Описание
Security update for xen
This update for xen fixes the following issues:
Security issues fixed:
-
CVE-2018-3639: Spectre V4 – Speculative Store Bypass aka 'Memory Disambiguation' (bsc#1092631)
This feature can be controlled by the 'ssbd=on/off' commandline flag for the XEN hypervisor.
-
CVE-2018-10982: x86 vHPET interrupt injection errors (XSA-261 bsc#1090822)
-
CVE-2018-10981: qemu may drive Xen into unbounded loop (XSA-262 bsc#1090823)
Other bugfixes:
- Upstream patches from Jan (bsc#1027519)
- additional fixes related to Page Table Isolation (XPTI). (bsc#1074562 XSA-254)
- qemu-system-i386 cannot handle more than 4 HW NICs (bsc#1090296)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP3
Ссылки
- Link for SUSE-SU-2018:1456-1
- E-Mail link for SUSE-SU-2018:1456-1
- SUSE Security Ratings
- SUSE Bug 1027519
- SUSE Bug 1074562
- SUSE Bug 1090296
- SUSE Bug 1090822
- SUSE Bug 1090823
- SUSE Bug 1092631
- SUSE CVE CVE-2018-10981 page
- SUSE CVE CVE-2018-10982 page
- SUSE CVE CVE-2018-3639 page
Описание
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
Затронутые продукты
Ссылки
- CVE-2018-10981
- SUSE Bug 1090823
- SUSE Bug 1178658
Описание
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
Затронутые продукты
Ссылки
- CVE-2018-10982
- SUSE Bug 1090822
- SUSE Bug 1178658
Описание
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Затронутые продукты
Ссылки
- CVE-2018-3639
- SUSE Bug 1074701
- SUSE Bug 1085235
- SUSE Bug 1085308
- SUSE Bug 1087078
- SUSE Bug 1087082
- SUSE Bug 1092631
- SUSE Bug 1092885
- SUSE Bug 1094912
- SUSE Bug 1098813
- SUSE Bug 1100394
- SUSE Bug 1102640
- SUSE Bug 1105412
- SUSE Bug 1111963
- SUSE Bug 1172781
- SUSE Bug 1172782
- SUSE Bug 1172783
- SUSE Bug 1173489
- SUSE Bug 1178658
- SUSE Bug 1201877