Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:2557-1

Опубликовано: 27 июл. 2022
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2022-21123, CVE-2022-21125, CVE-2022-21166: Fixed MMIO stale data vulnerabilities on x86 (XSA-404) (bsc#1200549).
  • CVE-2022-33745: Fixed insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) (bsc#1201394).
  • CVE-2022-23816, CVE-2022-23825, CVE-2022-29900: Fixed RETBLEED vulnerability, arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469).

Список пакетов

Image SLES12-SP5-EC2-BYOS
xen-libs-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand
xen-libs-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-On-Demand
xen-libs-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-SAP-BYOS
xen-libs-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-SAP-On-Demand
xen-libs-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
SUSE Linux Enterprise Server 12 SP5
xen-4.12.4_26-3.74.1
xen-doc-html-4.12.4_26-3.74.1
xen-libs-4.12.4_26-3.74.1
xen-libs-32bit-4.12.4_26-3.74.1
xen-tools-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
xen-4.12.4_26-3.74.1
xen-doc-html-4.12.4_26-3.74.1
xen-libs-4.12.4_26-3.74.1
xen-libs-32bit-4.12.4_26-3.74.1
xen-tools-4.12.4_26-3.74.1
xen-tools-domU-4.12.4_26-3.74.1
SUSE Linux Enterprise Software Development Kit 12 SP5
xen-devel-4.12.4_26-3.74.1

Описание

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки

Описание

insufficient TLB flush for x86 PV guests in shadow mode For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. To address XSA-401, code was moved inside a function in Xen. This code movement missed a variable changing meaning / value between old and new code positions. The now wrong use of the variable did lead to a wrong TLB flush condition, omitting flushes where such are necessary.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_26-3.74.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_26-3.74.1

Ссылки
Уязвимость SUSE-SU-2022:2557-1