Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-34322 (GCVE-0-2023-34322)
Vulnerability from cvelistv5
► | URL | Tags | |
---|---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:10:06.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-34322", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:50:09.329667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-273", "description": "CWE-273 Improper Check for Dropped Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-16T18:28:59.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Xen", "vendor": "Xen", "versions": [ { "status": "unknown", "version": "consult Xen advisory XSA-438" } ] } ], "configurations": [ { "lang": "en", "value": "All Xen versions from at least 3.2 onwards are vulnerable. Earlier\nversions have not been inspected.\n\nOnly x86 systems are vulnerable. Only 64-bit PV guests can leverage the\nvulnerability, and only when running in shadow mode. Shadow mode would\nbe in use when migrating guests or as a workaround for XSA-273 (L1TF).\n" } ], "credits": [ { "lang": "en", "type": "finder", "value": "This issue was discovered by Tim Deegan, and Jan Beulich of SUSE.\n" } ], "datePublic": "2023-09-19T12:00:00.000Z", "descriptions": [ { "lang": "en", "value": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Privilege escalation, Denial of Service (DoS) affecting the entire host,\nand information leaks all cannot be ruled out.\n" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-05T16:18:01.363Z", "orgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "shortName": "XEN" }, "references": [ { "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ], "title": "top-level shadow reference dropped too early for 64-bit PV guests", "workarounds": [ { "lang": "en", "value": "Running only HVM or PVH guests will avoid the vulnerability.\n\nRunning PV guests in the PV shim will also avoid the vulnerability.\n" } ] } }, "cveMetadata": { "assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "assignerShortName": "XEN", "cveId": "CVE-2023-34322", "datePublished": "2024-01-05T16:18:01.363Z", "dateReserved": "2023-06-01T10:44:17.065Z", "dateUpdated": "2025-06-16T18:28:59.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-34322\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2024-01-05T17:15:08.447\",\"lastModified\":\"2025-06-16T19:15:22.347\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"For migration as well as to work around kernels unaware of L1TF (see\\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\\ndirectly the respective shadow page tables. For 64-bit PV guests this\\nmeans running on the shadow of the guest root page table.\\n\\nIn the course of dealing with shortage of memory in the shadow pool\\nassociated with a domain, shadows of page tables may be torn down. This\\ntearing down may include the shadow root page table that the CPU in\\nquestion is presently running on. While a precaution exists to\\nsupposedly prevent the tearing down of the underlying live page table,\\nthe time window covered by that precaution isn\u0027t large enough.\\n\"},{\"lang\":\"es\",\"value\":\"Para la migraci\u00f3n, as\u00ed como para evitar kernels que no conocen L1TF (consulte XSA-273), los invitados PV pueden ejecutarse en modo de p\u00e1gina oculta. Dado que el propio Xen debe mapearse cuando se ejecutan las maquinas PV de invitado, Xen y las shadowed PV de invitado ejecutan directamente las respectivas tablas de p\u00e1ginas ocultas. Para invitados PV de 64 bits, esto significa ejecutar en la shadow de la tabla de p\u00e1gina ra\u00edz del invitado. Al tratar con la escasez de memoria en el shadow pool asociado con un dominio, es posible que se eliminen las tablas de p\u00e1ginas de shadows. Esta eliminaci\u00f3n puede incluir la shadow de la tabla de p\u00e1gina ra\u00edz en la que se est\u00e1 ejecutando actualmente la CPU en cuesti\u00f3n. Si bien existe una precauci\u00f3n para supuestamente evitar la eliminaci\u00f3n de la tabla de las p\u00e1ginas activas subyacente, el per\u00edodo de tiempo cubierto por esa precauci\u00f3n no es lo suficientemente grande.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-273\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-273\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*\",\"versionStartIncluding\":\"3.2.0\",\"versionEndExcluding\":\"4.15.0\",\"matchCriteriaId\":\"4E4B3C8C-CD2C-4F4F-8F8F-8E1B769333E7\"}]}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-438.html\",\"source\":\"security@xen.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-438.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-438.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:10:06.455Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-34322\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-27T15:50:09.329667Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-273\", \"description\": \"CWE-273 Improper Check for Dropped Privileges\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-27T15:51:03.882Z\"}}], \"cna\": {\"title\": \"top-level shadow reference dropped too early for 64-bit PV guests\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered by Tim Deegan, and Jan Beulich of SUSE.\\n\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"Privilege escalation, Denial of Service (DoS) affecting the entire host,\\nand information leaks all cannot be ruled out.\\n\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-438\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-09-19T12:00:00.000Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-438.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Running only HVM or PVH guests will avoid the vulnerability.\\n\\nRunning PV guests in the PV shim will also avoid the vulnerability.\\n\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"For migration as well as to work around kernels unaware of L1TF (see\\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\\ndirectly the respective shadow page tables. For 64-bit PV guests this\\nmeans running on the shadow of the guest root page table.\\n\\nIn the course of dealing with shortage of memory in the shadow pool\\nassociated with a domain, shadows of page tables may be torn down. This\\ntearing down may include the shadow root page table that the CPU in\\nquestion is presently running on. While a precaution exists to\\nsupposedly prevent the tearing down of the underlying live page table,\\nthe time window covered by that precaution isn\u0027t large enough.\\n\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"All Xen versions from at least 3.2 onwards are vulnerable. Earlier\\nversions have not been inspected.\\n\\nOnly x86 systems are vulnerable. Only 64-bit PV guests can leverage the\\nvulnerability, and only when running in shadow mode. Shadow mode would\\nbe in use when migrating guests or as a workaround for XSA-273 (L1TF).\\n\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2024-01-05T16:18:01.363Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-34322\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-16T18:28:59.286Z\", \"dateReserved\": \"2023-06-01T10:44:17.065Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2024-01-05T16:18:01.363Z\", \"assignerShortName\": \"XEN\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2024:13257-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xen-4.17.2_04-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xen-4.17.2_04-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13257", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13257-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "xen-4.17.2_04-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13257-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-1.1.aarch64", "product": { "name": "xen-4.17.2_04-1.1.aarch64", "product_id": "xen-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-1.1.aarch64", "product": { "name": "xen-devel-4.17.2_04-1.1.aarch64", "product_id": "xen-devel-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-1.1.aarch64", "product": { "name": "xen-doc-html-4.17.2_04-1.1.aarch64", "product_id": "xen-doc-html-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-1.1.aarch64", "product": { "name": "xen-libs-4.17.2_04-1.1.aarch64", "product_id": "xen-libs-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-1.1.aarch64", "product": { "name": "xen-tools-4.17.2_04-1.1.aarch64", "product_id": "xen-tools-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-1.1.aarch64", "product": { "name": "xen-tools-domU-4.17.2_04-1.1.aarch64", "product_id": "xen-tools-domU-4.17.2_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-4.17.2_04-1.1.ppc64le", "product_id": "xen-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-devel-4.17.2_04-1.1.ppc64le", "product_id": "xen-devel-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-doc-html-4.17.2_04-1.1.ppc64le", "product_id": "xen-doc-html-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-libs-4.17.2_04-1.1.ppc64le", "product_id": "xen-libs-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-tools-4.17.2_04-1.1.ppc64le", "product_id": "xen-tools-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-tools-domU-4.17.2_04-1.1.ppc64le", "product_id": "xen-tools-domU-4.17.2_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-1.1.s390x", "product": { "name": "xen-4.17.2_04-1.1.s390x", "product_id": "xen-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-1.1.s390x", "product": { "name": "xen-devel-4.17.2_04-1.1.s390x", "product_id": "xen-devel-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-1.1.s390x", "product": { "name": "xen-doc-html-4.17.2_04-1.1.s390x", "product_id": "xen-doc-html-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-1.1.s390x", "product": { "name": "xen-libs-4.17.2_04-1.1.s390x", "product_id": "xen-libs-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-1.1.s390x", "product": { "name": "xen-tools-4.17.2_04-1.1.s390x", "product_id": "xen-tools-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-1.1.s390x", "product": { "name": "xen-tools-domU-4.17.2_04-1.1.s390x", "product_id": "xen-tools-domU-4.17.2_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-1.1.x86_64", "product": { "name": "xen-4.17.2_04-1.1.x86_64", "product_id": "xen-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-1.1.x86_64", "product": { "name": "xen-devel-4.17.2_04-1.1.x86_64", "product_id": "xen-devel-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-1.1.x86_64", "product": { "name": "xen-doc-html-4.17.2_04-1.1.x86_64", "product_id": "xen-doc-html-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-1.1.x86_64", "product": { "name": "xen-libs-4.17.2_04-1.1.x86_64", "product_id": "xen-libs-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-1.1.x86_64", "product": { "name": "xen-tools-4.17.2_04-1.1.x86_64", "product_id": "xen-tools-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-1.1.x86_64", "product": { "name": "xen-tools-domU-4.17.2_04-1.1.x86_64", "product_id": "xen-tools-domU-4.17.2_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x" }, "product_reference": "xen-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-devel-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-devel-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x" }, "product_reference": "xen-devel-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-devel-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-doc-html-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-doc-html-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x" }, "product_reference": "xen-doc-html-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-doc-html-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-libs-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-libs-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x" }, "product_reference": "xen-libs-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-libs-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-tools-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-tools-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x" }, "product_reference": "xen-tools-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-tools-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-tools-domU-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-tools-domU-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x" }, "product_reference": "xen-tools-domU-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.17.2_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.2_04-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:3895-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).\n- CVE-2022-40982: Fixed Intel Gather Data Sampling (XSA-435) (bsc#1214083).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3895,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3895,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3895,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3895", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3895-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3895-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233895-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3895-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" }, { "category": "self", "summary": "SUSE Bug 1213616", "url": "https://bugzilla.suse.com/1213616" }, { "category": "self", "summary": "SUSE Bug 1214083", "url": "https://bugzilla.suse.com/1214083" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-29T08:59:54Z", "generator": { "date": "2023-09-29T08:59:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3895-1", "initial_release_date": "2023-09-29T08:59:54Z", "revision_history": [ { "date": "2023-09-29T08:59:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-4.13.5_04-150200.3.77.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-devel-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-devel-4.13.5_04-150200.3.77.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-doc-html-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-doc-html-4.13.5_04-150200.3.77.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-libs-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-libs-4.13.5_04-150200.3.77.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-tools-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-tools-4.13.5_04-150200.3.77.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.aarch64", "product": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.aarch64", "product_id": "xen-tools-domU-4.13.5_04-150200.3.77.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.13.5_04-150200.3.77.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.13.5_04-150200.3.77.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.13.5_04-150200.3.77.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.5_04-150200.3.77.1.i586", "product": { "name": "xen-devel-4.13.5_04-150200.3.77.1.i586", "product_id": "xen-devel-4.13.5_04-150200.3.77.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.5_04-150200.3.77.1.i586", "product": { "name": "xen-libs-4.13.5_04-150200.3.77.1.i586", "product_id": "xen-libs-4.13.5_04-150200.3.77.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.i586", "product": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.i586", "product_id": "xen-tools-domU-4.13.5_04-150200.3.77.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-devel-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-devel-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-doc-html-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-doc-html-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-libs-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-libs-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-libs-32bit-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-tools-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-tools-4.13.5_04-150200.3.77.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "product": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "product_id": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-devel-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-libs-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-devel-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-libs-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-devel-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-libs-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:59:54Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:59:54Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:59:54Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_04-150200.3.77.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_04-150200.3.77.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:59:54Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:3903-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3903,SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3903,SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3903,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3903,SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3903,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3903,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3903,SUSE-SUSE-MicroOS-5.1-2023-3903,SUSE-SUSE-MicroOS-5.2-2023-3903,SUSE-Storage-7.1-2023-3903", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3903-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3903-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233903-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3903-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" }, { "category": "self", "summary": "SUSE Bug 1213616", "url": "https://bugzilla.suse.com/1213616" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-29T13:14:27Z", "generator": { "date": "2023-09-29T13:14:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3903-1", "initial_release_date": "2023-09-29T13:14:27Z", "revision_history": [ { "date": "2023-09-29T13:14:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-4.14.6_04-150300.3.54.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-devel-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-devel-4.14.6_04-150300.3.54.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-doc-html-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-doc-html-4.14.6_04-150300.3.54.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-libs-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-libs-4.14.6_04-150300.3.54.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-tools-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-tools-4.14.6_04-150300.3.54.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.aarch64", "product": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.aarch64", "product_id": "xen-tools-domU-4.14.6_04-150300.3.54.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.14.6_04-150300.3.54.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.14.6_04-150300.3.54.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.14.6_04-150300.3.54.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.14.6_04-150300.3.54.1.i586", "product": { "name": "xen-devel-4.14.6_04-150300.3.54.1.i586", "product_id": "xen-devel-4.14.6_04-150300.3.54.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.14.6_04-150300.3.54.1.i586", "product": { "name": "xen-libs-4.14.6_04-150300.3.54.1.i586", "product_id": "xen-libs-4.14.6_04-150300.3.54.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.i586", "product": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.i586", "product_id": "xen-tools-domU-4.14.6_04-150300.3.54.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-devel-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-doc-html-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-doc-html-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-libs-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-libs-32bit-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-libs-32bit-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-tools-4.14.6_04-150300.3.54.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "product": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "product_id": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.2", "product": { "name": "SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.2" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.2", "product": { "name": "SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Manager Proxy 4.2", "product_id": "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Manager Server 4.2", "product_id": "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-devel-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-libs-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64" }, "product_reference": "xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:14:27Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:14:27Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Enterprise Storage 7.1:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Proxy 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Proxy 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch", "SUSE Manager Server 4.2:xen-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-devel-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-libs-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-domU-4.14.6_04-150300.3.54.1.x86_64", "SUSE Manager Server 4.2:xen-tools-xendomains-wait-disk-4.14.6_04-150300.3.54.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:14:27Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:3902-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).\n- CVE-2022-40982: Fixed Intel Gather Data Sampling (XSA-435) (bsc#1214083).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3902,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3902,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3902,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3902", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3902-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3902-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233902-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3902-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" }, { "category": "self", "summary": "SUSE Bug 1213616", "url": "https://bugzilla.suse.com/1213616" }, { "category": "self", "summary": "SUSE Bug 1214083", "url": "https://bugzilla.suse.com/1214083" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-29T13:10:32Z", "generator": { "date": "2023-09-29T13:10:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3902-1", "initial_release_date": "2023-09-29T13:10:32Z", "revision_history": [ { "date": "2023-09-29T13:10:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-4.12.4_38-150100.3.92.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-devel-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-devel-4.12.4_38-150100.3.92.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-doc-html-4.12.4_38-150100.3.92.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-libs-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-libs-4.12.4_38-150100.3.92.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-tools-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-tools-4.12.4_38-150100.3.92.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.aarch64", "product_id": "xen-tools-domU-4.12.4_38-150100.3.92.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_38-150100.3.92.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_38-150100.3.92.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_38-150100.3.92.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_38-150100.3.92.1.i586", "product": { "name": "xen-devel-4.12.4_38-150100.3.92.1.i586", "product_id": "xen-devel-4.12.4_38-150100.3.92.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-150100.3.92.1.i586", "product": { "name": "xen-libs-4.12.4_38-150100.3.92.1.i586", "product_id": "xen-libs-4.12.4_38-150100.3.92.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.i586", "product": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.i586", "product_id": "xen-tools-domU-4.12.4_38-150100.3.92.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-devel-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-devel-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-doc-html-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-libs-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-libs-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-tools-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-tools-4.12.4_38-150100.3.92.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "product_id": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-devel-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-libs-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-devel-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-libs-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-devel-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-libs-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:10:32Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:10:32Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:10:32Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-devel-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-libs-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-4.12.4_38-150100.3.92.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:xen-tools-domU-4.12.4_38-150100.3.92.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T13:10:32Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:4475-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).\n- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).\n- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).\n- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).\n- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).\n\n- Upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-4475,SUSE-SLE-Micro-5.5-2023-4475,SUSE-SLE-Module-Basesystem-15-SP5-2023-4475,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4475,openSUSE-SLE-15.5-2023-4475", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4475-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:4475-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234475-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:4475-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE Bug 1215746", "url": "https://bugzilla.suse.com/1215746" }, { "category": "self", "summary": "SUSE Bug 1215747", "url": "https://bugzilla.suse.com/1215747" }, { "category": "self", "summary": "SUSE Bug 1215748", "url": "https://bugzilla.suse.com/1215748" }, { "category": "self", "summary": "SUSE Bug 1216654", "url": "https://bugzilla.suse.com/1216654" }, { "category": "self", "summary": "SUSE Bug 1216807", "url": "https://bugzilla.suse.com/1216807" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34325 page", "url": "https://www.suse.com/security/cve/CVE-2023-34325/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34326 page", "url": "https://www.suse.com/security/cve/CVE-2023-34326/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34327 page", "url": "https://www.suse.com/security/cve/CVE-2023-34327/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34328 page", "url": "https://www.suse.com/security/cve/CVE-2023-34328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46835 page", "url": "https://www.suse.com/security/cve/CVE-2023-46835/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46836 page", "url": "https://www.suse.com/security/cve/CVE-2023-46836/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-11-17T07:05:29Z", "generator": { "date": "2023-11-17T07:05:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:4475-1", "initial_release_date": "2023-11-17T07:05:29Z", "revision_history": [ { "date": "2023-11-17T07:05:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-4.17.2_08-150500.3.15.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-devel-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-devel-4.17.2_08-150500.3.15.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-doc-html-4.17.2_08-150500.3.15.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-libs-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-libs-4.17.2_08-150500.3.15.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-tools-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-tools-4.17.2_08-150500.3.15.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "product": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "product_id": "xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.17.2_08-150500.3.15.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.17.2_08-150500.3.15.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.17.2_08-150500.3.15.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.17.2_08-150500.3.15.1.i586", "product": { "name": "xen-devel-4.17.2_08-150500.3.15.1.i586", "product_id": "xen-devel-4.17.2_08-150500.3.15.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.17.2_08-150500.3.15.1.i586", "product": { "name": "xen-libs-4.17.2_08-150500.3.15.1.i586", "product_id": "xen-libs-4.17.2_08-150500.3.15.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.i586", "product": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.i586", "product_id": "xen-tools-domU-4.17.2_08-150500.3.15.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-devel-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-devel-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-doc-html-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-libs-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-libs-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-tools-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-tools-4.17.2_08-150500.3.15.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "product": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "product_id": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-libs-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-libs-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-devel-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_08-150500.3.15.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-tools-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-devel-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-devel-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-libs-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-libs-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-tools-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-tools-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64" }, "product_reference": "xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "important" } ], "title": "CVE-2023-34322" }, { "cve": "CVE-2023-34325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34325" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nlibfsimage contains parsing code for several filesystems, most of them based on\ngrub-legacy code. libfsimage is used by pygrub to inspect guest disks.\n\nPygrub runs as the same user as the toolstack (root in a priviledged domain).\n\nAt least one issue has been reported to the Xen Security Team that allows an\nattacker to trigger a stack buffer overflow in libfsimage. After further\nanalisys the Xen Security Team is no longer confident in the suitability of\nlibfsimage when run against guest controlled input with super user priviledges.\n\nIn order to not affect current deployments that rely on pygrub patches are\nprovided in the resolution section of the advisory that allow running pygrub in\ndeprivileged mode.\n\nCVE-2023-4949 refers to the original issue in the upstream grub\nproject (\"An attacker with local access to a system (either through a\ndisk or external drive) can present a modified XFS partition to\ngrub-legacy in such a way to exploit a memory corruption in grub\u0027s XFS\nfile system implementation.\") CVE-2023-34325 refers specifically to\nthe vulnerabilities in Xen\u0027s copy of libfsimage, which is decended\nfrom a very old version of grub.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34325", "url": "https://www.suse.com/security/cve/CVE-2023-34325" }, { "category": "external", "summary": "SUSE Bug 1215747 for CVE-2023-34325", "url": "https://bugzilla.suse.com/1215747" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-34325" }, { "cve": "CVE-2023-34326", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34326" } ], "notes": [ { "category": "general", "text": "The caching invalidation guidelines from the AMD-Vi specification (48882\u2014Rev\n3.07-PUB\u2014Oct 2022) is incorrect on some hardware, as devices will malfunction\n(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU\nTLB is not flushed.\n\nSuch stale DMA mappings can point to memory ranges not owned by the guest, thus\nallowing access to unindented memory regions.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34326", "url": "https://www.suse.com/security/cve/CVE-2023-34326" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34326", "url": "https://bugzilla.suse.com/1215145" }, { "category": "external", "summary": "SUSE Bug 1215746 for CVE-2023-34326", "url": "https://bugzilla.suse.com/1215746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "important" } ], "title": "CVE-2023-34326" }, { "cve": "CVE-2023-34327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34327" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34327", "url": "https://www.suse.com/security/cve/CVE-2023-34327" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2023-34327", "url": "https://bugzilla.suse.com/1215748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-34327" }, { "cve": "CVE-2023-34328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34328" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34328", "url": "https://www.suse.com/security/cve/CVE-2023-34328" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2023-34328", "url": "https://bugzilla.suse.com/1215748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-34328" }, { "cve": "CVE-2023-46835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46835" } ], "notes": [ { "category": "general", "text": "The current setup of the quarantine page tables assumes that the\nquarantine domain (dom_io) has been initialized with an address width\nof DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.\n\nHowever dom_io being a PV domain gets the AMD-Vi IOMMU page tables\nlevels based on the maximum (hot pluggable) RAM address, and hence on\nsystems with no RAM above the 512GB mark only 3 page-table levels are\nconfigured in the IOMMU.\n\nOn systems without RAM above the 512GB boundary\namd_iommu_quarantine_init() will setup page tables for the scratch\npage with 4 levels, while the IOMMU will be configured to use 3 levels\nonly, resulting in the last page table directory (PDE) effectively\nbecoming a page table entry (PTE), and hence a device in quarantine\nmode gaining write access to the page destined to be a PDE.\n\nDue to this page table level mismatch, the sink page the device gets\nread/write access to is no longer cleared between device assignment,\npossibly leading to data leaks.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46835", "url": "https://www.suse.com/security/cve/CVE-2023-46835" }, { "category": "external", "summary": "SUSE Bug 1216654 for CVE-2023-46835", "url": "https://bugzilla.suse.com/1216654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-46835" }, { "cve": "CVE-2023-46836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46836" } ], "notes": [ { "category": "general", "text": "The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative\nReturn Stack Overflow) are not IRQ-safe. It was believed that the\nmitigations always operated in contexts with IRQs disabled.\n\nHowever, the original XSA-254 fix for Meltdown (XPTI) deliberately left\ninterrupts enabled on two entry paths; one unconditionally, and one\nconditionally on whether XPTI was active.\n\nAs BTC/SRSO and Meltdown affect different CPU vendors, the mitigations\nare not active together by default. Therefore, there is a race\ncondition whereby a malicious PV guest can bypass BTC/SRSO protections\nand launch a BTC/SRSO attack against Xen.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46836", "url": "https://www.suse.com/security/cve/CVE-2023-46836" }, { "category": "external", "summary": "SUSE Bug 1216807 for CVE-2023-46836", "url": "https://bugzilla.suse.com/1216807" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_08-150500.3.15.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:29Z", "details": "moderate" } ], "title": "CVE-2023-46836" } ] }
suse-su-2023:3831-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3831,SUSE-SLE-Module-Basesystem-15-SP5-2023-3831,SUSE-SLE-Module-Server-Applications-15-SP5-2023-3831,openSUSE-SLE-15.5-2023-3831", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3831-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3831-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233831-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3831-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-27T17:15:27Z", "generator": { "date": "2023-09-27T17:15:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3831-1", "initial_release_date": "2023-09-27T17:15:27Z", "revision_history": [ { "date": "2023-09-27T17:15:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-4.17.2_04-150500.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-devel-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-devel-4.17.2_04-150500.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-doc-html-4.17.2_04-150500.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-libs-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-libs-4.17.2_04-150500.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-tools-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-tools-4.17.2_04-150500.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "product": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "product_id": "xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.17.2_04-150500.3.9.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.17.2_04-150500.3.9.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.17.2_04-150500.3.9.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.17.2_04-150500.3.9.1.i586", "product": { "name": "xen-devel-4.17.2_04-150500.3.9.1.i586", "product_id": "xen-devel-4.17.2_04-150500.3.9.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-150500.3.9.1.i586", "product": { "name": "xen-libs-4.17.2_04-150500.3.9.1.i586", "product_id": "xen-libs-4.17.2_04-150500.3.9.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.i586", "product": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.i586", "product_id": "xen-tools-domU-4.17.2_04-150500.3.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-devel-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-devel-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-doc-html-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-libs-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-libs-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-tools-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-tools-4.17.2_04-150500.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "product": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "product_id": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-libs-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-devel-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-150500.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-tools-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-devel-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-devel-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-libs-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-libs-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-tools-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-tools-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64" }, "product_reference": "xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-27T17:15:27Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.2_04-150500.3.9.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-27T17:15:27Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:4476-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).\n- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).\n- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).\n- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).\n- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807). \n\n- Upstream bug fixes (bsc#1027519) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-4476,SUSE-SLE-Micro-5.3-2023-4476,SUSE-SLE-Micro-5.4-2023-4476,SUSE-SLE-Module-Basesystem-15-SP4-2023-4476,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4476,openSUSE-Leap-Micro-5.3-2023-4476,openSUSE-Leap-Micro-5.4-2023-4476,openSUSE-SLE-15.4-2023-4476", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4476-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:4476-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234476-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:4476-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE Bug 1215746", "url": "https://bugzilla.suse.com/1215746" }, { "category": "self", "summary": "SUSE Bug 1215747", "url": "https://bugzilla.suse.com/1215747" }, { "category": "self", "summary": "SUSE Bug 1215748", "url": "https://bugzilla.suse.com/1215748" }, { "category": "self", "summary": "SUSE Bug 1216654", "url": "https://bugzilla.suse.com/1216654" }, { "category": "self", "summary": "SUSE Bug 1216807", "url": "https://bugzilla.suse.com/1216807" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34325 page", "url": "https://www.suse.com/security/cve/CVE-2023-34325/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34326 page", "url": "https://www.suse.com/security/cve/CVE-2023-34326/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34327 page", "url": "https://www.suse.com/security/cve/CVE-2023-34327/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34328 page", "url": "https://www.suse.com/security/cve/CVE-2023-34328/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46835 page", "url": "https://www.suse.com/security/cve/CVE-2023-46835/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46836 page", "url": "https://www.suse.com/security/cve/CVE-2023-46836/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-11-17T07:05:47Z", "generator": { "date": "2023-11-17T07:05:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:4476-1", "initial_release_date": "2023-11-17T07:05:47Z", "revision_history": [ { "date": "2023-11-17T07:05:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-4.16.5_08-150400.4.40.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-devel-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-devel-4.16.5_08-150400.4.40.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-doc-html-4.16.5_08-150400.4.40.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-libs-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-libs-4.16.5_08-150400.4.40.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-tools-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-tools-4.16.5_08-150400.4.40.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "product": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "product_id": "xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.16.5_08-150400.4.40.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.16.5_08-150400.4.40.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.16.5_08-150400.4.40.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.16.5_08-150400.4.40.1.i586", "product": { "name": "xen-devel-4.16.5_08-150400.4.40.1.i586", "product_id": "xen-devel-4.16.5_08-150400.4.40.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.16.5_08-150400.4.40.1.i586", "product": { "name": "xen-libs-4.16.5_08-150400.4.40.1.i586", "product_id": "xen-libs-4.16.5_08-150400.4.40.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.i586", "product": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.i586", "product_id": "xen-tools-domU-4.16.5_08-150400.4.40.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-devel-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-devel-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-doc-html-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-libs-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-tools-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-tools-4.16.5_08-150400.4.40.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "product": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "product_id": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.3", "product": { "name": "openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.3" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.4", "product": { "name": "openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-devel-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_08-150400.4.40.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-tools-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap Micro 5.3", "product_id": "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap Micro 5.4", "product_id": "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-devel-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-devel-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-tools-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-tools-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64" }, "product_reference": "xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "important" } ], "title": "CVE-2023-34322" }, { "cve": "CVE-2023-34325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34325" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nlibfsimage contains parsing code for several filesystems, most of them based on\ngrub-legacy code. libfsimage is used by pygrub to inspect guest disks.\n\nPygrub runs as the same user as the toolstack (root in a priviledged domain).\n\nAt least one issue has been reported to the Xen Security Team that allows an\nattacker to trigger a stack buffer overflow in libfsimage. After further\nanalisys the Xen Security Team is no longer confident in the suitability of\nlibfsimage when run against guest controlled input with super user priviledges.\n\nIn order to not affect current deployments that rely on pygrub patches are\nprovided in the resolution section of the advisory that allow running pygrub in\ndeprivileged mode.\n\nCVE-2023-4949 refers to the original issue in the upstream grub\nproject (\"An attacker with local access to a system (either through a\ndisk or external drive) can present a modified XFS partition to\ngrub-legacy in such a way to exploit a memory corruption in grub\u0027s XFS\nfile system implementation.\") CVE-2023-34325 refers specifically to\nthe vulnerabilities in Xen\u0027s copy of libfsimage, which is decended\nfrom a very old version of grub.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34325", "url": "https://www.suse.com/security/cve/CVE-2023-34325" }, { "category": "external", "summary": "SUSE Bug 1215747 for CVE-2023-34325", "url": "https://bugzilla.suse.com/1215747" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-34325" }, { "cve": "CVE-2023-34326", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34326" } ], "notes": [ { "category": "general", "text": "The caching invalidation guidelines from the AMD-Vi specification (48882\u2014Rev\n3.07-PUB\u2014Oct 2022) is incorrect on some hardware, as devices will malfunction\n(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU\nTLB is not flushed.\n\nSuch stale DMA mappings can point to memory ranges not owned by the guest, thus\nallowing access to unindented memory regions.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34326", "url": "https://www.suse.com/security/cve/CVE-2023-34326" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34326", "url": "https://bugzilla.suse.com/1215145" }, { "category": "external", "summary": "SUSE Bug 1215746 for CVE-2023-34326", "url": "https://bugzilla.suse.com/1215746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "important" } ], "title": "CVE-2023-34326" }, { "cve": "CVE-2023-34327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34327" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34327", "url": "https://www.suse.com/security/cve/CVE-2023-34327" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2023-34327", "url": "https://bugzilla.suse.com/1215748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-34327" }, { "cve": "CVE-2023-34328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34328" } ], "notes": [ { "category": "general", "text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34328", "url": "https://www.suse.com/security/cve/CVE-2023-34328" }, { "category": "external", "summary": "SUSE Bug 1215748 for CVE-2023-34328", "url": "https://bugzilla.suse.com/1215748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-34328" }, { "cve": "CVE-2023-46835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46835" } ], "notes": [ { "category": "general", "text": "The current setup of the quarantine page tables assumes that the\nquarantine domain (dom_io) has been initialized with an address width\nof DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.\n\nHowever dom_io being a PV domain gets the AMD-Vi IOMMU page tables\nlevels based on the maximum (hot pluggable) RAM address, and hence on\nsystems with no RAM above the 512GB mark only 3 page-table levels are\nconfigured in the IOMMU.\n\nOn systems without RAM above the 512GB boundary\namd_iommu_quarantine_init() will setup page tables for the scratch\npage with 4 levels, while the IOMMU will be configured to use 3 levels\nonly, resulting in the last page table directory (PDE) effectively\nbecoming a page table entry (PTE), and hence a device in quarantine\nmode gaining write access to the page destined to be a PDE.\n\nDue to this page table level mismatch, the sink page the device gets\nread/write access to is no longer cleared between device assignment,\npossibly leading to data leaks.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46835", "url": "https://www.suse.com/security/cve/CVE-2023-46835" }, { "category": "external", "summary": "SUSE Bug 1216654 for CVE-2023-46835", "url": "https://bugzilla.suse.com/1216654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-46835" }, { "cve": "CVE-2023-46836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46836" } ], "notes": [ { "category": "general", "text": "The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative\nReturn Stack Overflow) are not IRQ-safe. It was believed that the\nmitigations always operated in contexts with IRQs disabled.\n\nHowever, the original XSA-254 fix for Meltdown (XPTI) deliberately left\ninterrupts enabled on two entry paths; one unconditionally, and one\nconditionally on whether XPTI was active.\n\nAs BTC/SRSO and Meltdown affect different CPU vendors, the mitigations\nare not active together by default. Therefore, there is a race\ncondition whereby a malicious PV guest can bypass BTC/SRSO protections\nand launch a BTC/SRSO attack against Xen.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46836", "url": "https://www.suse.com/security/cve/CVE-2023-46836" }, { "category": "external", "summary": "SUSE Bug 1216807 for CVE-2023-46836", "url": "https://bugzilla.suse.com/1216807" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch", "openSUSE Leap Micro 5.3:xen-libs-4.16.5_08-150400.4.40.1.x86_64", "openSUSE Leap Micro 5.4:xen-libs-4.16.5_08-150400.4.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-11-17T07:05:47Z", "details": "moderate" } ], "title": "CVE-2023-46836" } ] }
suse-su-2023:3894-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).\n- CVE-2022-40982: Fixed Intel Gather Data Sampling (XSA-435) (bsc#1214083).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3894,SUSE-SLE-SDK-12-SP5-2023-3894,SUSE-SLE-SERVER-12-SP5-2023-3894", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3894-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3894-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233894-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3894-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" }, { "category": "self", "summary": "SUSE Bug 1213616", "url": "https://bugzilla.suse.com/1213616" }, { "category": "self", "summary": "SUSE Bug 1214083", "url": "https://bugzilla.suse.com/1214083" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-29T08:36:25Z", "generator": { "date": "2023-09-29T08:36:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3894-1", "initial_release_date": "2023-09-29T08:36:25Z", "revision_history": [ { "date": "2023-09-29T08:36:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-4.12.4_38-3.94.1.aarch64", "product_id": "xen-4.12.4_38-3.94.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-devel-4.12.4_38-3.94.1.aarch64", "product_id": "xen-devel-4.12.4_38-3.94.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_38-3.94.1.aarch64", "product_id": "xen-doc-html-4.12.4_38-3.94.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-libs-4.12.4_38-3.94.1.aarch64", "product_id": "xen-libs-4.12.4_38-3.94.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-tools-4.12.4_38-3.94.1.aarch64", "product_id": "xen-tools-4.12.4_38-3.94.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-3.94.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_38-3.94.1.aarch64", "product_id": "xen-tools-domU-4.12.4_38-3.94.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_38-3.94.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_38-3.94.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_38-3.94.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_38-3.94.1.i586", "product": { "name": "xen-devel-4.12.4_38-3.94.1.i586", "product_id": "xen-devel-4.12.4_38-3.94.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-3.94.1.i586", "product": { "name": "xen-libs-4.12.4_38-3.94.1.i586", "product_id": "xen-libs-4.12.4_38-3.94.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-3.94.1.i586", "product": { "name": "xen-tools-domU-4.12.4_38-3.94.1.i586", "product_id": "xen-tools-domU-4.12.4_38-3.94.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-4.12.4_38-3.94.1.x86_64", "product_id": "xen-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-devel-4.12.4_38-3.94.1.x86_64", "product_id": "xen-devel-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_38-3.94.1.x86_64", "product_id": "xen-doc-html-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-libs-4.12.4_38-3.94.1.x86_64", "product_id": "xen-libs-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-tools-4.12.4_38-3.94.1.x86_64", "product_id": "xen-tools-4.12.4_38-3.94.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_38-3.94.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_38-3.94.1.x86_64", "product_id": "xen-tools-domU-4.12.4_38-3.94.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_38-3.94.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64" }, "product_reference": "xen-devel-4.12.4_38-3.94.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-devel-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-libs-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-tools-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-libs-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-tools-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_38-3.94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_38-3.94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:36:25Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:36:25Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:36:25Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_38-3.94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_38-3.94.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2023-09-29T08:36:25Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
suse-su-2023:3832-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-3832,SUSE-SLE-Micro-5.3-2023-3832,SUSE-SLE-Micro-5.4-2023-3832,SUSE-SLE-Module-Basesystem-15-SP4-2023-3832,SUSE-SLE-Module-Server-Applications-15-SP4-2023-3832,openSUSE-SLE-15.4-2023-3832", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3832-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:3832-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233832-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:3832-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" }, { "category": "self", "summary": "SUSE Bug 1215145", "url": "https://bugzilla.suse.com/1215145" }, { "category": "self", "summary": "SUSE Bug 1215474", "url": "https://bugzilla.suse.com/1215474" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20588 page", "url": "https://www.suse.com/security/cve/CVE-2023-20588/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34322 page", "url": "https://www.suse.com/security/cve/CVE-2023-34322/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2023-09-27T17:16:03Z", "generator": { "date": "2023-09-27T17:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:3832-1", "initial_release_date": "2023-09-27T17:16:03Z", "revision_history": [ { "date": "2023-09-27T17:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-4.16.5_04-150400.4.34.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-devel-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-devel-4.16.5_04-150400.4.34.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-doc-html-4.16.5_04-150400.4.34.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-libs-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-libs-4.16.5_04-150400.4.34.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-tools-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-tools-4.16.5_04-150400.4.34.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "product": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "product_id": "xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.16.5_04-150400.4.34.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.16.5_04-150400.4.34.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.16.5_04-150400.4.34.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.16.5_04-150400.4.34.1.i586", "product": { "name": "xen-devel-4.16.5_04-150400.4.34.1.i586", "product_id": "xen-devel-4.16.5_04-150400.4.34.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.16.5_04-150400.4.34.1.i586", "product": { "name": "xen-libs-4.16.5_04-150400.4.34.1.i586", "product_id": "xen-libs-4.16.5_04-150400.4.34.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.i586", "product": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.i586", "product_id": "xen-tools-domU-4.16.5_04-150400.4.34.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-devel-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-devel-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-doc-html-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-libs-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-tools-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-tools-4.16.5_04-150400.4.34.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "product": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "product_id": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-devel-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_04-150400.4.34.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-tools-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-devel-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-devel-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-libs-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-libs-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-tools-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-tools-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64" }, "product_reference": "xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20588" } ], "notes": [ { "category": "general", "text": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. \n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20588", "url": "https://www.suse.com/security/cve/CVE-2023-20588" }, { "category": "external", "summary": "SUSE Bug 1213927 for CVE-2023-20588", "url": "https://bugzilla.suse.com/1213927" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-27T17:16:03Z", "details": "moderate" } ], "title": "CVE-2023-20588" }, { "cve": "CVE-2023-34322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34322" } ], "notes": [ { "category": "general", "text": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34322", "url": "https://www.suse.com/security/cve/CVE-2023-34322" }, { "category": "external", "summary": "SUSE Bug 1215145 for CVE-2023-34322", "url": "https://bugzilla.suse.com/1215145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-devel-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-doc-html-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-libs-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.aarch64", "openSUSE Leap 15.4:xen-tools-domU-4.16.5_04-150400.4.34.1.x86_64", "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-09-27T17:16:03Z", "details": "important" } ], "title": "CVE-2023-34322" } ] }
gsd-2023-34322
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-34322", "id": "GSD-2023-34322" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-34322" ], "details": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n", "id": "GSD-2023-34322", "modified": "2023-12-13T01:20:30.737913Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@xen.org", "ID": "CVE-2023-34322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Xen", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown", "versions": [ { "status": "unknown", "version": "consult Xen advisory XSA-438" } ] } } ] } } ] }, "vendor_name": "Xen" } ] } }, "configuration": [ { "lang": "en", "value": "All Xen versions from at least 3.2 onwards are vulnerable. Earlier\nversions have not been inspected.\n\nOnly x86 systems are vulnerable. Only 64-bit PV guests can leverage the\nvulnerability, and only when running in shadow mode. Shadow mode would\nbe in use when migrating guests or as a workaround for XSA-273 (L1TF).\n" } ], "credits": [ { "lang": "en", "value": "This issue was discovered by Tim Deegan, and Jan Beulich of SUSE.\n" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://xenbits.xenproject.org/xsa/advisory-438.html", "refsource": "MISC", "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ] }, "work_around": [ { "lang": "en", "value": "Running only HVM or PVH guests will avoid the vulnerability.\n\nRunning PV guests in the PV shim will also avoid the vulnerability.\n" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "matchCriteriaId": "4E4B3C8C-CD2C-4F4F-8F8F-8E1B769333E7", "versionEndExcluding": "4.15.0", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n" }, { "lang": "es", "value": "Para la migraci\u00f3n, as\u00ed como para evitar kernels que no conocen L1TF (consulte XSA-273), los invitados PV pueden ejecutarse en modo de p\u00e1gina oculta. Dado que el propio Xen debe mapearse cuando se ejecutan las maquinas PV de invitado, Xen y las shadowed PV de invitado ejecutan directamente las respectivas tablas de p\u00e1ginas ocultas. Para invitados PV de 64 bits, esto significa ejecutar en la shadow de la tabla de p\u00e1gina ra\u00edz del invitado. Al tratar con la escasez de memoria en el shadow pool asociado con un dominio, es posible que se eliminen las tablas de p\u00e1ginas de shadows. Esta eliminaci\u00f3n puede incluir la shadow de la tabla de p\u00e1gina ra\u00edz en la que se est\u00e1 ejecutando actualmente la CPU en cuesti\u00f3n. Si bien existe una precauci\u00f3n para supuestamente evitar la eliminaci\u00f3n de la tabla de las p\u00e1ginas activas subyacente, el per\u00edodo de tiempo cubierto por esa precauci\u00f3n no es lo suficientemente grande." } ], "id": "CVE-2023-34322", "lastModified": "2024-01-11T17:07:43.207", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-05T17:15:08.447", "references": [ { "source": "security@xen.org", "tags": [ "Vendor Advisory" ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ], "sourceIdentifier": "security@xen.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-273" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
wid-sec-w-2023-2399
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in Xen ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service zu verursachen oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2399 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2399.json" }, { "category": "self", "summary": "WID-SEC-2023-2399 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2399" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4476-1 vom 2023-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:4475-1 vom 2023-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3894-1 vom 2023-09-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016464.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3903-1 vom 2023-09-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3902-1 vom 2023-09-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3895-1 vom 2023-09-29", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3832-1 vom 2023-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016360.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:3831-1 vom 2023-09-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-September/016361.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-35D2AD2328 vom 2023-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-35d2ad2328" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-948136565A vom 2023-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-948136565a" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2023-4125279976 vom 2023-09-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-4125279976" }, { "category": "external", "summary": "Xen Security Advisory vom 2023-09-19", "url": "https://xenbits.xen.org/xsa/advisory-438.html" } ], "source_lang": "en-US", "title": "Xen: Schwachstelle erm\u00f6glicht Privilegieneskalation, DoS und Offenlegung von Informationen", "tracking": { "current_release_date": "2023-11-16T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:58:38.725+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2399", "initial_release_date": "2023-09-19T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-09-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-10-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-11-16T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source Xen \u003c 438-4.15.patch", "product": { "name": "Open Source Xen \u003c 438-4.15.patch", "product_id": "T029991", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:438-4.15.patch" } } }, { "category": "product_name", "name": "Open Source Xen \u003c 438-4.16.patch", "product": { "name": "Open Source Xen \u003c 438-4.16.patch", "product_id": "T029992", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:438-4.16.patch" } } }, { "category": "product_name", "name": "Open Source Xen \u003c 438-4.17.patch", "product": { "name": "Open Source Xen \u003c 438-4.17.patch", "product_id": "T029993", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:438-4.17.patch" } } }, { "category": "product_name", "name": "Open Source Xen \u003c 438.patch", "product": { "name": "Open Source Xen \u003c 438.patch", "product_id": "T029994", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:438.patch" } } } ], "category": "product_name", "name": "Xen" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-34322", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Xen. Wenn PV-G\u00e4ste im Shadow-Paging-Modus ausgef\u00fchrt werden, kommt es unter bestimmten Umst\u00e4nden zu einer unsachgem\u00e4\u00dfen Behandlung der \"shadow root page table\". Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um potentiell seine Rechte zu erweitern, einen Denial of Service zu verursachen oder Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T002207", "74185" ] }, "release_date": "2023-09-19T22:00:00.000+00:00", "title": "CVE-2023-34322" } ] }
ghsa-3qxp-p56x-r4h3
Vulnerability from github
For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. Since Xen itself needs to be mapped when PV guests run, Xen and shadowed PV guests run directly the respective shadow page tables. For 64-bit PV guests this means running on the shadow of the guest root page table.
In the course of dealing with shortage of memory in the shadow pool associated with a domain, shadows of page tables may be torn down. This tearing down may include the shadow root page table that the CPU in question is presently running on. While a precaution exists to supposedly prevent the tearing down of the underlying live page table, the time window covered by that precaution isn't large enough.
{ "affected": [], "aliases": [ "CVE-2023-34322" ], "database_specific": { "cwe_ids": [ "CWE-273" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-05T17:15:08Z", "severity": "HIGH" }, "details": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.", "id": "GHSA-3qxp-p56x-r4h3", "modified": "2025-06-16T21:31:16Z", "published": "2024-01-05T18:30:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34322" }, { "type": "WEB", "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2023-34322
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
▶ | URL | Tags | |
---|---|---|---|
security@xen.org | https://xenbits.xenproject.org/xsa/advisory-438.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://xenbits.xenproject.org/xsa/advisory-438.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "matchCriteriaId": "4E4B3C8C-CD2C-4F4F-8F8F-8E1B769333E7", "versionEndExcluding": "4.15.0", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "For migration as well as to work around kernels unaware of L1TF (see\nXSA-273), PV guests may be run in shadow paging mode. Since Xen itself\nneeds to be mapped when PV guests run, Xen and shadowed PV guests run\ndirectly the respective shadow page tables. For 64-bit PV guests this\nmeans running on the shadow of the guest root page table.\n\nIn the course of dealing with shortage of memory in the shadow pool\nassociated with a domain, shadows of page tables may be torn down. This\ntearing down may include the shadow root page table that the CPU in\nquestion is presently running on. While a precaution exists to\nsupposedly prevent the tearing down of the underlying live page table,\nthe time window covered by that precaution isn\u0027t large enough.\n" }, { "lang": "es", "value": "Para la migraci\u00f3n, as\u00ed como para evitar kernels que no conocen L1TF (consulte XSA-273), los invitados PV pueden ejecutarse en modo de p\u00e1gina oculta. Dado que el propio Xen debe mapearse cuando se ejecutan las maquinas PV de invitado, Xen y las shadowed PV de invitado ejecutan directamente las respectivas tablas de p\u00e1ginas ocultas. Para invitados PV de 64 bits, esto significa ejecutar en la shadow de la tabla de p\u00e1gina ra\u00edz del invitado. Al tratar con la escasez de memoria en el shadow pool asociado con un dominio, es posible que se eliminen las tablas de p\u00e1ginas de shadows. Esta eliminaci\u00f3n puede incluir la shadow de la tabla de p\u00e1gina ra\u00edz en la que se est\u00e1 ejecutando actualmente la CPU en cuesti\u00f3n. Si bien existe una precauci\u00f3n para supuestamente evitar la eliminaci\u00f3n de la tabla de las p\u00e1ginas activas subyacente, el per\u00edodo de tiempo cubierto por esa precauci\u00f3n no es lo suficientemente grande." } ], "id": "CVE-2023-34322", "lastModified": "2025-06-16T19:15:22.347", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-01-05T17:15:08.447", "references": [ { "source": "security@xen.org", "tags": [ "Vendor Advisory" ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" } ], "sourceIdentifier": "security@xen.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-273" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-273" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.