Security update for xen
Announcement ID: | SUSE-SU-2020:1609-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has three security fixes can now be installed.
Description:
This update for xen to version 4.12.3 fixes the following issues:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or "CrossTalk" (bsc#1172205).
- Added support for new 64bit libxl memory API (bsc#1167007 and bsc#1157490).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-1609=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-1609=1
Package List:
-
Basesystem Module 15-SP1 (x86_64)
- xen-tools-domU-debuginfo-4.12.3_02-3.18.1
- xen-libs-4.12.3_02-3.18.1
- xen-libs-debuginfo-4.12.3_02-3.18.1
- xen-tools-domU-4.12.3_02-3.18.1
- xen-debugsource-4.12.3_02-3.18.1
-
Server Applications Module 15-SP1 (x86_64)
- xen-tools-4.12.3_02-3.18.1
- xen-devel-4.12.3_02-3.18.1
- xen-4.12.3_02-3.18.1
- xen-tools-debuginfo-4.12.3_02-3.18.1
- xen-debugsource-4.12.3_02-3.18.1