Security update for xen

This update for xen fixes the following issues:

Update to Xen 4.10.2 bug fix release (bsc#1027519).

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
privileges, may cause a Denial of Service (DoS) affecting the entire host, or
may be able to access data it is not supposed to access. (XSA-275)
(bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
non-canonical addresses are accessed, which may allow a guest to cause Xen to
crash, resulting in a Denial of Service (DoS) affecting the entire host.
(XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
conflicted with shadow paging and allowed a guest to cause Xen to crash,
resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-18883: Fixed an issue related to inproper restriction of nested VT-x,
which allowed a guest to cause Xen to crash, resulting in a Denial of Service
(DoS). (XSA-278) (bsc#1114405)
- CVE-2018-15468: Fixed incorrect MSR_DEBUGCTL handling, which allowed guests to
enable Branch Trace Store and may cause a Denial of Service (DoS) of the
entire host. (XSA-269) (bsc#1103276)
- CVE-2018-15469: Fixed use of v2 grant tables on ARM, which were not properly
implemented and may cause a Denial of Service (DoS). (XSA-268) (bsc#1103275)
- CVE-2018-15470: Fixed an issue in the logic in oxenstored for handling writes,
which allowed a guest to write memory unbounded leading to system-wide Denial
of Service (DoS). (XSA-272) (bsc#1103279)
- CVE-2018-3646: Mitigations for VMM aspects of L1 Terminal Fault (XSA-273)
(bsc#1091107)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed a kernel oops related to fs/dcache.c called by d_materialise_unique() (bsc#1094508)

This update was imported from the SUSE:SLE-15:Update update project.

Fixed bugs
bnc#1103279
VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272)
bnc#1108940
L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV
bnc#1115045
VUL-0: CVE-2018-19965 : xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279)
bnc#1115040
VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)
bnc#1115047
VUL-0: CVE-2018-19966 : xen: Fix for XSA-240 conflicts with shadow paging (XSA-280)
bnc#1103276
VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269)
bnc#1103275
VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268)
bnc#1091107
VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273)
bnc#1027519
Xen: Missing upstream bug fixes
bnc#1094508
Kernel oops in fs/dcache.c called by d_materialise_unique()
bnc#1105528
L3: xpti=no-dom0 not working as expected
bnc#1078292
rpmbuild -ba SPECS/xen.spec with xen-4.9.1_02-3.21.1.src.rpm failed
bnc#1114405
VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278)
Selected Binaries
openSUSE Build Service is sponsored by