Lucene search

K
suseSuseOPENSUSE-SU-2021:2923-1
HistorySep 02, 2021 - 12:00 a.m.

Security update for xen (important)

2021-09-0200:00:00
lists.opensuse.org
17

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

An update that solves 11 vulnerabilities and has 7 fixes is
now available.

Description:

This update for xen fixes the following issues:

Update to Xen 4.13.3 general bug fix release (bsc#1027519).

Security issues fixed:

  • CVE-2021-28693: xen/arm: Boot modules are not scrubbed (bsc#1186428)
  • CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection /
    handling (bsc#1186429)
  • CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
  • CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after
    S3 (bsc#1186434)
  • CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues
    on x86 (XSA-378)(bsc#1189373).
  • CVE-2021-28697: grant table v2 status pages may remain accessible after
    de-allocation (XSA-379)(bsc#1189376).
  • CVE-2021-28698: long running loops in grant table handling
    (XSA-380)(bsc#1189378).
  • CVE-2021-28699: inadequate grant-v2 status frames array bounds check
    (XSA-382)(bsc#1189380).
  • CVE-2021-28700: No memory limit for dom0less domUs
    (XSA-383)(bsc#1189381).

Other issues fixed:

  • Fixed โ€œPanic on CPU 0: IO-APIC + timer doesnโ€™t work!โ€ (bsc#1180491)
  • Fixed an issue with xencommons, where file format expecations by fillup
    did not allign (bsc#1185682)
  • Fixed shell macro expansion in the spec file, so that ExecStart= in
    xendomains-wait-disks.service is created correctly (bsc#1183877)
  • Upstream bug fixes (bsc#1027519)
  • Fixed Xen SLES11SP4 guest hangs on cluster (bsc#1188050).
  • xl monitoring process exits during xl save -p|-c keep the monitoring
    process running to cleanup the domU during shutdown (bsc#1176189).
  • Dom0 hangs when pinning CPUs for dom0 with HVM guest (bsc#1179246).
  • Some long deprecated commands were finally removed in qemu6. Adjust
    libxl to use supported commands (bsc#1183243).
  • Update logrotate.conf, move global options into per-file sections to
    prevent globbering of global state (bsc#1187406).
  • Prevent superpage allocation in the LAPIC and ACPI_INFO range
    (bsc#1189882).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or โ€œzypper patchโ€.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3:

    zypper in -t patch openSUSE-SLE-15.3-2021-2923=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.3aarch64<ย - openSUSE Leap 15.3 (aarch64 x86_64):- openSUSE Leap 15.3 (aarch64 x86_64):.aarch64.rpm
openSUSE Leap15.3x86_64<ย - openSUSE Leap 15.3 (aarch64 x86_64):- openSUSE Leap 15.3 (aarch64 x86_64):.x86_64.rpm
openSUSE Leap15.3noarch<ย - openSUSE Leap 15.3 (noarch):- openSUSE Leap 15.3 (noarch):.noarch.rpm
openSUSE Leap15.3x86_64<ย - openSUSE Leap 15.3 (x86_64):- openSUSE Leap 15.3 (x86_64):.x86_64.rpm

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C