Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1699-1

Опубликовано: 15 июн. 2018
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes several issues.

This feature was added:

  • Added support for qemu monitor command

These security issues were fixed:

  • CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
  • CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

  • bsc#1086039 - Dom0 does not represent DomU cpu flags

Список пакетов

SUSE Enterprise Storage 4
xen-4.7.5_04-43.33.1
xen-doc-html-4.7.5_04-43.33.1
xen-libs-4.7.5_04-43.33.1
xen-libs-32bit-4.7.5_04-43.33.1
xen-tools-4.7.5_04-43.33.1
xen-tools-domU-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-LTSS
xen-4.7.5_04-43.33.1
xen-doc-html-4.7.5_04-43.33.1
xen-libs-4.7.5_04-43.33.1
xen-libs-32bit-4.7.5_04-43.33.1
xen-tools-4.7.5_04-43.33.1
xen-tools-domU-4.7.5_04-43.33.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
xen-4.7.5_04-43.33.1
xen-doc-html-4.7.5_04-43.33.1
xen-libs-4.7.5_04-43.33.1
xen-libs-32bit-4.7.5_04-43.33.1
xen-tools-4.7.5_04-43.33.1
xen-tools-domU-4.7.5_04-43.33.1
SUSE OpenStack Cloud 7
xen-4.7.5_04-43.33.1
xen-doc-html-4.7.5_04-43.33.1
xen-libs-4.7.5_04-43.33.1
xen-libs-32bit-4.7.5_04-43.33.1
xen-tools-4.7.5_04-43.33.1
xen-tools-domU-4.7.5_04-43.33.1

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1

Ссылки
Уязвимость SUSE-SU-2018:1699-1