Описание
Recommended update for xen
This update for xen to version 4.12.1 fixes the following issues:
- Fixed an issue which made Xen crash on AMD ROME based machines (bsc#1135799).
- Xenpvnetboot is now ported correctly to Python 3 (bsc#1138563).
- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime (bsc#1120095). The included README has details about the impact of this change
- Fixed an issue where the speculative mitigation facilities reported wrong status (bsc#1143563).
- Fixed an issue where Xen could not connect socket to /var/run/libvirt/libvirt-sock (bsc#1137471).
- Fixed an HPS bug which did not allow to install Windows Server 2016 with 2 CPUs setting or above (bsc#1137717).
- Fixed a segmentation fault in Libvrtd during live migration to a VM (bsc#1145774).
- LTO is now disabled (bsc#1133296).
- Fixed an issue where Xen could not pre-allocate 1 shadow page (bsc#1145240).
Список пакетов
Image SLES15-SP1-CAP-Deployment-BYOS-EC2-HVM
Image SLES15-SP1-CHOST-BYOS-EC2
Image SLES15-SP1-EC2-HPC-HVM-BYOS
Image SLES15-SP1-EC2-HVM-BYOS
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Proxy
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server
Image SLES15-SP1-SAP-EC2-HVM
Image SLES15-SP1-SAP-EC2-HVM-BYOS
Image SLES15-SP1-SAPCAL-EC2-HVM
SUSE Linux Enterprise Module for Basesystem 15 SP1
SUSE Linux Enterprise Module for Server Applications 15 SP1
Ссылки
- Link for SUSE-RU-2019:2715-1
- E-Mail link for SUSE-RU-2019:2715-1
- SUSE Security Ratings
- SUSE Bug 1027519
- SUSE Bug 1111331
- SUSE Bug 1120095
- SUSE Bug 1133296
- SUSE Bug 1135799
- SUSE Bug 1137471
- SUSE Bug 1137717
- SUSE Bug 1138294
- SUSE Bug 1138563
- SUSE Bug 1143563
- SUSE Bug 1145240
- SUSE Bug 1145774
- SUSE CVE CVE-2018-12126 page
- SUSE CVE CVE-2018-12127 page
- SUSE CVE CVE-2018-12130 page
- SUSE CVE CVE-2019-11091 page
- SUSE CVE CVE-2019-17349 page
Описание
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12126
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1135524
- SUSE Bug 1137916
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1149725
- SUSE Bug 1149726
- SUSE Bug 1149729
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12127
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2018-12130
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1135409
- SUSE Bug 1137916
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Затронутые продукты
Ссылки
- CVE-2019-11091
- SUSE Bug 1103186
- SUSE Bug 1111331
- SUSE Bug 1132686
- SUSE Bug 1133319
- SUSE Bug 1135394
- SUSE Bug 1138043
- SUSE Bug 1138534
- SUSE Bug 1141977
- SUSE Bug 1178658
- SUSE Bug 1201877
Описание
An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.
Затронутые продукты
Ссылки
- CVE-2019-17349
- SUSE Bug 1138294
Описание
An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation.
Затронутые продукты
Ссылки
- CVE-2019-17350
- SUSE Bug 1138294