Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1603-1

Опубликовано: 08 июн. 2018
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes several issues.

These security issues were fixed:

  • CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
  • CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

bsc#1027519

Список пакетов

SUSE Linux Enterprise Server 11 SP4
xen-4.4.4_32-61.29.2
xen-doc-html-4.4.4_32-61.29.2
xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2
xen-libs-4.4.4_32-61.29.2
xen-libs-32bit-4.4.4_32-61.29.2
xen-tools-4.4.4_32-61.29.2
xen-tools-domU-4.4.4_32-61.29.2
SUSE Linux Enterprise Server for SAP Applications 11 SP4
xen-4.4.4_32-61.29.2
xen-doc-html-4.4.4_32-61.29.2
xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2
xen-libs-4.4.4_32-61.29.2
xen-libs-32bit-4.4.4_32-61.29.2
xen-tools-4.4.4_32-61.29.2
xen-tools-domU-4.4.4_32-61.29.2
SUSE Linux Enterprise Software Development Kit 11 SP4
xen-devel-4.4.4_32-61.29.2

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2
SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2

Ссылки
Уязвимость SUSE-SU-2018:1603-1