Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1699-2

Опубликовано: 18 окт. 2018
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes several issues.

This feature was added:

  • Added support for qemu monitor command

These security issues were fixed:

  • CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
  • CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

  • bsc#1086039 - Dom0 does not represent DomU cpu flags

Список пакетов

SUSE Linux Enterprise Server 12 SP2-BCL
xen-4.7.5_04-43.33.1
xen-doc-html-4.7.5_04-43.33.1
xen-libs-4.7.5_04-43.33.1
xen-libs-32bit-4.7.5_04-43.33.1
xen-tools-4.7.5_04-43.33.1
xen-tools-domU-4.7.5_04-43.33.1

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1

Ссылки

Описание

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1
SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1

Ссылки
Уязвимость SUSE-SU-2018:1699-2