SUSE-SU-2018:2410-2

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20182410-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:2410-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:2410-2
Related
Published
2018-10-18T12:49:27Z
Modified
2018-10-18T12:49:27Z
Summary
Security update for xen
Details

This update for xen fixes the following security issues:

  • CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may have allowed unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bsc#1091107, bsc#1027519).
  • Incorrect MSR_DEBUGCTL handling let guests enable BTS allowing a malicious or buggy guest administrator can lock up the entire host (bsc#1103276)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.7.6_04-43.39.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-libs": "4.7.6_04-43.39.1",
            "xen-doc-html": "4.7.6_04-43.39.1",
            "xen-libs-32bit": "4.7.6_04-43.39.1",
            "xen-tools": "4.7.6_04-43.39.1",
            "xen-tools-domU": "4.7.6_04-43.39.1",
            "xen": "4.7.6_04-43.39.1"
        }
    ]
}