Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-RU-2019:2715-1

Опубликовано: 18 окт. 2019
Источник: suse-cvrf

Описание

Recommended update for xen

This update for xen to version 4.12.1 fixes the following issues:

  • Fixed an issue which made Xen crash on AMD ROME based machines (bsc#1135799).
  • Xenpvnetboot is now ported correctly to Python 3 (bsc#1138563).
  • Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime (bsc#1120095). The included README has details about the impact of this change
  • Fixed an issue where the speculative mitigation facilities reported wrong status (bsc#1143563).
  • Fixed an issue where Xen could not connect socket to /var/run/libvirt/libvirt-sock (bsc#1137471).
  • Fixed an HPS bug which did not allow to install Windows Server 2016 with 2 CPUs setting or above (bsc#1137717).
  • Fixed a segmentation fault in Libvrtd during live migration to a VM (bsc#1145774).
  • LTO is now disabled (bsc#1133296).
  • Fixed an issue where Xen could not pre-allocate 1 shadow page (bsc#1145240).

Список пакетов

Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-EC2-HPC-HVM-BYOS
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-EC2-HVM-BYOS
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-SAP-EC2-HVM
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-SAP-EC2-HVM-BYOS
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-SAPCAL-EC2-HVM
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP1
xen-libs-4.12.1_02-3.3.1
xen-tools-domU-4.12.1_02-3.3.1
SUSE Linux Enterprise Module for Server Applications 15 SP1
xen-4.12.1_02-3.3.1
xen-devel-4.12.1_02-3.3.1
xen-tools-4.12.1_02-3.3.1

Описание

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки

Описание

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки

Описание

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки

Описание

An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки

Описание

An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation.


Затронутые продукты
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM:xen-tools-domU-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-libs-4.12.1_02-3.3.1
Image SLES15-SP1-CHOST-BYOS-EC2:xen-tools-domU-4.12.1_02-3.3.1

Ссылки
Уязвимость SUSE-RU-2019:2715-1