<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:2192-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-12-07T11:06:08Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-12-07T11:06:08Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-12-07T11:06:08Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) 

This update was imported from the SUSE:SLE-15-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-2192</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:2192-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177409</URL>
      <Description>SUSE Bug 1177409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177412</URL>
      <Description>SUSE Bug 1177412</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177413</URL>
      <Description>SUSE Bug 1177413</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1177414</URL>
      <Description>SUSE Bug 1177414</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178591</URL>
      <Description>SUSE Bug 1178591</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178963</URL>
      <Description>SUSE Bug 1178963</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27670/</URL>
      <Description>SUSE CVE CVE-2020-27670 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27671/</URL>
      <Description>SUSE CVE CVE-2020-27671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27672/</URL>
      <Description>SUSE CVE CVE-2020-27672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27674/</URL>
      <Description>SUSE CVE CVE-2020-27674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-28368/</URL>
      <Description>SUSE CVE CVE-2020-28368 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-4.12.4_04-lp151.2.33.1">xen-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-devel-4.12.4_04-lp151.2.33.1">xen-devel-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-doc-html-4.12.4_04-lp151.2.33.1">xen-doc-html-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-libs-4.12.4_04-lp151.2.33.1">xen-libs-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-libs-32bit-4.12.4_04-lp151.2.33.1">xen-libs-32bit-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-tools-4.12.4_04-lp151.2.33.1">xen-tools-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.12.4_04-lp151.2.33.1">
      <FullProductName ProductID="xen-tools-domU-4.12.4_04-lp151.2.33.1">xen-tools-domU-4.12.4_04-lp151.2.33.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1">xen-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1">xen-devel-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1">xen-doc-html-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1">xen-libs-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1">xen-libs-32bit-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1">xen-tools-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_04-lp151.2.33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1">xen-tools-domU-4.12.4_04-lp151.2.33.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.</Note>
    </Notes>
    <CVE>CVE-2020-27670</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27670.html</URL>
        <Description>CVE-2020-27670</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177414</URL>
        <Description>SUSE Bug 1177414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.</Note>
    </Notes>
    <CVE>CVE-2020-27671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27671.html</URL>
        <Description>CVE-2020-27671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177413</URL>
        <Description>SUSE Bug 1177413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.</Note>
    </Notes>
    <CVE>CVE-2020-27672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27672.html</URL>
        <Description>CVE-2020-27672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177412</URL>
        <Description>SUSE Bug 1177412</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183925</URL>
        <Description>SUSE Bug 1183925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.</Note>
    </Notes>
    <CVE>CVE-2020-27674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27674.html</URL>
        <Description>CVE-2020-27674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1177409</URL>
        <Description>SUSE Bug 1177409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.</Note>
    </Notes>
    <CVE>CVE-2020-28368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:xen-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-devel-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-doc-html-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-32bit-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-libs-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-4.12.4_04-lp151.2.33.1</ProductID>
        <ProductID>openSUSE Leap 15.1:xen-tools-domU-4.12.4_04-lp151.2.33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-28368.html</URL>
        <Description>CVE-2020-28368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178591</URL>
        <Description>SUSE Bug 1178591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
