Oval Definition:oval:org.opensuse.security:def:99411
Revision Date:2021-09-02Version:1
Title: (Important)
Description:

This update for xen fixes the following issues:

Update to Xen 4.13.3 general bug fix release (bsc#1027519).

Security issues fixed:

- CVE-2021-28693: xen/arm: Boot modules are not scrubbed (bsc#1186428) - CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429) - CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433) - CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434) - CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373). - CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376). - CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378). - CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380). - CVE-2021-28700: No memory limit for dom0less domUs (XSA-383)(bsc#1189381).

Other issues fixed:

- Fixed 'Panic on CPU 0: IO-APIC + timer doesn't work!' (bsc#1180491) - Fixed an issue with xencommons, where file format expecations by fillup did not allign (bsc#1185682) - Fixed shell macro expansion in the spec file, so that ExecStart= in xendomains-wait-disks.service is created correctly (bsc#1183877) - Upstream bug fixes (bsc#1027519) - Fixed Xen SLES11SP4 guest hangs on cluster (bsc#1188050). - xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown (bsc#1176189). - Dom0 hangs when pinning CPUs for dom0 with HVM guest (bsc#1179246). - Some long deprecated commands were finally removed in qemu6. Adjust libxl to use supported commands (bsc#1183243). - Update logrotate.conf, move global options into per-file sections to prevent globbering of global state (bsc#1187406). - Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
Family:unixClass:patch
Status:Reference(s):1027519
1176189
1179246
1182279
1182408
1182411
1182412
1182413
1182415
1182416
1182417
1182418
1182419
1182420
1183243
1183877
1185682
1186428
1186429
1186433
1186434
1187406
1188050
1189373
1189376
1189378
1189380
1189381
1189882
CVE-2020-36221
CVE-2020-36222
CVE-2020-36223
CVE-2020-36224
CVE-2020-36225
CVE-2020-36226
CVE-2020-36227
CVE-2020-36228
CVE-2020-36229
CVE-2020-36230
CVE-2021-0089
CVE-2021-27212
CVE-2021-28690
CVE-2021-28692
CVE-2021-28693
CVE-2021-28694
CVE-2021-28695
CVE-2021-28696
CVE-2021-28697
CVE-2021-28698
CVE-2021-28699
CVE-2021-28700
SUSE-SU-2021:0723-1
Platform(s):Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
SUSE Linux Enterprise Server 15 SP1-BCL
Product(s):
Definition Synopsis
  • Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM is installed
  • AND Package Information
  • xen-libs-4.14.2_04-3.9.1 is installed
  • OR xen-tools-domU-4.14.2_04-3.9.1 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Server 15 SP1-BCL is installed
  • AND Package Information
  • libldap-2_4-2-2.4.46-9.48.1 is installed
  • OR libldap-2_4-2-32bit-2.4.46-9.48.1 is installed
  • OR libldap-data-2.4.46-9.48.1 is installed
  • OR openldap2-2.4.46-9.48.1 is installed
  • OR openldap2-back-meta-2.4.46-9.48.1 is installed
  • OR openldap2-back-perl-2.4.46-9.48.1 is installed
  • OR openldap2-client-2.4.46-9.48.1 is installed
  • OR openldap2-devel-2.4.46-9.48.1 is installed
  • OR openldap2-devel-32bit-2.4.46-9.48.1 is installed
  • OR openldap2-devel-static-2.4.46-9.48.1 is installed
  • OR openldap2-ppolicy-check-password-1.2-9.48.1 is installed
  • BACK