Security update for xen
Announcement ID: | SUSE-SU-2018:2056-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has two security fixes can now be installed.
Description:
This update for xen fixes the following issues:
Security issues fixed:
- CVE-2018-12617: Fix integer overflow that causes segmentation fault in qmp_guest_file_read() with g_malloc() (bsc#1098744).
- CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
- CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
- CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
- CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).
Bug fixes:
- bsc#1079730: Fix failed "write" lock.
- bsc#1027519: Add upstream patches from January.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE OpenStack Cloud 7
zypper in -t patch SUSE-OpenStack-Cloud-7-2018-2056=1
-
Public Cloud Module 12
zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2018-2056=1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2
zypper in -t patch SUSE-SLE-POS-12-SP2-CLIENT-2018-2056=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SAP-12-SP1-2018-2056=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2
zypper in -t patch SUSE-SLE-SAP-12-SP2-2018-2056=1
-
SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2018-2056=1
-
SUSE Linux Enterprise Server 12 SP2 LTSS 12-SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2018-2056=1
-
SUSE Linux Enterprise Server 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2056=1
-
SUSE Linux Enterprise High Performance Computing 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2056=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2018-2056=1
-
SUSE Enterprise Storage 4
zypper in -t patch SUSE-Storage-4-2018-2056=1
Package List:
-
SUSE OpenStack Cloud 7 (x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
Public Cloud Module 12 (noarch)
- perl-File-Touch-0.11-3.2.2
-
Public Cloud Module 12 (aarch64 ppc64le s390x x86_64)
- smt-ha-3.0.37-52.23.6
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2 (x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (ppc64le x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (noarch)
- yast2-smt-3.0.14-10.6.2
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (ppc64le x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (ppc64le s390x x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server 12 SP1 LTSS 12-SP1 (noarch)
- yast2-smt-3.0.14-10.6.2
-
SUSE Linux Enterprise Server 12 SP2 LTSS 12-SP2 (ppc64le s390x x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server 12 SP3 (aarch64 ppc64le s390x x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise High Performance Computing 12 SP3 (aarch64 x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Linux Enterprise Server for SAP Applications 12 SP3 (ppc64le x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
-
SUSE Enterprise Storage 4 (x86_64)
- res-signingkeys-3.0.37-52.23.6
- smt-debuginfo-3.0.37-52.23.6
- smt-debugsource-3.0.37-52.23.6
- smt-3.0.37-52.23.6
- smt-support-3.0.37-52.23.6
References:
- https://www.suse.com/security/cve/CVE-2018-11806.html
- https://www.suse.com/security/cve/CVE-2018-12617.html
- https://www.suse.com/security/cve/CVE-2018-12891.html
- https://www.suse.com/security/cve/CVE-2018-12893.html
- https://www.suse.com/security/cve/CVE-2018-3665.html
- https://bugzilla.suse.com/show_bug.cgi?id=1027519
- https://bugzilla.suse.com/show_bug.cgi?id=1079730
- https://bugzilla.suse.com/show_bug.cgi?id=1095242
- https://bugzilla.suse.com/show_bug.cgi?id=1096224
- https://bugzilla.suse.com/show_bug.cgi?id=1097521
- https://bugzilla.suse.com/show_bug.cgi?id=1097522
- https://bugzilla.suse.com/show_bug.cgi?id=1098744