<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:1348-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-05-24T12:04:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-05-24T12:04:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-05-24T12:04:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates.

The mitigation can be controlled via the 'mds' commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Other fixes:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).
- Added upstream bug fix (bsc#1027519).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-1348,SUSE-SLE-SERVER-12-2019-1348</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      <Description>Link for SUSE-SU-2019:1348-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:1348-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1027519</URL>
      <Description>SUSE Bug 1027519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1111331</URL>
      <Description>SUSE Bug 1111331</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1130680</URL>
      <Description>SUSE Bug 1130680</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12126/</URL>
      <Description>SUSE CVE CVE-2018-12126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12127/</URL>
      <Description>SUSE CVE CVE-2018-12127 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12130/</URL>
      <Description>SUSE CVE CVE-2018-12130 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-20815/</URL>
      <Description>SUSE CVE CVE-2018-20815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11091/</URL>
      <Description>SUSE CVE CVE-2019-11091 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-4.4.4_40-22.80.1">xen-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-devel-4.4.4_40-22.80.1">xen-devel-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-doc-html-4.4.4_40-22.80.1">xen-doc-html-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1">
      <FullProductName ProductID="xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1">xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-libs-4.4.4_40-22.80.1">xen-libs-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-libs-32bit-4.4.4_40-22.80.1">xen-libs-32bit-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-libs-64bit-4.4.4_40-22.80.1">xen-libs-64bit-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-tools-4.4.4_40-22.80.1">xen-tools-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.4.4_40-22.80.1">
      <FullProductName ProductID="xen-tools-domU-4.4.4_40-22.80.1">xen-tools-domU-4.4.4_40-22.80.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1">xen-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1">xen-doc-html-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1">xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1">xen-libs-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1">xen-libs-32bit-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1">xen-tools-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.4_40-22.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1">xen-tools-domU-4.4.4_40-22.80.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12126.html</URL>
        <Description>CVE-2018-12126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135524</URL>
        <Description>SUSE Bug 1135524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149725</URL>
        <Description>SUSE Bug 1149725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149726</URL>
        <Description>SUSE Bug 1149726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149729</URL>
        <Description>SUSE Bug 1149729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12127.html</URL>
        <Description>CVE-2018-12127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2018-12130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12130.html</URL>
        <Description>CVE-2018-12130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135409</URL>
        <Description>SUSE Bug 1135409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1137916</URL>
        <Description>SUSE Bug 1137916</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.</Note>
    </Notes>
    <CVE>CVE-2018-20815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-20815.html</URL>
        <Description>CVE-2018-20815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118900</URL>
        <Description>SUSE Bug 1118900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130675</URL>
        <Description>SUSE Bug 1130675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130680</URL>
        <Description>SUSE Bug 1130680</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138043</URL>
        <Description>SUSE Bug 1138043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf</Note>
    </Notes>
    <CVE>CVE-2019-11091</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_40_k3.12.61_52.149-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_40-22.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_40-22.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:C/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191348-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11091.html</URL>
        <Description>CVE-2019-11091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103186</URL>
        <Description>SUSE Bug 1103186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111331</URL>
        <Description>SUSE Bug 1111331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132686</URL>
        <Description>SUSE Bug 1132686</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133319</URL>
        <Description>SUSE Bug 1133319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1135394</URL>
        <Description>SUSE Bug 1135394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138043</URL>
        <Description>SUSE Bug 1138043</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1138534</URL>
        <Description>SUSE Bug 1138534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1141977</URL>
        <Description>SUSE Bug 1141977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1178658</URL>
        <Description>SUSE Bug 1178658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201877</URL>
        <Description>SUSE Bug 1201877</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
