Upstream information

CVE-2021-28693 at MITRE

Description

xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.

SUSE information

Overall state of this security issue: Analysis

This issue is currently rated as having moderate severity.

SUSE Bugzilla entry: 1186428 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Image SLES15-SP2-CHOST-BYOS-Aliyun
Image SLES15-SP2-CHOST-BYOS-Azure
Image SLES15-SP2-CHOST-BYOS-GCE
  • xen-libs >= 4.13.3_02-3.34.1
Image SLES15-SP2-CHOST-BYOS-EC2
  • xen-libs >= 4.13.3_02-3.34.1
  • xen-tools-domU >= 4.13.3_02-3.34.1
Image SLES15-SP3-CHOST-BYOS-Aliyun
Image SLES15-SP3-CHOST-BYOS-Azure
Image SLES15-SP3-CHOST-BYOS-GCE
  • xen-libs >= 4.14.2_04-3.9.1
Image SLES15-SP3-CHOST-BYOS-EC2
  • xen-libs >= 4.14.2_04-3.9.1
  • xen-tools-domU >= 4.14.2_04-3.9.1
SUSE CaaS Platform 4.0
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SUSE-CAASP-4.0-2021-2925
SUSE Enterprise Storage 6
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-Storage-6-2021-2925
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2925
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2925
SUSE Linux Enterprise Module for Basesystem 15 SP2
  • xen-libs >= 4.13.3_02-3.34.1
  • xen-tools-domU >= 4.13.3_02-3.34.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP2-2021-2922
SUSE Linux Enterprise Module for Basesystem 15 SP3
  • xen-libs >= 4.14.2_04-3.9.1
  • xen-tools-domU >= 4.14.2_04-3.9.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP3-2021-2923
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP2
  • xen >= 4.13.3_02-3.34.1
  • xen-devel >= 4.13.3_02-3.34.1
  • xen-doc-html >= 4.13.3_02-3.34.1
  • xen-libs >= 4.13.3_02-3.34.1
  • xen-libs-32bit >= 4.13.3_02-3.34.1
  • xen-tools >= 4.13.3_02-3.34.1
  • xen-tools-domU >= 4.13.3_02-3.34.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-SP2-2021-2922
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP3
  • xen >= 4.14.2_04-3.9.1
  • xen-devel >= 4.14.2_04-3.9.1
  • xen-doc-html >= 4.14.2_04-3.9.1
  • xen-libs >= 4.14.2_04-3.9.1
  • xen-libs-32bit >= 4.14.2_04-3.9.1
  • xen-tools >= 4.14.2_04-3.9.1
  • xen-tools-domU >= 4.14.2_04-3.9.1
Patchnames:
SUSE-SLE-Module-Development-Tools-OBS-15-SP3-2021-2923
SUSE Linux Enterprise Module for Server Applications 15 SP2
  • xen >= 4.13.3_02-3.34.1
  • xen-devel >= 4.13.3_02-3.34.1
  • xen-tools >= 4.13.3_02-3.34.1
  • xen-tools-xendomains-wait-disk >= 4.13.3_02-3.34.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP2-2021-2922
SUSE Linux Enterprise Module for Server Applications 15 SP3
  • xen >= 4.14.2_04-3.9.1
  • xen-devel >= 4.14.2_04-3.9.1
  • xen-tools >= 4.14.2_04-3.9.1
  • xen-tools-xendomains-wait-disk >= 4.14.2_04-3.9.1
Patchnames:
SUSE-SLE-Module-Server-Applications-15-SP3-2021-2923
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server for SAP Applications 12 SP5
  • xen >= 4.12.4_12-3.49.1
  • xen-doc-html >= 4.12.4_12-3.49.1
  • xen-libs >= 4.12.4_12-3.49.1
  • xen-libs-32bit >= 4.12.4_12-3.49.1
  • xen-tools >= 4.12.4_12-3.49.1
  • xen-tools-domU >= 4.12.4_12-3.49.1
Patchnames:
SUSE-SLE-SERVER-12-SP5-2021-2924
SUSE Linux Enterprise Server 15 SP1-BCL
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2925
SUSE Linux Enterprise Server 15 SP1-LTSS
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2925
SUSE Linux Enterprise Server for SAP Applications 15 SP1
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2925
SUSE Linux Enterprise Software Development Kit 12 SP5
  • xen-devel >= 4.12.4_12-3.49.1
Patchnames:
SUSE-SLE-SDK-12-SP5-2021-2924
SUSE Manager Proxy 4.0
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2925
SUSE Manager Retail Branch Server 4.0
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2925
SUSE Manager Server 4.0
  • xen >= 4.12.4_12-3.52.1
  • xen-devel >= 4.12.4_12-3.52.1
  • xen-libs >= 4.12.4_12-3.52.1
  • xen-tools >= 4.12.4_12-3.52.1
  • xen-tools-domU >= 4.12.4_12-3.52.1
Patchnames:
SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2925
SUSE MicroOS 5.0
  • xen-libs >= 4.13.3_02-3.34.1
Patchnames:
SUSE-SUSE-MicroOS-5.0-2021-2922
openSUSE Leap 15.2
  • xen >= 4.13.3_02-lp152.2.27.1
  • xen-devel >= 4.13.3_02-lp152.2.27.1
  • xen-doc-html >= 4.13.3_02-lp152.2.27.1
  • xen-libs >= 4.13.3_02-lp152.2.27.1
  • xen-libs-32bit >= 4.13.3_02-lp152.2.27.1
  • xen-tools >= 4.13.3_02-lp152.2.27.1
  • xen-tools-domU >= 4.13.3_02-lp152.2.27.1
  • xen-tools-xendomains-wait-disk >= 4.13.3_02-lp152.2.27.1
Patchnames:
openSUSE-2021-1236
openSUSE Leap 15.3
  • xen >= 4.14.2_04-3.9.1
  • xen-devel >= 4.14.2_04-3.9.1
  • xen-doc-html >= 4.14.2_04-3.9.1
  • xen-libs >= 4.14.2_04-3.9.1
  • xen-libs-32bit >= 4.14.2_04-3.9.1
  • xen-tools >= 4.14.2_04-3.9.1
  • xen-tools-domU >= 4.14.2_04-3.9.1
  • xen-tools-xendomains-wait-disk >= 4.14.2_04-3.9.1
Patchnames:
openSUSE-SLE-15.3-2021-2923


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SLE-HPC (12) xen Released
SLES (12) xen Released
SLES-BCL (12) xen Analysis
SLES-ESPOS (12) xen Analysis
SLES-LTSS (12) xen Analysis
SLES-LTSS (15) xen Analysis
SLES-LTSS-ERICSSON (12) xen Analysis
SLES-LTSS-SAP (12) xen Analysis
SLES_BCL (15) xen Released
SLES_SAP (12) xen Released
SLES_SAP (15) xen Analysis
SLE_HPC-ESPOS (15) xen Released
SLE_HPC-LTSS (15) xen Released
SUSE-Manager-Proxy (4.0) xen Released
SUSE-Manager-Retail-Branch-Server (4.0) xen Released
SUSE-Manager-Server (4.0) xen Released
SUSE-MicroOS (5.0) xen Released
SUSE_SLES_LTSS (11) xen Analysis
caasp (4.0) xen Released
hpe-helion-openstack (8) xen Analysis
ses (6) xen Released
sle-module-basesystem (15) xen Released
sle-module-server-applications (15) xen Released
sle-pos (11) xen Analysis
sle-sdk (12) xen Released
suse-openstack-cloud (8) xen Analysis
suse-openstack-cloud (9) xen Analysis
suse-openstack-cloud-crowbar (8) xen Analysis
suse-openstack-cloud-crowbar (9) xen Analysis