SUSE-SU-2018:2409-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20182409-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:2409-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:2409-1
Related
Published
2018-08-17T11:42:30Z
Modified
2018-08-17T11:42:30Z
Summary
Security update for xen
Details

This update for xen fixes the following security issues:

  • CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bsc#1091107, bsc#1027519).
  • Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or buggy guest administrator can lock up the entire host (bsc#1103276)
References

Affected packages

SUSE:Linux Enterprise Module for Basesystem 15 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.1_08-3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-libs": "4.10.1_08-3.6.1",
            "xen-tools-domU": "4.10.1_08-3.6.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.1_08-3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-tools": "4.10.1_08-3.6.1",
            "xen-devel": "4.10.1_08-3.6.1",
            "xen": "4.10.1_08-3.6.1"
        }
    ]
}