Oval Definition:oval:org.opensuse.security:def:57269
Revision Date:2020-12-01Version:1
Title:Security update for Xen
Description:



XEN has been updated to fix various bugs and security issues:

*

CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the Xen AMD IOMMU code by default choose to use a single interrupt remapping table for the whole system. This sharing implied that any guest with a passed through PCI device that is bus mastering capable can inject interrupts into other guests, including domain 0. This has been disabled for AMD chipsets not capable of it.

*

CVE-2012-6075: qemu: The e1000 had overflows under some conditions, potentially corrupting memory.

*

CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT (debug build only)

*

CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation flaw was fixed.

Also the following bugs have been fixed:

* bnc#805094 - xen hot plug attach/detach fails * bnc#802690 - domain locking can prevent a live migration from completing * bnc#797014 - no way to control live migrations o fix logic error in stdiostream_progress o restore logging in xc_save o add options to control migration tunables * bnc#806736: enabling xentrace crashes hypervisor * Upstream patches from Jan 26287-sched-credit-pick-idle.patch 26501-VMX-simplify-CR0-update.patch 26502-VMX-disable-SMEP-when-not-paging.patch 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) * bnc#798188 - Add $network to xend initscript dependencies * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update Fixed with update to Xen version 4.1.4 * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN kernel * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch 26427-x86-AMD-enable-WC+.patch * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch 26333-x86-get_page_type-assert.patch (Replaces CVE-2013-0154-xsa37.patch) 26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch * Update to Xen 4.1.4 c/s 23432 * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid spurious build failures * Upstream patches from Jan 26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch 26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch 26229-gnttab-version-switch.patch (Replaces CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch (Replaces CVE-2012-5511-xsa27.patch) 26231-memory-exchange-checks.patch (Replaces CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch (Replaces CVE-2012-5515-xsa31.patch) 26235-IOMMU-ATS-max-queue-depth.patch 26272-x86-EFI-makefile-cflags-filter.patch 26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI Makefile to do additional filtering.

Security Issue references:

* CVE-2013-0153 * CVE-2012-6075 * CVE-2012-5634

Family:unixClass:patch
Status:Reference(s):1016168
1016169
1017420
1047666
1069708
1071471
1088268
1090036
1096723
1097410
1102682
1105323
1106191
1106873
1107832
1109663
1109847
1110233
1111331
1119069
1119105
1127080
1127532
1127533
1129231
1138459
793927
794316
797014
797031
797523
798188
799694
800156
800275
802690
805094
806736
905032
906574
924960
933288
933878
936227
942865
949942
957566
957567
957598
957600
960837
971741
972127
CVE-2010-0624
CVE-2012-5634
CVE-2012-6075
CVE-2013-0153
CVE-2013-7459
CVE-2014-0573
CVE-2014-0574
CVE-2014-0576
CVE-2014-0577
CVE-2014-0581
CVE-2014-0582
CVE-2014-0583
CVE-2014-0584
CVE-2014-0585
CVE-2014-0586
CVE-2014-0588
CVE-2014-0589
CVE-2014-0590
CVE-2014-8437
CVE-2014-8438
CVE-2014-8440
CVE-2014-8441
CVE-2014-8442
CVE-2014-8964
CVE-2014-9112
CVE-2014-9749
CVE-2015-2325
CVE-2015-2327
CVE-2015-2328
CVE-2015-3210
CVE-2015-3217
CVE-2015-5073
CVE-2015-8380
CVE-2015-8381
CVE-2015-8382
CVE-2015-8383
CVE-2015-8384
CVE-2015-8385
CVE-2015-8386
CVE-2015-8387
CVE-2015-8388
CVE-2015-8389
CVE-2015-8390
CVE-2015-8391
CVE-2015-8392
CVE-2015-8393
CVE-2015-8394
CVE-2015-8395
CVE-2016-10002
CVE-2016-10003
CVE-2016-1283
CVE-2016-3191
CVE-2017-0861
CVE-2017-15868
CVE-2017-16939
CVE-2018-0495
CVE-2018-1000026
CVE-2018-1000199
CVE-2018-1000802
CVE-2018-10902
CVE-2018-10938
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2018-12384
CVE-2018-12404
CVE-2018-12405
CVE-2018-14633
CVE-2018-14647
CVE-2018-17182
CVE-2018-17466
CVE-2018-18492
CVE-2018-18493
CVE-2018-18494
CVE-2018-18498
CVE-2018-5390
CVE-2019-10160
CVE-2019-11091
CVE-2019-1559
CVE-2019-5737
CVE-2019-5739
SUSE-SU-2015:0239-1
SUSE-SU-2016:2971-1
SUSE-SU-2017:0128-1
SUSE-SU-2017:2350-1
SUSE-SU-2018:0274-1
SUSE-SU-2018:1269-1
SUSE-SU-2018:4236-1
SUSE-SU-2019:0736-1
SUSE-SU-2019:0818-1
SUSE-SU-2019:1954-1
SUSE-SU-2019:2053-1
Platform(s):openSUSE Leap 15.0
openSUSE Leap 15.1
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 12 SP1-LTSS
SUSE Linux Enterprise Server 12 SP2
SUSE Linux Enterprise Server 12 SP2-BCL
SUSE Linux Enterprise Server 12 SP2-ESPOS
SUSE Linux Enterprise Server 12 SP2-LTSS
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server 12 SP3-BCL
SUSE Linux Enterprise Server 12 SP3-LTSS
SUSE Linux Enterprise Server 12 SP3-TERADATA
SUSE Linux Enterprise Server 12 SP4
SUSE OpenStack Cloud 7
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
Product(s):
Definition Synopsis
  • openSUSE Leap 15.0 is installed
  • AND Package Information
  • glib2-lang-2.54.3-lp150.2 is installed
  • OR glib2-tools-2.54.3-lp150.2 is installed
  • OR libgio-2_0-0-2.54.3-lp150.2 is installed
  • OR libglib-2_0-0-2.54.3-lp150.2 is installed
  • OR libglib-2_0-0-32bit-2.54.3-lp150.2 is installed
  • OR libgmodule-2_0-0-2.54.3-lp150.2 is installed
  • OR libgobject-2_0-0-2.54.3-lp150.2 is installed
  • OR libgthread-2_0-0-2.54.3-lp150.2 is installed
  • Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • libnetpbm-devel-10.80.1-lp151.4.3 is installed
  • OR libnetpbm11-10.80.1-lp151.4.3 is installed
  • OR libnetpbm11-32bit-10.80.1-lp151.4.3 is installed
  • OR netpbm-10.80.1-lp151.4.3 is installed
  • OR netpbm-vulnerable-10.80.1-lp151.4.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP2 is installed
  • AND Package Information
  • xen-4.1.4_02-0.5 is installed
  • OR xen-doc-html-4.1.4_02-0.5 is installed
  • OR xen-doc-pdf-4.1.4_02-0.5 is installed
  • OR xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5 is installed
  • OR xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5 is installed
  • OR xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5 is installed
  • OR xen-libs-4.1.4_02-0.5 is installed
  • OR xen-libs-32bit-4.1.4_02-0.5 is installed
  • OR xen-tools-4.1.4_02-0.5 is installed
  • OR xen-tools-domU-4.1.4_02-0.5 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP3 is installed
  • AND Package Information
  • flash-player-11.2.202.418-0.3 is installed
  • OR flash-player-gnome-11.2.202.418-0.3 is installed
  • OR flash-player-kde4-11.2.202.418-0.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP1-LTSS is installed
  • AND Package Information
  • kgraft-patch-3_12_69-60_64_29-default-11-2 is installed
  • OR kgraft-patch-3_12_69-60_64_29-xen-11-2 is installed
  • OR kgraft-patch-SLE12-SP1_Update_12-11-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2 is installed
  • AND Package Information
  • cpio-2.11-29 is installed
  • OR cpio-lang-2.11-29 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-BCL is installed
  • AND ucode-intel-20180703-13.25 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-ESPOS is installed
  • AND shadow-4.2.1-27.9 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP2-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_74-92_38-default-12-2 is installed
  • OR kgraft-patch-SLE12-SP2_Update_13-12-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3 is installed
  • AND Package Information
  • automake-1.13.4-6 is installed
  • OR m4-1.4.16-15 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-BCL is installed
  • AND Package Information
  • glibc-2.22-62.22 is installed
  • OR glibc-32bit-2.22-62.22 is installed
  • OR glibc-devel-2.22-62.22 is installed
  • OR glibc-devel-32bit-2.22-62.22 is installed
  • OR glibc-html-2.22-62.22 is installed
  • OR glibc-i18ndata-2.22-62.22 is installed
  • OR glibc-info-2.22-62.22 is installed
  • OR glibc-locale-2.22-62.22 is installed
  • OR glibc-locale-32bit-2.22-62.22 is installed
  • OR glibc-profile-2.22-62.22 is installed
  • OR glibc-profile-32bit-2.22-62.22 is installed
  • OR nscd-2.22-62.22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-LTSS is installed
  • AND Package Information
  • kgraft-patch-4_4_180-94_97-default-3-2 is installed
  • OR kgraft-patch-SLE12-SP3_Update_26-3-2 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP3-TERADATA is installed
  • AND Package Information
  • cups-1.7.5-20.17 is installed
  • OR cups-client-1.7.5-20.17 is installed
  • OR cups-libs-1.7.5-20.17 is installed
  • OR cups-libs-32bit-1.7.5-20.17 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 12 SP4 is installed
  • AND Package Information
  • strongswan-5.1.3-26.13 is installed
  • OR strongswan-doc-5.1.3-26.13 is installed
  • OR strongswan-hmac-5.1.3-26.13 is installed
  • OR strongswan-ipsec-5.1.3-26.13 is installed
  • OR strongswan-libs0-5.1.3-26.13 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 7 is installed
  • AND python-pycrypto-2.6.1-10.3 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud 8 is installed
  • AND git-2.12.3-27.17 is installed
  • Definition Synopsis
  • SUSE OpenStack Cloud Crowbar 8 is installed
  • AND Package Information
  • libpolkit0-0.113-5.18 is installed
  • OR polkit-0.113-5.18 is installed
  • OR typelib-1_0-Polkit-1_0-0.113-5.18 is installed
  • BACK