSE:SLE-12-SP3:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 42.3: zypper in -t patch openSUSE-2018-910=1


Package List

- openSUSE Leap 42.3 (x86_64): xen-4.9.2_10-28.1 xen-debugsource-4.9.2_10-28.1 xen-devel-4.9.2_10-28.1 xen-doc-html-4.9.2_10-28.1 xen-libs-4.9.2_10-28.1 xen-libs-debuginfo-4.9.2_10-28.1 xen-tools-4.9.2_10-28.1 xen-tools-debuginfo-4.9.2_10-28.1 xen-tools-domU-4.9.2_10-28.1 xen-tools-domU-debuginfo-4.9.2_10-28.1


References

https://www.suse.com/security/cve/CVE-2018-3646.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1091107 https://bugzilla.suse.com/1103276--


Severity
Announcement ID: openSUSE-SU-2018:2434-1
Rating: important
Affected Products: openSUSE Leap 42.3 le.

Related News