File _patchinfo of Package patchinfo.9798

<patchinfo incident="9798">
  <issue tracker="bnc" id="1103279">VUL-0: CVE-2018-15470: xen: oxenstored does not apply quota-maxentity (XSA-272)</issue>
  <issue tracker="bnc" id="1108940">L3: XEN SLE12-SP1 domU hang on SLE12-SP3 HV</issue>
  <issue tracker="bnc" id="1115045">VUL-0:  CVE-2018-19965 : xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279)</issue>
  <issue tracker="bnc" id="1115040">VUL-0:  CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)</issue>
  <issue tracker="bnc" id="1115047">VUL-0:  CVE-2018-19966 : xen: Fix for XSA-240 conflicts with shadow paging (XSA-280)</issue>
  <issue tracker="bnc" id="1103276">VUL-0: CVE-2018-15468: xen: x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS (XSA-269)</issue>
  <issue tracker="bnc" id="1103275">VUL-0: CVE-2018-15469: xen: Use of v2 grant tables may cause crash on ARM (XSA-268)</issue>
  <issue tracker="bnc" id="1091107">VUL-0: CVE-2018-3646: xen: L1 Terminal Fault -VMM (XSA-273)</issue>
  <issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
  <issue tracker="bnc" id="1094508">Kernel oops in fs/dcache.c called by d_materialise_unique()</issue>
  <issue tracker="bnc" id="1105528">L3: xpti=no-dom0 not working as expected</issue>
  <issue tracker="bnc" id="1078292">rpmbuild -ba SPECS/xen.spec with xen-4.9.1_02-3.21.1.src.rpm failed</issue>
  <issue tracker="bnc" id="1114405">VUL-0: CVE-2018-18883: xen: Nested VT-x usable even when disabled (XSA-278)</issue>
  <issue tracker="cve" id="2018-15468"/>
  <issue tracker="cve" id="2018-15469"/>
  <issue tracker="cve" id="2018-18883"/>
  <issue tracker="cve" id="2018-3646"/>
  <issue tracker="cve" id="2018-15470"/>
  <issue tracker="cve" id="2018-19965"/>
  <issue tracker="cve" id="2018-19961"/>
  <issue tracker="cve" id="2018-19962"/>
  <issue tracker="cve" id="2018-19966"/>
  <category>security</category>
  <rating>important</rating>
  <packager>charlesa</packager>
  <description>This update for xen fixes the following issues:

Update to Xen 4.10.2 bug fix release (bsc#1027519).

Security vulnerabilities fixed:

- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
  flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
  privileges, may cause a Denial of Service (DoS) affecting the entire host, or
  may be able to access data it is not supposed to access. (XSA-275)
  (bsc#1115040)
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
  non-canonical addresses are accessed, which may allow a guest to cause Xen to
  crash, resulting in a Denial of Service (DoS) affecting the entire host.
  (XSA-279) (bsc#1115045)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
  conflicted with shadow paging and allowed a guest to cause Xen to crash,
  resulting in a Denial of Service (DoS). (XSA-280) (bsc#1115047)
- CVE-2018-18883: Fixed an issue related to inproper restriction of nested VT-x,
  which allowed a guest to cause Xen to crash, resulting in a Denial of Service
  (DoS). (XSA-278) (bsc#1114405)
- CVE-2018-15468: Fixed incorrect MSR_DEBUGCTL handling, which allowed guests to
  enable Branch Trace Store and may cause a Denial of Service (DoS) of the
  entire host. (XSA-269) (bsc#1103276)
- CVE-2018-15469: Fixed use of v2 grant tables on ARM, which were not properly
  implemented and may cause a Denial of Service (DoS). (XSA-268) (bsc#1103275)
- CVE-2018-15470: Fixed an issue in the logic in oxenstored for handling writes,
  which allowed a guest to write memory unbounded leading to system-wide Denial
  of Service (DoS). (XSA-272) (bsc#1103279)
- CVE-2018-3646: Mitigations for VMM aspects of L1 Terminal Fault (XSA-273)
  (bsc#1091107)

Other bugs fixed:

- Fixed an issue related to a domU hang on SLE12-SP3 HV (bsc#1108940)
- Fixed an issue with xpti=no-dom0 not working as expected (bsc#1105528)
- Fixed a kernel oops related to fs/dcache.c called by d_materialise_unique() (bsc#1094508)
</description>
  <summary>Security update for xen</summary>
</patchinfo>
openSUSE Build Service is sponsored by