Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-45817 (GCVE-0-2024-45817)
Vulnerability from cvelistv5
Published
2024-09-25 10:31
Modified
2024-11-20 21:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register. Furthermore, the OS
can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-25T11:03:12.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://xenbits.xen.org/xsa/advisory-462.html" }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/24/1" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45817", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T13:35:45.402325Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-20T21:33:14.401Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Xen", "vendor": "Xen", "versions": [ { "status": "unknown", "version": "consult Xen advisory XSA-462" } ] } ], "configurations": [ { "lang": "en", "value": "Xen 4.5 and onwards are vulnerable. Xen 4.4 and older are not vulnerable.\n\nOnly x86 systems running HVM or PVH guests are vulnerable.\nArchitectures other than x86 are not vulnerable.\n\nOnly HVM or PVH guests can leverage the vulnerability. PV guests cannot\nleverage the vulnerability." } ], "credits": [ { "lang": "en", "type": "finder", "value": "This issue was discovered after a BUGSENG team working on MISRA C\ncompliance of Xen pointed attention to ECLAIR reports for MISRA C Rule\n17.2 (Functions shall not call themselves, either directly or\nindirectly)." } ], "datePublic": "2024-09-24T10:46:00Z", "descriptions": [ { "lang": "en", "value": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "A buggy or malicious HVM or PVH guest can deadlock Xen, leading to a\nDoS." } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T10:31:57.371Z", "orgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "shortName": "XEN" }, "references": [ { "url": "https://xenbits.xenproject.org/xsa/advisory-462.html" } ], "title": "x86: Deadlock in vlapic_error()", "workarounds": [ { "lang": "en", "value": "Not running untrusted HVM or PVH VMs will avoid this vulnerability." } ] } }, "cveMetadata": { "assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f", "assignerShortName": "XEN", "cveId": "CVE-2024-45817", "datePublished": "2024-09-25T10:31:57.371Z", "dateReserved": "2024-09-09T14:43:11.826Z", "dateUpdated": "2024-11-20T21:33:14.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-45817\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2024-09-25T11:15:12.277\",\"lastModified\":\"2024-11-21T09:38:08.627\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\\nerror conditions are reported in a status register. Furthermore, the OS\\ncan opt to receive an interrupt when a new error occurs.\\n\\nIt is possible to configure the error interrupt with an illegal vector,\\nwhich generates an error when an error interrupt is raised.\\n\\nThis case causes Xen to recurse through vlapic_error(). The recursion\\nitself is bounded; errors accumulate in the the status register and only\\ngenerate an interrupt when a new status bit becomes set.\\n\\nHowever, the lock protecting this state in Xen will try to be taken\\nrecursively, and deadlock.\"},{\"lang\":\"es\",\"value\":\"En la arquitectura APIC (Advanced Programmable Interrupt Controller) de x86, las condiciones de error se informan en un registro de estado. Adem\u00e1s, el sistema operativo puede optar por recibir una interrupci\u00f3n cuando se produce un nuevo error. Es posible configurar la interrupci\u00f3n de error con un vector ilegal, que genera un error cuando se genera una interrupci\u00f3n de error. Este caso hace que Xen recurra a trav\u00e9s de vlapic_error(). La recursi\u00f3n en s\u00ed est\u00e1 limitada; los errores se acumulan en el registro de estado y solo generan una interrupci\u00f3n cuando se establece un nuevo bit de estado. Sin embargo, el bloqueo que protege este estado en Xen intentar\u00e1 tomarse de forma recursiva y se producir\u00e1 un bloqueo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-209\"}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-462.html\",\"source\":\"security@xen.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/09/24/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-462.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://xenbits.xen.org/xsa/advisory-462.html\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/09/24/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-09-25T11:03:12.931Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45817\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-25T13:35:45.402325Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-209\", \"description\": \"CWE-209 Generation of Error Message Containing Sensitive Information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-25T13:35:51.618Z\"}}], \"cna\": {\"title\": \"x86: Deadlock in vlapic_error()\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered after a BUGSENG team working on MISRA C\\ncompliance of Xen pointed attention to ECLAIR reports for MISRA C Rule\\n17.2 (Functions shall not call themselves, either directly or\\nindirectly).\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"A buggy or malicious HVM or PVH guest can deadlock Xen, leading to a\\nDoS.\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-462\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2024-09-24T10:46:00Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-462.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Not running untrusted HVM or PVH VMs will avoid this vulnerability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\\nerror conditions are reported in a status register. Furthermore, the OS\\ncan opt to receive an interrupt when a new error occurs.\\n\\nIt is possible to configure the error interrupt with an illegal vector,\\nwhich generates an error when an error interrupt is raised.\\n\\nThis case causes Xen to recurse through vlapic_error(). The recursion\\nitself is bounded; errors accumulate in the the status register and only\\ngenerate an interrupt when a new status bit becomes set.\\n\\nHowever, the lock protecting this state in Xen will try to be taken\\nrecursively, and deadlock.\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Xen 4.5 and onwards are vulnerable. Xen 4.4 and older are not vulnerable.\\n\\nOnly x86 systems running HVM or PVH guests are vulnerable.\\nArchitectures other than x86 are not vulnerable.\\n\\nOnly HVM or PVH guests can leverage the vulnerability. PV guests cannot\\nleverage the vulnerability.\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2024-09-25T10:31:57.371Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-45817\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-20T21:33:14.401Z\", \"dateReserved\": \"2024-09-09T14:43:11.826Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2024-09-25T10:31:57.371Z\", \"assignerShortName\": \"XEN\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2024:3980-1
Vulnerability from csaf_suse
Published
2024-11-12 16:14
Modified
2024-11-12 16:14
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security issues fixed:
- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)
- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)
- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)
Non-security issues fixed:
- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)
- Upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2024-3980,SUSE-SLE-Micro-5.5-2024-3980,SUSE-SLE-Module-Basesystem-15-SP5-2024-3980,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3980,openSUSE-Leap-Micro-5.5-2024-3980,openSUSE-SLE-15.5-2024-3980
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)\n- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)\n- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)\n\nNon-security issues fixed:\n\n- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)\n- Upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3980,SUSE-SLE-Micro-5.5-2024-3980,SUSE-SLE-Module-Basesystem-15-SP5-2024-3980,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3980,openSUSE-Leap-Micro-5.5-2024-3980,openSUSE-SLE-15.5-2024-3980", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3980-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3980-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243980-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3980-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE Bug 1232542", "url": "https://bugzilla.suse.com/1232542" }, { "category": "self", "summary": "SUSE Bug 1232622", "url": "https://bugzilla.suse.com/1232622" }, { "category": "self", "summary": "SUSE Bug 1232624", "url": "https://bugzilla.suse.com/1232624" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45818 page", "url": "https://www.suse.com/security/cve/CVE-2024-45818/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45819 page", "url": "https://www.suse.com/security/cve/CVE-2024-45819/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-11-12T16:14:09Z", "generator": { "date": "2024-11-12T16:14:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3980-1", "initial_release_date": "2024-11-12T16:14:09Z", "revision_history": [ { "date": "2024-11-12T16:14:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-4.17.5_06-150500.3.42.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-devel-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-devel-4.17.5_06-150500.3.42.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-doc-html-4.17.5_06-150500.3.42.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-libs-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-libs-4.17.5_06-150500.3.42.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-tools-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-tools-4.17.5_06-150500.3.42.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "product": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "product_id": "xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.17.5_06-150500.3.42.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.17.5_06-150500.3.42.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.17.5_06-150500.3.42.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.17.5_06-150500.3.42.1.i586", "product": { "name": "xen-devel-4.17.5_06-150500.3.42.1.i586", "product_id": "xen-devel-4.17.5_06-150500.3.42.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.17.5_06-150500.3.42.1.i586", "product": { "name": "xen-libs-4.17.5_06-150500.3.42.1.i586", "product_id": "xen-libs-4.17.5_06-150500.3.42.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.i586", "product": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.i586", "product_id": "xen-tools-domU-4.17.5_06-150500.3.42.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-devel-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-devel-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-doc-html-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-libs-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-tools-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-tools-4.17.5_06-150500.3.42.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "product": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "product_id": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.5", "product": { "name": "openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-devel-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_06-150500.3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-tools-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-devel-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-devel-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-libs-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-libs-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-tools-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-tools-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64" }, "product_reference": "xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-12T16:14:09Z", "details": "moderate" } ], "title": "CVE-2024-45817" }, { "cve": "CVE-2024-45818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45818" } ], "notes": [ { "category": "general", "text": "The hypervisor contains code to accelerate VGA memory accesses for HVM\nguests, when the (virtual) VGA is in \"standard\" mode. Locking involved\nthere has an unusual discipline, leaving a lock acquired past the\nreturn from the function that acquired it. This behavior results in a\nproblem when emulating an instruction with two memory accesses, both of\nwhich touch VGA memory (plus some further constraints which aren\u0027t\nrelevant here). When emulating the 2nd access, the lock that is already\nbeing held would be attempted to be re-acquired, resulting in a\ndeadlock.\n\nThis deadlock was already found when the code was first introduced, but\nwas analysed incorrectly and the fix was incomplete. Analysis in light\nof the new finding cannot find a way to make the existing locking\ndiscipline work.\n\nIn staging, this logic has all been removed because it was discovered\nto be accidentally disabled since Xen 4.7. Therefore, we are fixing the\nlocking problem by backporting the removal of most of the feature. Note\nthat even with the feature disabled, the lock would still be acquired\nfor any accesses to the VGA MMIO region.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45818", "url": "https://www.suse.com/security/cve/CVE-2024-45818" }, { "category": "external", "summary": "SUSE Bug 1232622 for CVE-2024-45818", "url": "https://bugzilla.suse.com/1232622" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-12T16:14:09Z", "details": "moderate" } ], "title": "CVE-2024-45818" }, { "cve": "CVE-2024-45819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45819" } ], "notes": [ { "category": "general", "text": "PVH guests have their ACPI tables constructed by the toolstack. The\nconstruction involves building the tables in local memory, which are\nthen copied into guest memory. While actually used parts of the local\nmemory are filled in correctly, excess space that is being allocated is\nleft with its prior contents.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45819", "url": "https://www.suse.com/security/cve/CVE-2024-45819" }, { "category": "external", "summary": "SUSE Bug 1232624 for CVE-2024-45819", "url": "https://bugzilla.suse.com/1232624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_06-150500.3.42.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_06-150500.3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-12T16:14:09Z", "details": "moderate" } ], "title": "CVE-2024-45819" } ] }
suse-su-2024:3423-1
Vulnerability from csaf_suse
Published
2024-09-24 15:25
Modified
2024-09-24 15:25
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)
- CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355)
- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460, bsc#1228574)
- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461, bsc#1228575)
- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
Patchnames
SUSE-2024-3423,SUSE-SLE-Micro-5.3-2024-3423,SUSE-SLE-Micro-5.4-2024-3423,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3423,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3423,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3423,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3423
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)\n- CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355)\n- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460, bsc#1228574)\n- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461, bsc#1228575)\n- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3423,SUSE-SLE-Micro-5.3-2024-3423,SUSE-SLE-Micro-5.4-2024-3423,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3423,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3423,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3423,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3423,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3423", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3423-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3423-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243423-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3423-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" }, { "category": "self", "summary": "SUSE Bug 1222453", "url": "https://bugzilla.suse.com/1222453" }, { "category": "self", "summary": "SUSE Bug 1227355", "url": "https://bugzilla.suse.com/1227355" }, { "category": "self", "summary": "SUSE Bug 1228574", "url": "https://bugzilla.suse.com/1228574" }, { "category": "self", "summary": "SUSE Bug 1228575", "url": "https://bugzilla.suse.com/1228575" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-2201 page", "url": "https://www.suse.com/security/cve/CVE-2024-2201/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31143 page", "url": "https://www.suse.com/security/cve/CVE-2024-31143/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31145 page", "url": "https://www.suse.com/security/cve/CVE-2024-31145/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31146 page", "url": "https://www.suse.com/security/cve/CVE-2024-31146/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-09-24T15:25:42Z", "generator": { "date": "2024-09-24T15:25:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3423-1", "initial_release_date": "2024-09-24T15:25:42Z", "revision_history": [ { "date": "2024-09-24T15:25:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-4.16.6_04-150400.4.62.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-devel-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-devel-4.16.6_04-150400.4.62.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-doc-html-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-doc-html-4.16.6_04-150400.4.62.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-libs-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-libs-4.16.6_04-150400.4.62.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-tools-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-tools-4.16.6_04-150400.4.62.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.aarch64", "product": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.aarch64", "product_id": "xen-tools-domU-4.16.6_04-150400.4.62.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.16.6_04-150400.4.62.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.16.6_04-150400.4.62.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.16.6_04-150400.4.62.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.16.6_04-150400.4.62.1.i586", "product": { "name": "xen-devel-4.16.6_04-150400.4.62.1.i586", "product_id": "xen-devel-4.16.6_04-150400.4.62.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.16.6_04-150400.4.62.1.i586", "product": { "name": "xen-libs-4.16.6_04-150400.4.62.1.i586", "product_id": "xen-libs-4.16.6_04-150400.4.62.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.i586", "product": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.i586", "product_id": "xen-tools-domU-4.16.6_04-150400.4.62.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-devel-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-doc-html-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-doc-html-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-libs-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-libs-32bit-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-libs-32bit-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-tools-4.16.6_04-150400.4.62.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "product": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "product_id": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4", "product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-devel-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-libs-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64" }, "product_reference": "xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-2201", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-2201" } ], "notes": [ { "category": "general", "text": "A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-2201", "url": "https://www.suse.com/security/cve/CVE-2024-2201" }, { "category": "external", "summary": "SUSE Bug 1212111 for CVE-2024-2201", "url": "https://bugzilla.suse.com/1212111" }, { "category": "external", "summary": "SUSE Bug 1217339 for CVE-2024-2201", "url": "https://bugzilla.suse.com/1217339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:42Z", "details": "moderate" } ], "title": "CVE-2024-2201" }, { "cve": "CVE-2024-31143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31143" } ], "notes": [ { "category": "general", "text": "An optional feature of PCI MSI called \"Multiple Message\" allows a\ndevice to use multiple consecutive interrupt vectors. Unlike for MSI-X,\nthe setting up of these consecutive vectors needs to happen all in one\ngo. In this handling an error path could be taken in different\nsituations, with or without a particular lock held. This error path\nwrongly releases the lock even when it is not currently held.\n", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31143", "url": "https://www.suse.com/security/cve/CVE-2024-31143" }, { "category": "external", "summary": "SUSE Bug 1227355 for CVE-2024-31143", "url": "https://bugzilla.suse.com/1227355" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:42Z", "details": "important" } ], "title": "CVE-2024-31143" }, { "cve": "CVE-2024-31145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31145" } ], "notes": [ { "category": "general", "text": "Certain PCI devices in a system might be assigned Reserved Memory\nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for\nIntel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used\nfor platform tasks such as legacy USB emulation.\n\nSince the precise purpose of these regions is unknown, once a device\nassociated with such a region is active, the mappings of these regions\nneed to remain continuouly accessible by the device. In the logic\nestablishing these mappings, error handling was flawed, resulting in\nsuch mappings to potentially remain in place when they should have been\nremoved again. Respective guests would then gain access to memory\nregions which they aren\u0027t supposed to have access to.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31145", "url": "https://www.suse.com/security/cve/CVE-2024-31145" }, { "category": "external", "summary": "SUSE Bug 1228574 for CVE-2024-31145", "url": "https://bugzilla.suse.com/1228574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:42Z", "details": "important" } ], "title": "CVE-2024-31145" }, { "cve": "CVE-2024-31146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31146" } ], "notes": [ { "category": "general", "text": "When multiple devices share resources and one of them is to be passed\nthrough to a guest, security of the entire system and of respective\nguests individually cannot really be guaranteed without knowing\ninternals of any of the involved guests. Therefore such a configuration\ncannot really be security-supported, yet making that explicit was so far\nmissing.\n\nResources the sharing of which is known to be problematic include, but\nare not limited to\n- - PCI Base Address Registers (BARs) of multiple devices mapping to the\n same page (4k on x86),\n- - INTx lines.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31146", "url": "https://www.suse.com/security/cve/CVE-2024-31146" }, { "category": "external", "summary": "SUSE Bug 1228575 for CVE-2024-31146", "url": "https://bugzilla.suse.com/1228575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:42Z", "details": "moderate" } ], "title": "CVE-2024-31146" }, { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Proxy 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Proxy 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch", "SUSE Manager Server 4.3:xen-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-devel-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-libs-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-domU-4.16.6_04-150400.4.62.1.x86_64", "SUSE Manager Server 4.3:xen-tools-xendomains-wait-disk-4.16.6_04-150400.4.62.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:42Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
suse-su-2024:4073-1
Vulnerability from csaf_suse
Published
2024-11-27 07:34
Modified
2024-11-27 07:34
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security issues fixed:
- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)
- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)
- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)
Non-security issue fixed:
- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)
Patchnames
SUSE-2024-4073,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4073,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4073,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4073
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)\n- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)\n- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)\n\nNon-security issue fixed:\n\n- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4073,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4073,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4073,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4073", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4073-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4073-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244073-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4073-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019847.html" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE Bug 1232542", "url": "https://bugzilla.suse.com/1232542" }, { "category": "self", "summary": "SUSE Bug 1232622", "url": "https://bugzilla.suse.com/1232622" }, { "category": "self", "summary": "SUSE Bug 1232624", "url": "https://bugzilla.suse.com/1232624" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45818 page", "url": "https://www.suse.com/security/cve/CVE-2024-45818/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45819 page", "url": "https://www.suse.com/security/cve/CVE-2024-45819/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-11-27T07:34:47Z", "generator": { "date": "2024-11-27T07:34:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4073-1", "initial_release_date": "2024-11-27T07:34:47Z", "revision_history": [ { "date": "2024-11-27T07:34:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-4.13.5_16-150200.3.99.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-devel-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-devel-4.13.5_16-150200.3.99.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-doc-html-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-doc-html-4.13.5_16-150200.3.99.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-libs-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-libs-4.13.5_16-150200.3.99.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-tools-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-tools-4.13.5_16-150200.3.99.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.aarch64", "product": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.aarch64", "product_id": "xen-tools-domU-4.13.5_16-150200.3.99.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.13.5_16-150200.3.99.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.13.5_16-150200.3.99.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.13.5_16-150200.3.99.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.13.5_16-150200.3.99.1.i586", "product": { "name": "xen-devel-4.13.5_16-150200.3.99.1.i586", "product_id": "xen-devel-4.13.5_16-150200.3.99.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.13.5_16-150200.3.99.1.i586", "product": { "name": "xen-libs-4.13.5_16-150200.3.99.1.i586", "product_id": "xen-libs-4.13.5_16-150200.3.99.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.i586", "product": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.i586", "product_id": "xen-tools-domU-4.13.5_16-150200.3.99.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-devel-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-devel-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-doc-html-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-doc-html-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-libs-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-libs-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-libs-32bit-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-libs-32bit-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-tools-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-tools-4.13.5_16-150200.3.99.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "product": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "product_id": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-devel-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-libs-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-devel-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-libs-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-devel-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-libs-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64" }, "product_reference": "xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-27T07:34:47Z", "details": "moderate" } ], "title": "CVE-2024-45817" }, { "cve": "CVE-2024-45818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45818" } ], "notes": [ { "category": "general", "text": "The hypervisor contains code to accelerate VGA memory accesses for HVM\nguests, when the (virtual) VGA is in \"standard\" mode. Locking involved\nthere has an unusual discipline, leaving a lock acquired past the\nreturn from the function that acquired it. This behavior results in a\nproblem when emulating an instruction with two memory accesses, both of\nwhich touch VGA memory (plus some further constraints which aren\u0027t\nrelevant here). When emulating the 2nd access, the lock that is already\nbeing held would be attempted to be re-acquired, resulting in a\ndeadlock.\n\nThis deadlock was already found when the code was first introduced, but\nwas analysed incorrectly and the fix was incomplete. Analysis in light\nof the new finding cannot find a way to make the existing locking\ndiscipline work.\n\nIn staging, this logic has all been removed because it was discovered\nto be accidentally disabled since Xen 4.7. Therefore, we are fixing the\nlocking problem by backporting the removal of most of the feature. Note\nthat even with the feature disabled, the lock would still be acquired\nfor any accesses to the VGA MMIO region.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45818", "url": "https://www.suse.com/security/cve/CVE-2024-45818" }, { "category": "external", "summary": "SUSE Bug 1232622 for CVE-2024-45818", "url": "https://bugzilla.suse.com/1232622" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-27T07:34:47Z", "details": "moderate" } ], "title": "CVE-2024-45818" }, { "cve": "CVE-2024-45819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45819" } ], "notes": [ { "category": "general", "text": "PVH guests have their ACPI tables constructed by the toolstack. The\nconstruction involves building the tables in local memory, which are\nthen copied into guest memory. While actually used parts of the local\nmemory are filled in correctly, excess space that is being allocated is\nleft with its prior contents.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45819", "url": "https://www.suse.com/security/cve/CVE-2024-45819" }, { "category": "external", "summary": "SUSE Bug 1232624 for CVE-2024-45819", "url": "https://bugzilla.suse.com/1232624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_16-150200.3.99.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_16-150200.3.99.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-27T07:34:47Z", "details": "moderate" } ], "title": "CVE-2024-45819" } ] }
suse-su-2024:3421-1
Vulnerability from csaf_suse
Published
2024-09-24 15:25
Modified
2024-09-24 15:25
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
Patchnames
SUSE-2024-3421,SUSE-SLE-Micro-5.5-2024-3421,SUSE-SLE-Module-Basesystem-15-SP5-2024-3421,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3421,openSUSE-Leap-Micro-5.5-2024-3421,openSUSE-SLE-15.5-2024-3421
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3421,SUSE-SLE-Micro-5.5-2024-3421,SUSE-SLE-Module-Basesystem-15-SP5-2024-3421,SUSE-SLE-Module-Server-Applications-15-SP5-2024-3421,openSUSE-Leap-Micro-5.5-2024-3421,openSUSE-SLE-15.5-2024-3421", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3421-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3421-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243421-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3421-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019510.html" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-09-24T15:25:08Z", "generator": { "date": "2024-09-24T15:25:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3421-1", "initial_release_date": "2024-09-24T15:25:08Z", "revision_history": [ { "date": "2024-09-24T15:25:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-4.17.5_04-150500.3.39.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-devel-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-devel-4.17.5_04-150500.3.39.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-doc-html-4.17.5_04-150500.3.39.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-libs-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-libs-4.17.5_04-150500.3.39.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-tools-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-tools-4.17.5_04-150500.3.39.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "product": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "product_id": "xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.17.5_04-150500.3.39.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.17.5_04-150500.3.39.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.17.5_04-150500.3.39.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.17.5_04-150500.3.39.1.i586", "product": { "name": "xen-devel-4.17.5_04-150500.3.39.1.i586", "product_id": "xen-devel-4.17.5_04-150500.3.39.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.17.5_04-150500.3.39.1.i586", "product": { "name": "xen-libs-4.17.5_04-150500.3.39.1.i586", "product_id": "xen-libs-4.17.5_04-150500.3.39.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.i586", "product": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.i586", "product_id": "xen-tools-domU-4.17.5_04-150500.3.39.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-devel-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-devel-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-doc-html-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-libs-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-tools-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-tools-4.17.5_04-150500.3.39.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "product": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "product_id": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.5", "product": { "name": "openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-devel-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_04-150500.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-tools-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-devel-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-devel-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-libs-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-libs-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-tools-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-tools-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64" }, "product_reference": "xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64" }, "product_reference": "xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-devel-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-doc-html-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-32bit-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.aarch64", "openSUSE Leap 15.5:xen-tools-domU-4.17.5_04-150500.3.39.1.x86_64", "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1.noarch", "openSUSE Leap Micro 5.5:xen-libs-4.17.5_04-150500.3.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:08Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
suse-su-2024:4163-1
Vulnerability from csaf_suse
Published
2024-12-04 07:57
Modified
2024-12-04 07:57
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security issues fixed:
- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)
- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)
- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)
Non-security issues fixed:
- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)
- Upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2024-4163,SUSE-SLE-Module-Basesystem-15-SP6-2024-4163,SUSE-SLE-Module-Server-Applications-15-SP6-2024-4163,openSUSE-SLE-15.6-2024-4163
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)\n- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)\n- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)\n\nNon-security issues fixed:\n\n- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)\n- Upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4163,SUSE-SLE-Module-Basesystem-15-SP6-2024-4163,SUSE-SLE-Module-Server-Applications-15-SP6-2024-4163,openSUSE-SLE-15.6-2024-4163", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4163-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4163-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244163-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4163-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019907.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE Bug 1232542", "url": "https://bugzilla.suse.com/1232542" }, { "category": "self", "summary": "SUSE Bug 1232622", "url": "https://bugzilla.suse.com/1232622" }, { "category": "self", "summary": "SUSE Bug 1232624", "url": "https://bugzilla.suse.com/1232624" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45818 page", "url": "https://www.suse.com/security/cve/CVE-2024-45818/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45819 page", "url": "https://www.suse.com/security/cve/CVE-2024-45819/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-12-04T07:57:13Z", "generator": { "date": "2024-12-04T07:57:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4163-1", "initial_release_date": "2024-12-04T07:57:13Z", "revision_history": [ { "date": "2024-12-04T07:57:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-4.18.3_06-150600.3.12.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-devel-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-devel-4.18.3_06-150600.3.12.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-doc-html-4.18.3_06-150600.3.12.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-libs-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-libs-4.18.3_06-150600.3.12.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-tools-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-tools-4.18.3_06-150600.3.12.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "product": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "product_id": "xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.18.3_06-150600.3.12.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.18.3_06-150600.3.12.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.18.3_06-150600.3.12.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.18.3_06-150600.3.12.1.i586", "product": { "name": "xen-devel-4.18.3_06-150600.3.12.1.i586", "product_id": "xen-devel-4.18.3_06-150600.3.12.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.18.3_06-150600.3.12.1.i586", "product": { "name": "xen-libs-4.18.3_06-150600.3.12.1.i586", "product_id": "xen-libs-4.18.3_06-150600.3.12.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.i586", "product": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.i586", "product_id": "xen-tools-domU-4.18.3_06-150600.3.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-devel-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-devel-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-doc-html-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-libs-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-libs-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-tools-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-tools-4.18.3_06-150600.3.12.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "product": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "product_id": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_06-150600.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-libs-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_06-150600.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_06-150600.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-devel-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_06-150600.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-tools-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-devel-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-devel-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-libs-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-libs-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-tools-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-tools-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64" }, "product_reference": "xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64" }, "product_reference": "xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-12-04T07:57:13Z", "details": "moderate" } ], "title": "CVE-2024-45817" }, { "cve": "CVE-2024-45818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45818" } ], "notes": [ { "category": "general", "text": "The hypervisor contains code to accelerate VGA memory accesses for HVM\nguests, when the (virtual) VGA is in \"standard\" mode. Locking involved\nthere has an unusual discipline, leaving a lock acquired past the\nreturn from the function that acquired it. This behavior results in a\nproblem when emulating an instruction with two memory accesses, both of\nwhich touch VGA memory (plus some further constraints which aren\u0027t\nrelevant here). When emulating the 2nd access, the lock that is already\nbeing held would be attempted to be re-acquired, resulting in a\ndeadlock.\n\nThis deadlock was already found when the code was first introduced, but\nwas analysed incorrectly and the fix was incomplete. Analysis in light\nof the new finding cannot find a way to make the existing locking\ndiscipline work.\n\nIn staging, this logic has all been removed because it was discovered\nto be accidentally disabled since Xen 4.7. Therefore, we are fixing the\nlocking problem by backporting the removal of most of the feature. Note\nthat even with the feature disabled, the lock would still be acquired\nfor any accesses to the VGA MMIO region.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45818", "url": "https://www.suse.com/security/cve/CVE-2024-45818" }, { "category": "external", "summary": "SUSE Bug 1232622 for CVE-2024-45818", "url": "https://bugzilla.suse.com/1232622" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-12-04T07:57:13Z", "details": "moderate" } ], "title": "CVE-2024-45818" }, { "cve": "CVE-2024-45819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45819" } ], "notes": [ { "category": "general", "text": "PVH guests have their ACPI tables constructed by the toolstack. The\nconstruction involves building the tables in local memory, which are\nthen copied into guest memory. While actually used parts of the local\nmemory are filled in correctly, excess space that is being allocated is\nleft with its prior contents.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45819", "url": "https://www.suse.com/security/cve/CVE-2024-45819" }, { "category": "external", "summary": "SUSE Bug 1232624 for CVE-2024-45819", "url": "https://bugzilla.suse.com/1232624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_06-150600.3.12.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_06-150600.3.12.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-12-04T07:57:13Z", "details": "moderate" } ], "title": "CVE-2024-45819" } ] }
suse-su-2024:3424-1
Vulnerability from csaf_suse
Published
2024-09-24 15:25
Modified
2024-09-24 15:25
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2024-45817: Fixed a deadlock in vlapic_error. (bsc#1230366, XSA-462)
Patchnames
SUSE-2024-3424,SUSE-SLE-Module-Basesystem-15-SP6-2024-3424,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3424,openSUSE-SLE-15.6-2024-3424
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2024-45817: Fixed a deadlock in vlapic_error. (bsc#1230366, XSA-462) \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3424,SUSE-SLE-Module-Basesystem-15-SP6-2024-3424,SUSE-SLE-Module-Server-Applications-15-SP6-2024-3424,openSUSE-SLE-15.6-2024-3424", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3424-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3424-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243424-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3424-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019507.html" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-09-24T15:25:51Z", "generator": { "date": "2024-09-24T15:25:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3424-1", "initial_release_date": "2024-09-24T15:25:51Z", "revision_history": [ { "date": "2024-09-24T15:25:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-4.18.3_04-150600.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-devel-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-devel-4.18.3_04-150600.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-doc-html-4.18.3_04-150600.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-libs-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-libs-4.18.3_04-150600.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-tools-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-tools-4.18.3_04-150600.3.9.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "product": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "product_id": "xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.18.3_04-150600.3.9.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.18.3_04-150600.3.9.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.18.3_04-150600.3.9.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.18.3_04-150600.3.9.1.i586", "product": { "name": "xen-devel-4.18.3_04-150600.3.9.1.i586", "product_id": "xen-devel-4.18.3_04-150600.3.9.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.18.3_04-150600.3.9.1.i586", "product": { "name": "xen-libs-4.18.3_04-150600.3.9.1.i586", "product_id": "xen-libs-4.18.3_04-150600.3.9.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.i586", "product": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.i586", "product_id": "xen-tools-domU-4.18.3_04-150600.3.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-devel-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-devel-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-doc-html-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-libs-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-libs-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-tools-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-tools-4.18.3_04-150600.3.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "product": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "product_id": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_04-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-libs-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_04-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_04-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-devel-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_04-150600.3.9.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-tools-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-devel-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-devel-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-libs-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-libs-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-tools-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-tools-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64" }, "product_reference": "xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" }, "product_reference": "xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "SUSE Linux Enterprise Module for Server Applications 15 SP6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-devel-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-doc-html-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-32bit-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-libs-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.aarch64", "openSUSE Leap 15.6:xen-tools-domU-4.18.3_04-150600.3.9.1.x86_64", "openSUSE Leap 15.6:xen-tools-xendomains-wait-disk-4.18.3_04-150600.3.9.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:51Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
suse-su-2024:3432-1
Vulnerability from csaf_suse
Published
2024-09-25 08:07
Modified
2024-09-25 08:07
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
Patchnames
SUSE-2024-3432,SUSE-SLE-SDK-12-SP5-2024-3432,SUSE-SLE-SERVER-12-SP5-2024-3432
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3432,SUSE-SLE-SDK-12-SP5-2024-3432,SUSE-SLE-SERVER-12-SP5-2024-3432", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3432-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3432-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243432-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3432-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019519.html" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-09-25T08:07:49Z", "generator": { "date": "2024-09-25T08:07:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3432-1", "initial_release_date": "2024-09-25T08:07:49Z", "revision_history": [ { "date": "2024-09-25T08:07:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-4.12.4_54-3.118.1.aarch64", "product_id": "xen-4.12.4_54-3.118.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-devel-4.12.4_54-3.118.1.aarch64", "product_id": "xen-devel-4.12.4_54-3.118.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_54-3.118.1.aarch64", "product_id": "xen-doc-html-4.12.4_54-3.118.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-libs-4.12.4_54-3.118.1.aarch64", "product_id": "xen-libs-4.12.4_54-3.118.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-tools-4.12.4_54-3.118.1.aarch64", "product_id": "xen-tools-4.12.4_54-3.118.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_54-3.118.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_54-3.118.1.aarch64", "product_id": "xen-tools-domU-4.12.4_54-3.118.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_54-3.118.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_54-3.118.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_54-3.118.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_54-3.118.1.i586", "product": { "name": "xen-devel-4.12.4_54-3.118.1.i586", "product_id": "xen-devel-4.12.4_54-3.118.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_54-3.118.1.i586", "product": { "name": "xen-libs-4.12.4_54-3.118.1.i586", "product_id": "xen-libs-4.12.4_54-3.118.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_54-3.118.1.i586", "product": { "name": "xen-tools-domU-4.12.4_54-3.118.1.i586", "product_id": "xen-tools-domU-4.12.4_54-3.118.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-4.12.4_54-3.118.1.x86_64", "product_id": "xen-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-devel-4.12.4_54-3.118.1.x86_64", "product_id": "xen-devel-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_54-3.118.1.x86_64", "product_id": "xen-doc-html-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-libs-4.12.4_54-3.118.1.x86_64", "product_id": "xen-libs-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-tools-4.12.4_54-3.118.1.x86_64", "product_id": "xen-tools-4.12.4_54-3.118.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_54-3.118.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_54-3.118.1.x86_64", "product_id": "xen-tools-domU-4.12.4_54-3.118.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_54-3.118.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.aarch64" }, "product_reference": "xen-devel-4.12.4_54-3.118.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-devel-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-libs-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-tools-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-libs-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-tools-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_54-3.118.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_54-3.118.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_54-3.118.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_54-3.118.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-25T08:07:49Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
suse-su-2024:3422-1
Vulnerability from csaf_suse
Published
2024-09-24 15:25
Modified
2024-09-24 15:25
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
Patchnames
SUSE-2024-3422,SUSE-SUSE-MicroOS-5.1-2024-3422,SUSE-SUSE-MicroOS-5.2-2024-3422
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\n- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3422,SUSE-SUSE-MicroOS-5.1-2024-3422,SUSE-SUSE-MicroOS-5.2-2024-3422", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3422-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3422-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243422-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3422-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019509.html" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-09-24T15:25:24Z", "generator": { "date": "2024-09-24T15:25:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3422-1", "initial_release_date": "2024-09-24T15:25:24Z", "revision_history": [ { "date": "2024-09-24T15:25:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-4.14.6_20-150300.3.81.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-devel-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-devel-4.14.6_20-150300.3.81.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-doc-html-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-doc-html-4.14.6_20-150300.3.81.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-libs-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-libs-4.14.6_20-150300.3.81.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-tools-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-tools-4.14.6_20-150300.3.81.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.aarch64", "product": { "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.aarch64", "product_id": "xen-tools-domU-4.14.6_20-150300.3.81.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.14.6_20-150300.3.81.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.14.6_20-150300.3.81.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.14.6_20-150300.3.81.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.14.6_20-150300.3.81.1.i586", "product": { "name": "xen-devel-4.14.6_20-150300.3.81.1.i586", "product_id": "xen-devel-4.14.6_20-150300.3.81.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.14.6_20-150300.3.81.1.i586", "product": { "name": "xen-libs-4.14.6_20-150300.3.81.1.i586", "product_id": "xen-libs-4.14.6_20-150300.3.81.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.i586", "product": { "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.i586", "product_id": "xen-tools-domU-4.14.6_20-150300.3.81.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.14.6_20-150300.3.81.1.noarch", "product": { "name": "xen-tools-xendomains-wait-disk-4.14.6_20-150300.3.81.1.noarch", "product_id": "xen-tools-xendomains-wait-disk-4.14.6_20-150300.3.81.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xen-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-devel-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-devel-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-doc-html-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-doc-html-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-libs-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-libs-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-libs-32bit-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-libs-32bit-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-tools-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-tools-4.14.6_20-150300.3.81.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.x86_64", "product": { "name": "xen-tools-domU-4.14.6_20-150300.3.81.1.x86_64", "product_id": "xen-tools-domU-4.14.6_20-150300.3.81.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_20-150300.3.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_20-150300.3.81.1.x86_64" }, "product_reference": "xen-libs-4.14.6_20-150300.3.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.14.6_20-150300.3.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_20-150300.3.81.1.x86_64" }, "product_reference": "xen-libs-4.14.6_20-150300.3.81.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_20-150300.3.81.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_20-150300.3.81.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_20-150300.3.81.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_20-150300.3.81.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:xen-libs-4.14.6_20-150300.3.81.1.x86_64", "SUSE Linux Enterprise Micro 5.2:xen-libs-4.14.6_20-150300.3.81.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-09-24T15:25:24Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
suse-su-2024:3586-1
Vulnerability from csaf_suse
Published
2024-10-10 11:29
Modified
2024-10-10 11:29
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
Security fixes:
- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460) (bsc#1228574)
- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461) (bsc#1228575)
- CVE-2024-45817: Fixed Deadlock in vlapic_error() (XSA-462) (bsc#1230366)
Other fixes:
- Upstream bug fixes (bsc#1027519)
Patchnames
SUSE-2024-3586,SUSE-SLE-SDK-12-SP5-2024-3586,SUSE-SLE-SERVER-12-SP5-2024-3586
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460) (bsc#1228574)\n- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461) (bsc#1228575)\n- CVE-2024-45817: Fixed Deadlock in vlapic_error() (XSA-462) (bsc#1230366)\n\nOther fixes:\n\n- Upstream bug fixes (bsc#1027519)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-3586,SUSE-SLE-SDK-12-SP5-2024-3586,SUSE-SLE-SERVER-12-SP5-2024-3586", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_3586-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:3586-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20243586-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:3586-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1228574", "url": "https://bugzilla.suse.com/1228574" }, { "category": "self", "summary": "SUSE Bug 1228575", "url": "https://bugzilla.suse.com/1228575" }, { "category": "self", "summary": "SUSE Bug 1230366", "url": "https://bugzilla.suse.com/1230366" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31145 page", "url": "https://www.suse.com/security/cve/CVE-2024-31145/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-31146 page", "url": "https://www.suse.com/security/cve/CVE-2024-31146/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2024-10-10T11:29:45Z", "generator": { "date": "2024-10-10T11:29:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:3586-1", "initial_release_date": "2024-10-10T11:29:45Z", "revision_history": [ { "date": "2024-10-10T11:29:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-4.12.4_56-3.121.1.aarch64", "product_id": "xen-4.12.4_56-3.121.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-devel-4.12.4_56-3.121.1.aarch64", "product_id": "xen-devel-4.12.4_56-3.121.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-doc-html-4.12.4_56-3.121.1.aarch64", "product_id": "xen-doc-html-4.12.4_56-3.121.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-libs-4.12.4_56-3.121.1.aarch64", "product_id": "xen-libs-4.12.4_56-3.121.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-tools-4.12.4_56-3.121.1.aarch64", "product_id": "xen-tools-4.12.4_56-3.121.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_56-3.121.1.aarch64", "product": { "name": "xen-tools-domU-4.12.4_56-3.121.1.aarch64", "product_id": "xen-tools-domU-4.12.4_56-3.121.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-libs-64bit-4.12.4_56-3.121.1.aarch64_ilp32", "product": { "name": "xen-libs-64bit-4.12.4_56-3.121.1.aarch64_ilp32", "product_id": "xen-libs-64bit-4.12.4_56-3.121.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.12.4_56-3.121.1.i586", "product": { "name": "xen-devel-4.12.4_56-3.121.1.i586", "product_id": "xen-devel-4.12.4_56-3.121.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.12.4_56-3.121.1.i586", "product": { "name": "xen-libs-4.12.4_56-3.121.1.i586", "product_id": "xen-libs-4.12.4_56-3.121.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_56-3.121.1.i586", "product": { "name": "xen-tools-domU-4.12.4_56-3.121.1.i586", "product_id": "xen-tools-domU-4.12.4_56-3.121.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-4.12.4_56-3.121.1.x86_64", "product_id": "xen-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-devel-4.12.4_56-3.121.1.x86_64", "product_id": "xen-devel-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-doc-html-4.12.4_56-3.121.1.x86_64", "product_id": "xen-doc-html-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-libs-4.12.4_56-3.121.1.x86_64", "product_id": "xen-libs-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "product_id": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-tools-4.12.4_56-3.121.1.x86_64", "product_id": "xen-tools-4.12.4_56-3.121.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.12.4_56-3.121.1.x86_64", "product": { "name": "xen-tools-domU-4.12.4_56-3.121.1.x86_64", "product_id": "xen-tools-domU-4.12.4_56-3.121.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_56-3.121.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64" }, "product_reference": "xen-devel-4.12.4_56-3.121.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-devel-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-libs-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-tools-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-doc-html-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-libs-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-tools-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.12.4_56-3.121.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64" }, "product_reference": "xen-tools-domU-4.12.4_56-3.121.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-31145", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31145" } ], "notes": [ { "category": "general", "text": "Certain PCI devices in a system might be assigned Reserved Memory\nRegions (specified via Reserved Memory Region Reporting, \"RMRR\") for\nIntel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used\nfor platform tasks such as legacy USB emulation.\n\nSince the precise purpose of these regions is unknown, once a device\nassociated with such a region is active, the mappings of these regions\nneed to remain continuouly accessible by the device. In the logic\nestablishing these mappings, error handling was flawed, resulting in\nsuch mappings to potentially remain in place when they should have been\nremoved again. Respective guests would then gain access to memory\nregions which they aren\u0027t supposed to have access to.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31145", "url": "https://www.suse.com/security/cve/CVE-2024-31145" }, { "category": "external", "summary": "SUSE Bug 1228574 for CVE-2024-31145", "url": "https://bugzilla.suse.com/1228574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-10-10T11:29:45Z", "details": "important" } ], "title": "CVE-2024-31145" }, { "cve": "CVE-2024-31146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-31146" } ], "notes": [ { "category": "general", "text": "When multiple devices share resources and one of them is to be passed\nthrough to a guest, security of the entire system and of respective\nguests individually cannot really be guaranteed without knowing\ninternals of any of the involved guests. Therefore such a configuration\ncannot really be security-supported, yet making that explicit was so far\nmissing.\n\nResources the sharing of which is known to be problematic include, but\nare not limited to\n- - PCI Base Address Registers (BARs) of multiple devices mapping to the\n same page (4k on x86),\n- - INTx lines.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-31146", "url": "https://www.suse.com/security/cve/CVE-2024-31146" }, { "category": "external", "summary": "SUSE Bug 1228575 for CVE-2024-31146", "url": "https://bugzilla.suse.com/1228575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-10-10T11:29:45Z", "details": "moderate" } ], "title": "CVE-2024-31146" }, { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-10-10T11:29:45Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
opensuse-su-2024:14377-1
Vulnerability from csaf_opensuse
Published
2024-10-01 00:00
Modified
2024-10-01 00:00
Summary
xen-4.19.0_04-1.1 on GA media
Notes
Title of the patch
xen-4.19.0_04-1.1 on GA media
Description of the patch
These are all security issues fixed in the xen-4.19.0_04-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14377
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xen-4.19.0_04-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xen-4.19.0_04-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14377", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14377-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14377-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4E3MDUKJZYGF64AJQVOLAUGC4JH4NTPK/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14377-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4E3MDUKJZYGF64AJQVOLAUGC4JH4NTPK/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45817 page", "url": "https://www.suse.com/security/cve/CVE-2024-45817/" } ], "title": "xen-4.19.0_04-1.1 on GA media", "tracking": { "current_release_date": "2024-10-01T00:00:00Z", "generator": { "date": "2024-10-01T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14377-1", "initial_release_date": "2024-10-01T00:00:00Z", "revision_history": [ { "date": "2024-10-01T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.19.0_04-1.1.aarch64", "product": { "name": "xen-4.19.0_04-1.1.aarch64", "product_id": "xen-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.19.0_04-1.1.aarch64", "product": { "name": "xen-devel-4.19.0_04-1.1.aarch64", "product_id": "xen-devel-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.19.0_04-1.1.aarch64", "product": { "name": "xen-doc-html-4.19.0_04-1.1.aarch64", "product_id": "xen-doc-html-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.19.0_04-1.1.aarch64", "product": { "name": "xen-libs-4.19.0_04-1.1.aarch64", "product_id": "xen-libs-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.19.0_04-1.1.aarch64", "product": { "name": "xen-tools-4.19.0_04-1.1.aarch64", "product_id": "xen-tools-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.19.0_04-1.1.aarch64", "product": { "name": "xen-tools-domU-4.19.0_04-1.1.aarch64", "product_id": "xen-tools-domU-4.19.0_04-1.1.aarch64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "product": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "product_id": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-4.19.0_04-1.1.ppc64le", "product_id": "xen-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-devel-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-devel-4.19.0_04-1.1.ppc64le", "product_id": "xen-devel-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-doc-html-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-doc-html-4.19.0_04-1.1.ppc64le", "product_id": "xen-doc-html-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-libs-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-libs-4.19.0_04-1.1.ppc64le", "product_id": "xen-libs-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-tools-4.19.0_04-1.1.ppc64le", "product_id": "xen-tools-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-domU-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-tools-domU-4.19.0_04-1.1.ppc64le", "product_id": "xen-tools-domU-4.19.0_04-1.1.ppc64le" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "product": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "product_id": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xen-4.19.0_04-1.1.s390x", "product": { "name": "xen-4.19.0_04-1.1.s390x", "product_id": "xen-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-devel-4.19.0_04-1.1.s390x", "product": { "name": "xen-devel-4.19.0_04-1.1.s390x", "product_id": "xen-devel-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-doc-html-4.19.0_04-1.1.s390x", "product": { "name": "xen-doc-html-4.19.0_04-1.1.s390x", "product_id": "xen-doc-html-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-libs-4.19.0_04-1.1.s390x", "product": { "name": "xen-libs-4.19.0_04-1.1.s390x", "product_id": "xen-libs-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-4.19.0_04-1.1.s390x", "product": { "name": "xen-tools-4.19.0_04-1.1.s390x", "product_id": "xen-tools-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-domU-4.19.0_04-1.1.s390x", "product": { "name": "xen-tools-domU-4.19.0_04-1.1.s390x", "product_id": "xen-tools-domU-4.19.0_04-1.1.s390x" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "product": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "product_id": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xen-4.19.0_04-1.1.x86_64", "product": { "name": "xen-4.19.0_04-1.1.x86_64", "product_id": "xen-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.19.0_04-1.1.x86_64", "product": { "name": "xen-devel-4.19.0_04-1.1.x86_64", "product_id": "xen-devel-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.19.0_04-1.1.x86_64", "product": { "name": "xen-doc-html-4.19.0_04-1.1.x86_64", "product_id": "xen-doc-html-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.19.0_04-1.1.x86_64", "product": { "name": "xen-libs-4.19.0_04-1.1.x86_64", "product_id": "xen-libs-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.19.0_04-1.1.x86_64", "product": { "name": "xen-tools-4.19.0_04-1.1.x86_64", "product_id": "xen-tools-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.19.0_04-1.1.x86_64", "product": { "name": "xen-tools-domU-4.19.0_04-1.1.x86_64", "product_id": "xen-tools-domU-4.19.0_04-1.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64", "product": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64", "product_id": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.19.0_04-1.1.s390x" }, "product_reference": "xen-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-devel-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-devel-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.s390x" }, "product_reference": "xen-devel-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-devel-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-doc-html-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-doc-html-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.s390x" }, "product_reference": "xen-doc-html-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-doc-html-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-libs-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-libs-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.s390x" }, "product_reference": "xen-libs-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-libs-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-tools-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-tools-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.s390x" }, "product_reference": "xen-tools-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-tools-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-tools-domU-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-tools-domU-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.s390x" }, "product_reference": "xen-tools-domU-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-tools-domU-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le" }, "product_reference": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x" }, "product_reference": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45817" } ], "notes": [ { "category": "general", "text": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45817", "url": "https://www.suse.com/security/cve/CVE-2024-45817" }, { "category": "external", "summary": "SUSE Bug 1230366 for CVE-2024-45817", "url": "https://bugzilla.suse.com/1230366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-devel-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-doc-html-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-libs-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.19.0_04-1.1.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.19.0_04-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-10-01T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45817" } ] }
wid-sec-w-2024-2209
Vulnerability from csaf_certbund
Published
2024-09-24 22:00
Modified
2024-12-26 23:00
Summary
XEN, Citrix XenServer und Hypervisor: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) für die darauf laufenden Systeme (Domains) paravirtualisiert.
Citrix XenServer ist eine Lösung für das Management, die Konfiguration und den Betrieb virtueller Maschinen auf Servern.
Citrix Hypervisor ist eine Plattform für Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.
Angriff
Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in XEN, Citrix XenServer und Citrix Systems Hypervisor ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Xen ist ein Virtueller-Maschinen-Monitor (VMM), der Hardware (x86, IA-64, PowerPC) f\u00fcr die darauf laufenden Systeme (Domains) paravirtualisiert.\r\nCitrix XenServer ist eine L\u00f6sung f\u00fcr das Management, die Konfiguration und den Betrieb virtueller Maschinen auf Servern.\r\nCitrix Hypervisor ist eine Plattform f\u00fcr Desktop-, Server- und Cloud-Virtualisierungsinfrastrukturen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann eine Schwachstelle in XEN, Citrix XenServer und Citrix Systems Hypervisor ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2209 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2209.json" }, { "category": "self", "summary": "WID-SEC-2024-2209 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2209" }, { "category": "external", "summary": "Xen Security Advisory vom 2024-09-24", "url": "https://xenbits.xen.org/xsa/advisory-462.html" }, { "category": "external", "summary": "Citrix Security Bulletin vom 2024-09-24", "url": "https://support.citrix.com/s/article/CTX691646-xenserver-and-citrix-hypervisor-security-update-for-cve202445817?language=en_US" }, { "category": "external", "summary": "OSS Security Mailing List vom 2024-09-24", "url": "https://seclists.org/oss-sec/2024/q3/265" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-020DBF247C vom 2024-09-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-020dbf247c" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3421-1 vom 2024-09-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019510.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3422-1 vom 2024-09-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019509.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3423-1 vom 2024-09-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3424-1 vom 2024-09-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019507.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-60809CB44E vom 2024-09-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-60809cb44e" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-051CF1553E vom 2024-09-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-051cf1553e" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3432-1 vom 2024-09-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019519.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3586-1 vom 2024-10-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3980-1 vom 2024-11-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4073-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019847.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4163-1 vom 2024-12-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7DDJIN2NQVRSUGDKCUPSGI662X3KHLZN/" }, { "category": "external", "summary": "Debian Security Advisory DSA-5836 vom 2024-12-26", "url": "https://lists.debian.org/debian-security-announce/2024/msg00252.html" } ], "source_lang": "en-US", "title": "XEN, Citrix XenServer und Hypervisor: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-12-26T23:00:00.000+00:00", "generator": { "date": "2024-12-27T09:02:21.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2209", "initial_release_date": "2024-09-24T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-24T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-10T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-26T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-26T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "7" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=8.2 CU1 LTSR", "product": { "name": "Citrix Systems Hypervisor \u003c=8.2 CU1 LTSR", "product_id": "T037811" } }, { "category": "product_version_range", "name": "\u003c=8.2 CU1 LTSR", "product": { "name": "Citrix Systems Hypervisor \u003c=8.2 CU1 LTSR", "product_id": "T037811-fixed" } } ], "category": "product_name", "name": "Hypervisor" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=8", "product": { "name": "Citrix Systems XenServer \u003c=8", "product_id": "T037810" } }, { "category": "product_version_range", "name": "\u003c=8", "product": { "name": "Citrix Systems XenServer \u003c=8", "product_id": "T037810-fixed" } } ], "category": "product_name", "name": "XenServer" } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cxsa462.patch", "product": { "name": "Open Source Xen \u003cxsa462.patch", "product_id": "T037815" } }, { "category": "product_version", "name": "xsa462.patch", "product": { "name": "Open Source Xen xsa462.patch", "product_id": "T037815-fixed", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:xsa462.patch" } } } ], "category": "product_name", "name": "Xen" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45817", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in XEN, Citrix Systems XenServer und Citrix Systems Hypervisor. Dieser Fehler existiert in der Funktion vlapic_error der Komponente APIC Architecture Handler, die zu einem Deadlock f\u00fchrt. Ein b\u00f6swilliger Administrator einer Gast-VM kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand auf dem Host zu erzeugen." } ], "product_status": { "known_affected": [ "T037815", "2951", "T002207", "74185" ], "last_affected": [ "T037811", "T037810" ] }, "release_date": "2024-09-24T22:00:00.000+00:00", "title": "CVE-2024-45817" } ] }
fkie_cve-2024-45817
Vulnerability from fkie_nvd
Published
2024-09-25 11:15
Modified
2024-11-21 09:38
Severity ?
Summary
In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register. Furthermore, the OS
can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock." }, { "lang": "es", "value": "En la arquitectura APIC (Advanced Programmable Interrupt Controller) de x86, las condiciones de error se informan en un registro de estado. Adem\u00e1s, el sistema operativo puede optar por recibir una interrupci\u00f3n cuando se produce un nuevo error. Es posible configurar la interrupci\u00f3n de error con un vector ilegal, que genera un error cuando se genera una interrupci\u00f3n de error. Este caso hace que Xen recurra a trav\u00e9s de vlapic_error(). La recursi\u00f3n en s\u00ed est\u00e1 limitada; los errores se acumulan en el registro de estado y solo generan una interrupci\u00f3n cuando se establece un nuevo bit de estado. Sin embargo, el bloqueo que protege este estado en Xen intentar\u00e1 tomarse de forma recursiva y se producir\u00e1 un bloqueo." } ], "id": "CVE-2024-45817", "lastModified": "2024-11-21T09:38:08.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-09-25T11:15:12.277", "references": [ { "source": "security@xen.org", "url": "https://xenbits.xenproject.org/xsa/advisory-462.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2024/09/24/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://xenbits.xen.org/xsa/advisory-462.html" } ], "sourceIdentifier": "security@xen.org", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-x9f9-xjf3-f3v6
Vulnerability from github
Published
2024-09-25 12:30
Modified
2024-09-25 12:30
VLAI Severity ?
Details
In x86's APIC (Advanced Programmable Interrupt Controller) architecture, error conditions are reported in a status register. Furthermore, the OS can opt to receive an interrupt when a new error occurs.
It is possible to configure the error interrupt with an illegal vector, which generates an error when an error interrupt is raised.
This case causes Xen to recurse through vlapic_error(). The recursion itself is bounded; errors accumulate in the the status register and only generate an interrupt when a new status bit becomes set.
However, the lock protecting this state in Xen will try to be taken recursively, and deadlock.
{ "affected": [], "aliases": [ "CVE-2024-45817" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-25T11:15:12Z", "severity": null }, "details": "In x86\u0027s APIC (Advanced Programmable Interrupt Controller) architecture,\nerror conditions are reported in a status register. Furthermore, the OS\ncan opt to receive an interrupt when a new error occurs.\n\nIt is possible to configure the error interrupt with an illegal vector,\nwhich generates an error when an error interrupt is raised.\n\nThis case causes Xen to recurse through vlapic_error(). The recursion\nitself is bounded; errors accumulate in the the status register and only\ngenerate an interrupt when a new status bit becomes set.\n\nHowever, the lock protecting this state in Xen will try to be taken\nrecursively, and deadlock.", "id": "GHSA-x9f9-xjf3-f3v6", "modified": "2024-09-25T12:30:40Z", "published": "2024-09-25T12:30:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45817" }, { "type": "WEB", "url": "https://xenbits.xenproject.org/xsa/advisory-462.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…