<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1419-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-05-20T15:24:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-05-20T15:24:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-05-20T15:24:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

  The included README has details about the impact of this change (bsc#1120095)

This update was imported from the SUSE:SLE-12-SP3:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1419-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.9.4_04-40.1">
      <FullProductName ProductID="xen-4.9.4_04-40.1">xen-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.9.4_04-40.1">
      <FullProductName ProductID="xen-devel-4.9.4_04-40.1">xen-devel-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.9.4_04-40.1">
      <FullProductName ProductID="xen-doc-html-4.9.4_04-40.1">xen-doc-html-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.9.4_04-40.1">
      <FullProductName ProductID="xen-libs-4.9.4_04-40.1">xen-libs-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.9.4_04-40.1">
      <FullProductName ProductID="xen-libs-32bit-4.9.4_04-40.1">xen-libs-32bit-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.9.4_04-40.1">
      <FullProductName ProductID="xen-tools-4.9.4_04-40.1">xen-tools-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.9.4_04-40.1">
      <FullProductName ProductID="xen-tools-domU-4.9.4_04-40.1">xen-tools-domU-4.9.4_04-40.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-4.9.4_04-40.1">xen-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1">xen-devel-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1">xen-doc-html-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1">xen-libs-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1">xen-libs-32bit-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1">xen-tools-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.9.4_04-40.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1">xen-tools-domU-4.9.4_04-40.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135522</URL>
        <Description>SUSE Bug 1135522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12127.html</URL>
        <Description>CVE-2018-12127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12130.html</URL>
        <Description>CVE-2018-12130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.</Note>
    </Notes>
    <CVE>CVE-2018-20815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20815.html</URL>
        <Description>CVE-2018-20815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118900</URL>
        <Description>SUSE Bug 1118900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130675</URL>
        <Description>SUSE Bug 1130675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130680</URL>
        <Description>SUSE Bug 1130680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2019-11091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:xen-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-devel-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-doc-html-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-32bit-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-libs-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-4.9.4_04-40.1</ProductID>
        <ProductID>openSUSE Leap 42.3:xen-tools-domU-4.9.4_04-40.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11091.html</URL>
        <Description>CVE-2019-11091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133319</URL>
        <Description>SUSE Bug 1133319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135394</URL>
        <Description>SUSE Bug 1135394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
