SUSE-SU-2022:3925-1

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20223925-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:3925-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:3925-1
Related
Published
2022-11-09T12:55:45Z
Modified
2022-11-09T12:55:45Z
Summary
Security update for xen
Details

This update for xen fixes the following issues:

  • CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806).
  • CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
  • CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim) 32-bit PV guests (bsc#1185104).
  • CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
  • CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
  • CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
  • CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)
  • CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
  • CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
  • CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
  • CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)
  • xen: Frontends vulnerable to backends (bsc#1193923)
References

Affected packages

SUSE:Linux Enterprise High Performance Computing 15-ESPOS / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.4_40-150000.3.84.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-libs": "4.10.4_40-150000.3.84.1",
            "xen-devel": "4.10.4_40-150000.3.84.1",
            "xen-tools": "4.10.4_40-150000.3.84.1",
            "xen-tools-domU": "4.10.4_40-150000.3.84.1",
            "xen": "4.10.4_40-150000.3.84.1"
        }
    ]
}

SUSE:Linux Enterprise High Performance Computing 15-LTSS / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.4_40-150000.3.84.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-libs": "4.10.4_40-150000.3.84.1",
            "xen-devel": "4.10.4_40-150000.3.84.1",
            "xen-tools": "4.10.4_40-150000.3.84.1",
            "xen-tools-domU": "4.10.4_40-150000.3.84.1",
            "xen": "4.10.4_40-150000.3.84.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 15 / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.4_40-150000.3.84.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-libs": "4.10.4_40-150000.3.84.1",
            "xen-devel": "4.10.4_40-150000.3.84.1",
            "xen-tools": "4.10.4_40-150000.3.84.1",
            "xen-tools-domU": "4.10.4_40-150000.3.84.1",
            "xen": "4.10.4_40-150000.3.84.1"
        }
    ]
}