Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-34327 (GCVE-0-2023-34327)
Vulnerability from cvelistv5 – Published: 2024-01-05 16:34 – Updated: 2025-11-04 19:16{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T19:16:41.005Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-444.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-34327",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-08T17:36:52.379735Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-03T14:41:12.985Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Xen",
"vendor": "Xen",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-444"
}
]
}
],
"configurations": [
{
"lang": "en",
"value": "Only AMD/Hygon hardware supporting the DBEXT feature are vulnerable.\nThis is believed to be the Steamroller microarchitecture and later.\n\nFor CVE-2023-34327, Xen versions 4.5 and later are vulnerable.\n\nFor CVE-2023-34328, Xen version between 4.5 and 4.13 are vulnerable.\nThe issue is benign in Xen 4.14 and later owing to an unrelated change.\n"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "This issue was discovered by Andrew Cooper of XenServer.\n"
}
],
"datePublic": "2023-10-10T12:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n"
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "For CVE-2023-34327, any guest (PV or HVM) using Debug Masks normally for\nit\u0027s own purposes can cause incorrect behaviour in an unrelated HVM\nvCPU, most likely resulting in a guest crash.\n\nFor CVE-2023-34328, a buggy or malicious PV guest kernel can lock up the\nhost.\n"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-05T16:34:10.958Z",
"orgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"shortName": "XEN"
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
}
],
"title": "x86/AMD: Debug Mask handling",
"workarounds": [
{
"lang": "en",
"value": "For CVE-2023-34327, HVM VMs which can see the DBEXT feature are not\nsusceptible to running in the wrong state. By default, VMs will see the\nDBEXT feature on capable hardware, and when not explicitly levelled for\nmigration compatibility.\n\nFor CVE-2023-34328, PV VMs which cannot see the DBEXT feature cannot\nleverage the vulnerability.\n"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "23aa2041-22e1-471f-9209-9b7396fa234f",
"assignerShortName": "XEN",
"cveId": "CVE-2023-34327",
"datePublished": "2024-01-05T16:34:10.958Z",
"dateReserved": "2023-06-01T10:44:17.066Z",
"dateUpdated": "2025-11-04T19:16:41.005Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-34327",
"date": "2026-05-24",
"epss": "0.00113",
"percentile": "0.29442"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.5.0\", \"matchCriteriaId\": \"1EB1D53B-D24B-44D3-BB44-3734EF08801F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\n[This CNA information record relates to multiple CVEs; the\\ntext explains which aspects/vulnerabilities correspond to which CVE.]\\n\\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\\nXen supports guests using these extensions.\\n\\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\\nto denials of service.\\n\\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\\n a previous vCPUs debug mask state.\\n\\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\\n up the CPU entirely.\\n\"}, {\"lang\": \"es\", \"value\": \"[Este registro de informaci\\u00f3n de la CNA se relaciona con m\\u00faltiples CVE; el texto explica qu\\u00e9 aspectos/vulnerabilidades corresponden a cada CVE.] Las CPU AMD desde ~2014 tienen extensiones a la funcionalidad de depuraci\\u00f3n x86 normal. Xen admite invitados que utilizan estas extensiones. Desafortunadamente, hay errores en el manejo del estado invitado por parte de Xen, lo que lleva a denegaciones de servicio. 1) CVE-2023-34327: una vCPU HVM puede terminar funcionando en el contexto de un estado de m\\u00e1scara de depuraci\\u00f3n de vCPU anterior. 2) CVE-2023-34328: una vCPU PV puede colocar un punto de interrupci\\u00f3n sobre la GDT en vivo. Esto permite que PV vCPU aproveche XSA-156/CVE-2015-8104 y bloquee la CPU por completo.\"}]",
"id": "CVE-2023-34327",
"lastModified": "2024-11-21T08:07:01.247",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-01-05T17:15:08.683",
"references": "[{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-444.html\", \"source\": \"security@xen.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://xenbits.xenproject.org/xsa/advisory-444.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-34327\",\"sourceIdentifier\":\"security@xen.org\",\"published\":\"2024-01-05T17:15:08.683\",\"lastModified\":\"2025-11-04T20:16:31.213\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n[This CNA information record relates to multiple CVEs; the\\ntext explains which aspects/vulnerabilities correspond to which CVE.]\\n\\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\\nXen supports guests using these extensions.\\n\\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\\nto denials of service.\\n\\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\\n a previous vCPUs debug mask state.\\n\\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\\n up the CPU entirely.\\n\"},{\"lang\":\"es\",\"value\":\"[Este registro de informaci\u00f3n de la CNA se relaciona con m\u00faltiples CVE; el texto explica qu\u00e9 aspectos/vulnerabilidades corresponden a cada CVE.] Las CPU AMD desde ~2014 tienen extensiones a la funcionalidad de depuraci\u00f3n x86 normal. Xen admite invitados que utilizan estas extensiones. Desafortunadamente, hay errores en el manejo del estado invitado por parte de Xen, lo que lleva a denegaciones de servicio. 1) CVE-2023-34327: una vCPU HVM puede terminar funcionando en el contexto de un estado de m\u00e1scara de depuraci\u00f3n de vCPU anterior. 2) CVE-2023-34328: una vCPU PV puede colocar un punto de interrupci\u00f3n sobre la GDT en vivo. Esto permite que PV vCPU aproveche XSA-156/CVE-2015-8104 y bloquee la CPU por completo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.0\",\"matchCriteriaId\":\"1EB1D53B-D24B-44D3-BB44-3734EF08801F\"}]}]}],\"references\":[{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-444.html\",\"source\":\"security@xen.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-444.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://xenbits.xenproject.org/xsa/advisory-444.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-444.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://xenbits.xen.org/xsa/advisory-444.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T19:16:41.005Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-34327\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T17:36:52.379735Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T17:36:53.991Z\"}}], \"cna\": {\"title\": \"x86/AMD: Debug Mask handling\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered by Andrew Cooper of XenServer.\\n\"}], \"impacts\": [{\"descriptions\": [{\"lang\": \"en\", \"value\": \"For CVE-2023-34327, any guest (PV or HVM) using Debug Masks normally for\\nit\u0027s own purposes can cause incorrect behaviour in an unrelated HVM\\nvCPU, most likely resulting in a guest crash.\\n\\nFor CVE-2023-34328, a buggy or malicious PV guest kernel can lock up the\\nhost.\\n\"}]}], \"affected\": [{\"vendor\": \"Xen\", \"product\": \"Xen\", \"versions\": [{\"status\": \"unknown\", \"version\": \"consult Xen advisory XSA-444\"}], \"defaultStatus\": \"unknown\"}], \"datePublic\": \"2023-10-10T12:00:00.000Z\", \"references\": [{\"url\": \"https://xenbits.xenproject.org/xsa/advisory-444.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"For CVE-2023-34327, HVM VMs which can see the DBEXT feature are not\\nsusceptible to running in the wrong state. By default, VMs will see the\\nDBEXT feature on capable hardware, and when not explicitly levelled for\\nmigration compatibility.\\n\\nFor CVE-2023-34328, PV VMs which cannot see the DBEXT feature cannot\\nleverage the vulnerability.\\n\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\n[This CNA information record relates to multiple CVEs; the\\ntext explains which aspects/vulnerabilities correspond to which CVE.]\\n\\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\\nXen supports guests using these extensions.\\n\\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\\nto denials of service.\\n\\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\\n a previous vCPUs debug mask state.\\n\\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\\n up the CPU entirely.\\n\"}], \"configurations\": [{\"lang\": \"en\", \"value\": \"Only AMD/Hygon hardware supporting the DBEXT feature are vulnerable.\\nThis is believed to be the Steamroller microarchitecture and later.\\n\\nFor CVE-2023-34327, Xen versions 4.5 and later are vulnerable.\\n\\nFor CVE-2023-34328, Xen version between 4.5 and 4.13 are vulnerable.\\nThe issue is benign in Xen 4.14 and later owing to an unrelated change.\\n\"}], \"providerMetadata\": {\"orgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"shortName\": \"XEN\", \"dateUpdated\": \"2024-01-05T16:34:10.958Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-34327\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T19:16:41.005Z\", \"dateReserved\": \"2023-06-01T10:44:17.066Z\", \"assignerOrgId\": \"23aa2041-22e1-471f-9209-9b7396fa234f\", \"datePublished\": \"2024-01-05T16:34:10.958Z\", \"assignerShortName\": \"XEN\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2023-AVI-0823
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- NetScaler ADC et NetScaler Gateway versions 14.1.x antérieures à 14.1-8.50
- NetScaler ADC et NetScaler Gateway versions 13.1.x antérieures à 13.1-49.15
- NetScaler ADC et NetScaler Gateway versions 13.0.x antérieures à 13.0-92.19
- NetScaler ADC 13.1-FIPS versions antérieures à 13.1-37.164
- NetScaler ADC 12.1-FIPS versions antérieures à 12.1-55.300
- NetScaler ADC 12.1-NDcPP versions antérieures à 12.1-55.300
- Citrix Hypervisor 8.2 CU1 LTSR sans les correctifs de sécurité XS82ECU1047, XS82ECU1049, XS82ECU1051, XS82ECU1052 et XS82ECU1054 si les conditions d'exploitation sont réunies (se référer à l'avis de l'éditeur, cf. section Documentation)
Citrix indique que NetScaler ADC et NetScaler Gateway versions 12.1 sont obsolètes.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eNetScaler ADC et NetScaler Gateway versions 14.1.x ant\u00e9rieures \u00e0 14.1-8.50\u003c/li\u003e \u003cli\u003eNetScaler ADC et NetScaler Gateway versions 13.1.x ant\u00e9rieures \u00e0 \u202f13.1-49.15\u003c/li\u003e \u003cli\u003eNetScaler ADC\u00a0et NetScaler Gateway versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.19\u003c/li\u003e \u003cli\u003eNetScaler ADC 13.1-FIPS versions ant\u00e9rieures \u00e0 13.1-37.164\u003c/li\u003e \u003cli\u003eNetScaler ADC 12.1-FIPS versions ant\u00e9rieures \u00e0 12.1-55.300\u003c/li\u003e \u003cli\u003eNetScaler ADC 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.300\u003c/li\u003e \u003cli\u003eCitrix Hypervisor 8.2 CU1 LTSR sans les correctifs de s\u00e9curit\u00e9 XS82ECU1047, XS82ECU1049, XS82ECU1051, XS82ECU1052 et XS82ECU1054 si les conditions d\u0027exploitation sont r\u00e9unies (se r\u00e9f\u00e9rer \u00e0 l\u0027avis de l\u0027\u00e9diteur, cf. section Documentation)\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eCitrix indique que NetScaler ADC et NetScaler Gateway versions 12.1 sont obsol\u00e8tes.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-4967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4967"
},
{
"name": "CVE-2023-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34327"
},
{
"name": "CVE-2023-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34326"
},
{
"name": "CVE-2023-20588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20588"
},
{
"name": "CVE-2023-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34324"
},
{
"name": "CVE-2023-4966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4966"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0823",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nCitrix. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX575089 du 10 octobre 2023",
"url": "https://support.citrix.com/article/CTX575089/citrix-hypervisor-multiple-security-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX579459 du 10 octobre 2023",
"url": "https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967"
}
]
}
CERTFR-2023-AVI-0834
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Xen. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen-unstable toutes versions",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.15.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.16.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.17.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34327"
},
{
"name": "CVE-2023-34323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34323"
},
{
"name": "CVE-2023-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34326"
},
{
"name": "CVE-2023-34325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34325"
},
{
"name": "CVE-2023-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34324"
},
{
"name": "CVE-2023-34328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34328"
},
{
"name": "CVE-2015-8104",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8104"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0834",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans\u003cspan\nclass=\"textit\"\u003e Xen\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-441 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-441.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-440 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-440.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-443 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-443.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-442 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-442.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-444 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-444.html"
}
]
}
CERTFR-2023-AVI-0823
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- NetScaler ADC et NetScaler Gateway versions 14.1.x antérieures à 14.1-8.50
- NetScaler ADC et NetScaler Gateway versions 13.1.x antérieures à 13.1-49.15
- NetScaler ADC et NetScaler Gateway versions 13.0.x antérieures à 13.0-92.19
- NetScaler ADC 13.1-FIPS versions antérieures à 13.1-37.164
- NetScaler ADC 12.1-FIPS versions antérieures à 12.1-55.300
- NetScaler ADC 12.1-NDcPP versions antérieures à 12.1-55.300
- Citrix Hypervisor 8.2 CU1 LTSR sans les correctifs de sécurité XS82ECU1047, XS82ECU1049, XS82ECU1051, XS82ECU1052 et XS82ECU1054 si les conditions d'exploitation sont réunies (se référer à l'avis de l'éditeur, cf. section Documentation)
Citrix indique que NetScaler ADC et NetScaler Gateway versions 12.1 sont obsolètes.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eNetScaler ADC et NetScaler Gateway versions 14.1.x ant\u00e9rieures \u00e0 14.1-8.50\u003c/li\u003e \u003cli\u003eNetScaler ADC et NetScaler Gateway versions 13.1.x ant\u00e9rieures \u00e0 \u202f13.1-49.15\u003c/li\u003e \u003cli\u003eNetScaler ADC\u00a0et NetScaler Gateway versions 13.0.x ant\u00e9rieures \u00e0 13.0-92.19\u003c/li\u003e \u003cli\u003eNetScaler ADC 13.1-FIPS versions ant\u00e9rieures \u00e0 13.1-37.164\u003c/li\u003e \u003cli\u003eNetScaler ADC 12.1-FIPS versions ant\u00e9rieures \u00e0 12.1-55.300\u003c/li\u003e \u003cli\u003eNetScaler ADC 12.1-NDcPP versions ant\u00e9rieures \u00e0 12.1-55.300\u003c/li\u003e \u003cli\u003eCitrix Hypervisor 8.2 CU1 LTSR sans les correctifs de s\u00e9curit\u00e9 XS82ECU1047, XS82ECU1049, XS82ECU1051, XS82ECU1052 et XS82ECU1054 si les conditions d\u0027exploitation sont r\u00e9unies (se r\u00e9f\u00e9rer \u00e0 l\u0027avis de l\u0027\u00e9diteur, cf. section Documentation)\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eCitrix indique que NetScaler ADC et NetScaler Gateway versions 12.1 sont obsol\u00e8tes.\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-4967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4967"
},
{
"name": "CVE-2023-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34327"
},
{
"name": "CVE-2023-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34326"
},
{
"name": "CVE-2023-20588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20588"
},
{
"name": "CVE-2023-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34324"
},
{
"name": "CVE-2023-4966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4966"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0823",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nCitrix. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX575089 du 10 octobre 2023",
"url": "https://support.citrix.com/article/CTX575089/citrix-hypervisor-multiple-security-updates"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX579459 du 10 octobre 2023",
"url": "https://support.citrix.com/article/CTX579459/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20234966-and-cve20234967"
}
]
}
CERTFR-2023-AVI-0834
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Xen. Elles permettent à un attaquant de provoquer un déni de service, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen-unstable toutes versions",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.15.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.16.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
},
{
"description": "Xen versions 4.17.x",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-34327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34327"
},
{
"name": "CVE-2023-34323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34323"
},
{
"name": "CVE-2023-34326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34326"
},
{
"name": "CVE-2023-34325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34325"
},
{
"name": "CVE-2023-34324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34324"
},
{
"name": "CVE-2023-34328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34328"
},
{
"name": "CVE-2015-8104",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8104"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0834",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans\u003cspan\nclass=\"textit\"\u003e Xen\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-441 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-441.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-440 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-440.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-443 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-443.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-442 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-442.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-444 du 10 octobre 2023",
"url": "https://xenbits.xen.org/xsa/advisory-444.html"
}
]
}
FKIE_CVE-2023-34327
Vulnerability from fkie_nvd - Published: 2024-01-05 17:15 - Updated: 2025-11-04 20:165.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB1D53B-D24B-44D3-BB44-3734EF08801F",
"versionStartIncluding": "4.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n"
},
{
"lang": "es",
"value": "[Este registro de informaci\u00f3n de la CNA se relaciona con m\u00faltiples CVE; el texto explica qu\u00e9 aspectos/vulnerabilidades corresponden a cada CVE.] Las CPU AMD desde ~2014 tienen extensiones a la funcionalidad de depuraci\u00f3n x86 normal. Xen admite invitados que utilizan estas extensiones. Desafortunadamente, hay errores en el manejo del estado invitado por parte de Xen, lo que lleva a denegaciones de servicio. 1) CVE-2023-34327: una vCPU HVM puede terminar funcionando en el contexto de un estado de m\u00e1scara de depuraci\u00f3n de vCPU anterior. 2) CVE-2023-34328: una vCPU PV puede colocar un punto de interrupci\u00f3n sobre la GDT en vivo. Esto permite que PV vCPU aproveche XSA-156/CVE-2015-8104 y bloquee la CPU por completo."
}
],
"id": "CVE-2023-34327",
"lastModified": "2025-11-04T20:16:31.213",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-01-05T17:15:08.683",
"references": [
{
"source": "security@xen.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://xenbits.xen.org/xsa/advisory-444.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
}
],
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-7FX2-C8RV-2W4F
Vulnerability from github – Published: 2024-01-05 18:30 – Updated: 2025-11-04 21:30[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.]
AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions.
Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service.
1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state.
2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.
{
"affected": [],
"aliases": [
"CVE-2023-34327"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-01-05T17:15:08Z",
"severity": "MODERATE"
},
"details": "[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.",
"id": "GHSA-7fx2-c8rv-2w4f",
"modified": "2025-11-04T21:30:55Z",
"published": "2024-01-05T18:30:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34327"
},
{
"type": "WEB",
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
},
{
"type": "WEB",
"url": "http://xenbits.xen.org/xsa/advisory-444.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-34327
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-34327",
"id": "GSD-2023-34327"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-34327"
],
"details": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"id": "GSD-2023-34327",
"modified": "2023-12-13T01:20:30.934664Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@xen.org",
"ID": "CVE-2023-34327",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Xen",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown",
"versions": [
{
"status": "unknown",
"version": "consult Xen advisory XSA-444"
}
]
}
}
]
}
}
]
},
"vendor_name": "Xen"
}
]
}
},
"configuration": [
{
"lang": "en",
"value": "Only AMD/Hygon hardware supporting the DBEXT feature are vulnerable.\nThis is believed to be the Steamroller microarchitecture and later.\n\nFor CVE-2023-34327, Xen versions 4.5 and later are vulnerable.\n\nFor CVE-2023-34328, Xen version between 4.5 and 4.13 are vulnerable.\nThe issue is benign in Xen 4.14 and later owing to an unrelated change.\n"
}
],
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Andrew Cooper of XenServer.\n"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://xenbits.xenproject.org/xsa/advisory-444.html",
"refsource": "MISC",
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
}
]
},
"work_around": [
{
"lang": "en",
"value": "For CVE-2023-34327, HVM VMs which can see the DBEXT feature are not\nsusceptible to running in the wrong state. By default, VMs will see the\nDBEXT feature on capable hardware, and when not explicitly levelled for\nmigration compatibility.\n\nFor CVE-2023-34328, PV VMs which cannot see the DBEXT feature cannot\nleverage the vulnerability.\n"
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB1D53B-D24B-44D3-BB44-3734EF08801F",
"versionStartIncluding": "4.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n"
},
{
"lang": "es",
"value": "[Este registro de informaci\u00f3n de la CNA se relaciona con m\u00faltiples CVE; el texto explica qu\u00e9 aspectos/vulnerabilidades corresponden a cada CVE.] Las CPU AMD desde ~2014 tienen extensiones a la funcionalidad de depuraci\u00f3n x86 normal. Xen admite invitados que utilizan estas extensiones. Desafortunadamente, hay errores en el manejo del estado invitado por parte de Xen, lo que lleva a denegaciones de servicio. 1) CVE-2023-34327: una vCPU HVM puede terminar funcionando en el contexto de un estado de m\u00e1scara de depuraci\u00f3n de vCPU anterior. 2) CVE-2023-34328: una vCPU PV puede colocar un punto de interrupci\u00f3n sobre la GDT en vivo. Esto permite que PV vCPU aproveche XSA-156/CVE-2015-8104 y bloquee la CPU por completo."
}
],
"id": "CVE-2023-34327",
"lastModified": "2024-01-11T15:56:46.760",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-01-05T17:15:08.683",
"references": [
{
"source": "security@xen.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://xenbits.xenproject.org/xsa/advisory-444.html"
}
],
"sourceIdentifier": "security@xen.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
OPENSUSE-SU-2024:13442-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xen-4.18.0_02-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xen-4.18.0_02-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13442",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13442-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34326 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34327 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46835 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-46836 page",
"url": "https://www.suse.com/security/cve/CVE-2023-46836/"
}
],
"title": "xen-4.18.0_02-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13442-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-4.18.0_02-1.1.aarch64",
"product_id": "xen-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-devel-4.18.0_02-1.1.aarch64",
"product_id": "xen-devel-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-doc-html-4.18.0_02-1.1.aarch64",
"product_id": "xen-doc-html-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-libs-4.18.0_02-1.1.aarch64",
"product_id": "xen-libs-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-tools-4.18.0_02-1.1.aarch64",
"product_id": "xen-tools-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-tools-domU-4.18.0_02-1.1.aarch64",
"product_id": "xen-tools-domU-4.18.0_02-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"product_id": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-4.18.0_02-1.1.ppc64le",
"product_id": "xen-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-devel-4.18.0_02-1.1.ppc64le",
"product_id": "xen-devel-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-doc-html-4.18.0_02-1.1.ppc64le",
"product_id": "xen-doc-html-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-libs-4.18.0_02-1.1.ppc64le",
"product_id": "xen-libs-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-tools-4.18.0_02-1.1.ppc64le",
"product_id": "xen-tools-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-tools-domU-4.18.0_02-1.1.ppc64le",
"product_id": "xen-tools-domU-4.18.0_02-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"product_id": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-4.18.0_02-1.1.s390x",
"product_id": "xen-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-devel-4.18.0_02-1.1.s390x",
"product_id": "xen-devel-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-doc-html-4.18.0_02-1.1.s390x",
"product_id": "xen-doc-html-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-libs-4.18.0_02-1.1.s390x",
"product_id": "xen-libs-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-tools-4.18.0_02-1.1.s390x",
"product_id": "xen-tools-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-tools-domU-4.18.0_02-1.1.s390x",
"product_id": "xen-tools-domU-4.18.0_02-1.1.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"product_id": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-4.18.0_02-1.1.x86_64",
"product_id": "xen-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-devel-4.18.0_02-1.1.x86_64",
"product_id": "xen-devel-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-doc-html-4.18.0_02-1.1.x86_64",
"product_id": "xen-doc-html-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-libs-4.18.0_02-1.1.x86_64",
"product_id": "xen-libs-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-tools-4.18.0_02-1.1.x86_64",
"product_id": "xen-tools-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-tools-domU-4.18.0_02-1.1.x86_64",
"product_id": "xen-tools-domU-4.18.0_02-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64",
"product_id": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-devel-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-devel-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-devel-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-devel-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-doc-html-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-doc-html-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-doc-html-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-doc-html-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-libs-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-libs-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-libs-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-libs-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-tools-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-tools-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-tools-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-tools-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-tools-domU-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-tools-domU-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-tools-domU-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-tools-domU-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-34323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34323"
}
],
"notes": [
{
"category": "general",
"text": "When a transaction is committed, C Xenstored will first check\nthe quota is correct before attempting to commit any nodes. It would\nbe possible that accounting is temporarily negative if a node has\nbeen removed outside of the transaction.\n\nUnfortunately, some versions of C Xenstored are assuming that the\nquota cannot be negative and are using assert() to confirm it. This\nwill lead to C Xenstored crash when tools are built without -DNDEBUG\n(this is the default).\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34323",
"url": "https://www.suse.com/security/cve/CVE-2023-34323"
},
{
"category": "external",
"summary": "SUSE Bug 1215744 for CVE-2023-34323",
"url": "https://bugzilla.suse.com/1215744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-34323"
},
{
"cve": "CVE-2023-34325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34325"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nlibfsimage contains parsing code for several filesystems, most of them based on\ngrub-legacy code. libfsimage is used by pygrub to inspect guest disks.\n\nPygrub runs as the same user as the toolstack (root in a priviledged domain).\n\nAt least one issue has been reported to the Xen Security Team that allows an\nattacker to trigger a stack buffer overflow in libfsimage. After further\nanalisys the Xen Security Team is no longer confident in the suitability of\nlibfsimage when run against guest controlled input with super user priviledges.\n\nIn order to not affect current deployments that rely on pygrub patches are\nprovided in the resolution section of the advisory that allow running pygrub in\ndeprivileged mode.\n\nCVE-2023-4949 refers to the original issue in the upstream grub\nproject (\"An attacker with local access to a system (either through a\ndisk or external drive) can present a modified XFS partition to\ngrub-legacy in such a way to exploit a memory corruption in grub\u0027s XFS\nfile system implementation.\") CVE-2023-34325 refers specifically to\nthe vulnerabilities in Xen\u0027s copy of libfsimage, which is decended\nfrom a very old version of grub.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34325",
"url": "https://www.suse.com/security/cve/CVE-2023-34325"
},
{
"category": "external",
"summary": "SUSE Bug 1215747 for CVE-2023-34325",
"url": "https://bugzilla.suse.com/1215747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-34325"
},
{
"cve": "CVE-2023-34326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34326"
}
],
"notes": [
{
"category": "general",
"text": "The caching invalidation guidelines from the AMD-Vi specification (48882\u2014Rev\n3.07-PUB\u2014Oct 2022) is incorrect on some hardware, as devices will malfunction\n(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU\nTLB is not flushed.\n\nSuch stale DMA mappings can point to memory ranges not owned by the guest, thus\nallowing access to unindented memory regions.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34326",
"url": "https://www.suse.com/security/cve/CVE-2023-34326"
},
{
"category": "external",
"summary": "SUSE Bug 1215145 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215145"
},
{
"category": "external",
"summary": "SUSE Bug 1215746 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-34326"
},
{
"cve": "CVE-2023-34327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34327"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34327",
"url": "https://www.suse.com/security/cve/CVE-2023-34327"
},
{
"category": "external",
"summary": "SUSE Bug 1215748 for CVE-2023-34327",
"url": "https://bugzilla.suse.com/1215748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-34327"
},
{
"cve": "CVE-2023-46835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46835"
}
],
"notes": [
{
"category": "general",
"text": "The current setup of the quarantine page tables assumes that the\nquarantine domain (dom_io) has been initialized with an address width\nof DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.\n\nHowever dom_io being a PV domain gets the AMD-Vi IOMMU page tables\nlevels based on the maximum (hot pluggable) RAM address, and hence on\nsystems with no RAM above the 512GB mark only 3 page-table levels are\nconfigured in the IOMMU.\n\nOn systems without RAM above the 512GB boundary\namd_iommu_quarantine_init() will setup page tables for the scratch\npage with 4 levels, while the IOMMU will be configured to use 3 levels\nonly, resulting in the last page table directory (PDE) effectively\nbecoming a page table entry (PTE), and hence a device in quarantine\nmode gaining write access to the page destined to be a PDE.\n\nDue to this page table level mismatch, the sink page the device gets\nread/write access to is no longer cleared between device assignment,\npossibly leading to data leaks.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46835",
"url": "https://www.suse.com/security/cve/CVE-2023-46835"
},
{
"category": "external",
"summary": "SUSE Bug 1216654 for CVE-2023-46835",
"url": "https://bugzilla.suse.com/1216654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-46835"
},
{
"cve": "CVE-2023-46836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-46836"
}
],
"notes": [
{
"category": "general",
"text": "The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative\nReturn Stack Overflow) are not IRQ-safe. It was believed that the\nmitigations always operated in contexts with IRQs disabled.\n\nHowever, the original XSA-254 fix for Meltdown (XPTI) deliberately left\ninterrupts enabled on two entry paths; one unconditionally, and one\nconditionally on whether XPTI was active.\n\nAs BTC/SRSO and Meltdown affect different CPU vendors, the mitigations\nare not active together by default. Therefore, there is a race\ncondition whereby a malicious PV guest can bypass BTC/SRSO protections\nand launch a BTC/SRSO attack against Xen.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-46836",
"url": "https://www.suse.com/security/cve/CVE-2023-46836"
},
{
"category": "external",
"summary": "SUSE Bug 1216807 for CVE-2023-46836",
"url": "https://bugzilla.suse.com/1216807"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-devel-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-libs-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.18.0_02-1.1.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.18.0_02-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-46836"
}
]
}
SUSE-SU-2023:4054-1
Vulnerability from csaf_suse - Published: 2023-10-12 07:49 - Updated: 2023-10-12 07:49| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)\n- CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)\n- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)\n- CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)\n- CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4054,SUSE-SLE-Micro-5.5-2023-4054,SUSE-SLE-Module-Basesystem-15-SP5-2023-4054,SUSE-SLE-Module-Server-Applications-15-SP5-2023-4054,openSUSE-SLE-15.5-2023-4054",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4054-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4054-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234054-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4054-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html"
},
{
"category": "self",
"summary": "SUSE Bug 1215744",
"url": "https://bugzilla.suse.com/1215744"
},
{
"category": "self",
"summary": "SUSE Bug 1215746",
"url": "https://bugzilla.suse.com/1215746"
},
{
"category": "self",
"summary": "SUSE Bug 1215747",
"url": "https://bugzilla.suse.com/1215747"
},
{
"category": "self",
"summary": "SUSE Bug 1215748",
"url": "https://bugzilla.suse.com/1215748"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34326 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34327 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34328 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34328/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-10-12T07:49:44Z",
"generator": {
"date": "2023-10-12T07:49:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4054-1",
"initial_release_date": "2023-10-12T07:49:44Z",
"revision_history": [
{
"date": "2023-10-12T07:49:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-4.17.2_06-150500.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-devel-4.17.2_06-150500.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-doc-html-4.17.2_06-150500.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-libs-4.17.2_06-150500.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-tools-4.17.2_06-150500.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"product": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"product_id": "xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.17.2_06-150500.3.12.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.17.2_06-150500.3.12.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.17.2_06-150500.3.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.17.2_06-150500.3.12.1.i586",
"product": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.i586",
"product_id": "xen-devel-4.17.2_06-150500.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.2_06-150500.3.12.1.i586",
"product": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.i586",
"product_id": "xen-libs-4.17.2_06-150500.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.i586",
"product": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.i586",
"product_id": "xen-tools-domU-4.17.2_06-150500.3.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-devel-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-doc-html-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-libs-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-tools-4.17.2_06-150500.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"product": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"product_id": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.17.2_06-150500.3.12.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64"
},
"product_reference": "xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64"
},
"product_reference": "xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-34323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34323"
}
],
"notes": [
{
"category": "general",
"text": "When a transaction is committed, C Xenstored will first check\nthe quota is correct before attempting to commit any nodes. It would\nbe possible that accounting is temporarily negative if a node has\nbeen removed outside of the transaction.\n\nUnfortunately, some versions of C Xenstored are assuming that the\nquota cannot be negative and are using assert() to confirm it. This\nwill lead to C Xenstored crash when tools are built without -DNDEBUG\n(this is the default).\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34323",
"url": "https://www.suse.com/security/cve/CVE-2023-34323"
},
{
"category": "external",
"summary": "SUSE Bug 1215744 for CVE-2023-34323",
"url": "https://bugzilla.suse.com/1215744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:49:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-34323"
},
{
"cve": "CVE-2023-34325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34325"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nlibfsimage contains parsing code for several filesystems, most of them based on\ngrub-legacy code. libfsimage is used by pygrub to inspect guest disks.\n\nPygrub runs as the same user as the toolstack (root in a priviledged domain).\n\nAt least one issue has been reported to the Xen Security Team that allows an\nattacker to trigger a stack buffer overflow in libfsimage. After further\nanalisys the Xen Security Team is no longer confident in the suitability of\nlibfsimage when run against guest controlled input with super user priviledges.\n\nIn order to not affect current deployments that rely on pygrub patches are\nprovided in the resolution section of the advisory that allow running pygrub in\ndeprivileged mode.\n\nCVE-2023-4949 refers to the original issue in the upstream grub\nproject (\"An attacker with local access to a system (either through a\ndisk or external drive) can present a modified XFS partition to\ngrub-legacy in such a way to exploit a memory corruption in grub\u0027s XFS\nfile system implementation.\") CVE-2023-34325 refers specifically to\nthe vulnerabilities in Xen\u0027s copy of libfsimage, which is decended\nfrom a very old version of grub.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34325",
"url": "https://www.suse.com/security/cve/CVE-2023-34325"
},
{
"category": "external",
"summary": "SUSE Bug 1215747 for CVE-2023-34325",
"url": "https://bugzilla.suse.com/1215747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:49:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-34325"
},
{
"cve": "CVE-2023-34326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34326"
}
],
"notes": [
{
"category": "general",
"text": "The caching invalidation guidelines from the AMD-Vi specification (48882-Rev\n3.07-PUB-Oct 2022) is incorrect on some hardware, as devices will malfunction\n(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU\nTLB is not flushed.\n\nSuch stale DMA mappings can point to memory ranges not owned by the guest, thus\nallowing access to unindented memory regions.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34326",
"url": "https://www.suse.com/security/cve/CVE-2023-34326"
},
{
"category": "external",
"summary": "SUSE Bug 1215145 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215145"
},
{
"category": "external",
"summary": "SUSE Bug 1215746 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:49:44Z",
"details": "important"
}
],
"title": "CVE-2023-34326"
},
{
"cve": "CVE-2023-34327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34327"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34327",
"url": "https://www.suse.com/security/cve/CVE-2023-34327"
},
{
"category": "external",
"summary": "SUSE Bug 1215748 for CVE-2023-34327",
"url": "https://bugzilla.suse.com/1215748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:49:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-34327"
},
{
"cve": "CVE-2023-34328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34328"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34328",
"url": "https://www.suse.com/security/cve/CVE-2023-34328"
},
{
"category": "external",
"summary": "SUSE Bug 1215748 for CVE-2023-34328",
"url": "https://bugzilla.suse.com/1215748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-devel-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-doc-html-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-32bit-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-libs-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.aarch64",
"openSUSE Leap 15.5:xen-tools-domU-4.17.2_06-150500.3.12.1.x86_64",
"openSUSE Leap 15.5:xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:49:44Z",
"details": "moderate"
}
],
"title": "CVE-2023-34328"
}
]
}
SUSE-SU-2023:4055-1
Vulnerability from csaf_suse - Published: 2023-10-12 07:51 - Updated: 2023-10-12 07:51| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)\n- CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)\n- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)\n- CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)\n- CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4055,SUSE-SLE-Micro-5.3-2023-4055,SUSE-SLE-Micro-5.4-2023-4055,SUSE-SLE-Module-Basesystem-15-SP4-2023-4055,SUSE-SLE-Module-Server-Applications-15-SP4-2023-4055,openSUSE-SLE-15.4-2023-4055",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4055-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4055-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234055-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4055-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html"
},
{
"category": "self",
"summary": "SUSE Bug 1215744",
"url": "https://bugzilla.suse.com/1215744"
},
{
"category": "self",
"summary": "SUSE Bug 1215746",
"url": "https://bugzilla.suse.com/1215746"
},
{
"category": "self",
"summary": "SUSE Bug 1215747",
"url": "https://bugzilla.suse.com/1215747"
},
{
"category": "self",
"summary": "SUSE Bug 1215748",
"url": "https://bugzilla.suse.com/1215748"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34323 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34325 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34326 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34327 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-34328 page",
"url": "https://www.suse.com/security/cve/CVE-2023-34328/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2023-10-12T07:51:07Z",
"generator": {
"date": "2023-10-12T07:51:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4055-1",
"initial_release_date": "2023-10-12T07:51:07Z",
"revision_history": [
{
"date": "2023-10-12T07:51:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-4.16.5_06-150400.4.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-devel-4.16.5_06-150400.4.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-doc-html-4.16.5_06-150400.4.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-libs-4.16.5_06-150400.4.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-tools-4.16.5_06-150400.4.37.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"product": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"product_id": "xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.16.5_06-150400.4.37.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.16.5_06-150400.4.37.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.16.5_06-150400.4.37.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.16.5_06-150400.4.37.1.i586",
"product": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.i586",
"product_id": "xen-devel-4.16.5_06-150400.4.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.5_06-150400.4.37.1.i586",
"product": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.i586",
"product_id": "xen-libs-4.16.5_06-150400.4.37.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.i586",
"product": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.i586",
"product_id": "xen-tools-domU-4.16.5_06-150400.4.37.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"product_id": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-devel-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-doc-html-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-libs-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-tools-4.16.5_06-150400.4.37.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"product": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"product_id": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.5_06-150400.4.37.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64"
},
"product_reference": "xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64"
},
"product_reference": "xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-34323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34323"
}
],
"notes": [
{
"category": "general",
"text": "When a transaction is committed, C Xenstored will first check\nthe quota is correct before attempting to commit any nodes. It would\nbe possible that accounting is temporarily negative if a node has\nbeen removed outside of the transaction.\n\nUnfortunately, some versions of C Xenstored are assuming that the\nquota cannot be negative and are using assert() to confirm it. This\nwill lead to C Xenstored crash when tools are built without -DNDEBUG\n(this is the default).\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34323",
"url": "https://www.suse.com/security/cve/CVE-2023-34323"
},
{
"category": "external",
"summary": "SUSE Bug 1215744 for CVE-2023-34323",
"url": "https://bugzilla.suse.com/1215744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:51:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-34323"
},
{
"cve": "CVE-2023-34325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34325"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nlibfsimage contains parsing code for several filesystems, most of them based on\ngrub-legacy code. libfsimage is used by pygrub to inspect guest disks.\n\nPygrub runs as the same user as the toolstack (root in a priviledged domain).\n\nAt least one issue has been reported to the Xen Security Team that allows an\nattacker to trigger a stack buffer overflow in libfsimage. After further\nanalisys the Xen Security Team is no longer confident in the suitability of\nlibfsimage when run against guest controlled input with super user priviledges.\n\nIn order to not affect current deployments that rely on pygrub patches are\nprovided in the resolution section of the advisory that allow running pygrub in\ndeprivileged mode.\n\nCVE-2023-4949 refers to the original issue in the upstream grub\nproject (\"An attacker with local access to a system (either through a\ndisk or external drive) can present a modified XFS partition to\ngrub-legacy in such a way to exploit a memory corruption in grub\u0027s XFS\nfile system implementation.\") CVE-2023-34325 refers specifically to\nthe vulnerabilities in Xen\u0027s copy of libfsimage, which is decended\nfrom a very old version of grub.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34325",
"url": "https://www.suse.com/security/cve/CVE-2023-34325"
},
{
"category": "external",
"summary": "SUSE Bug 1215747 for CVE-2023-34325",
"url": "https://bugzilla.suse.com/1215747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:51:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-34325"
},
{
"cve": "CVE-2023-34326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34326"
}
],
"notes": [
{
"category": "general",
"text": "The caching invalidation guidelines from the AMD-Vi specification (48882-Rev\n3.07-PUB-Oct 2022) is incorrect on some hardware, as devices will malfunction\n(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU\nTLB is not flushed.\n\nSuch stale DMA mappings can point to memory ranges not owned by the guest, thus\nallowing access to unindented memory regions.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34326",
"url": "https://www.suse.com/security/cve/CVE-2023-34326"
},
{
"category": "external",
"summary": "SUSE Bug 1215145 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215145"
},
{
"category": "external",
"summary": "SUSE Bug 1215746 for CVE-2023-34326",
"url": "https://bugzilla.suse.com/1215746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:51:07Z",
"details": "important"
}
],
"title": "CVE-2023-34326"
},
{
"cve": "CVE-2023-34327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34327"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34327",
"url": "https://www.suse.com/security/cve/CVE-2023-34327"
},
{
"category": "external",
"summary": "SUSE Bug 1215748 for CVE-2023-34327",
"url": "https://bugzilla.suse.com/1215748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:51:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-34327"
},
{
"cve": "CVE-2023-34328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-34328"
}
],
"notes": [
{
"category": "general",
"text": "\n[This CNA information record relates to multiple CVEs; the\ntext explains which aspects/vulnerabilities correspond to which CVE.]\n\nAMD CPUs since ~2014 have extensions to normal x86 debugging functionality.\nXen supports guests using these extensions.\n\nUnfortunately there are errors in Xen\u0027s handling of the guest state, leading\nto denials of service.\n\n 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of\n a previous vCPUs debug mask state.\n\n 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.\n This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock\n up the CPU entirely.\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-34328",
"url": "https://www.suse.com/security/cve/CVE-2023-34328"
},
{
"category": "external",
"summary": "SUSE Bug 1215748 for CVE-2023-34328",
"url": "https://bugzilla.suse.com/1215748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-devel-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-doc-html-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-32bit-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-libs-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.aarch64",
"openSUSE Leap 15.4:xen-tools-domU-4.16.5_06-150400.4.37.1.x86_64",
"openSUSE Leap 15.4:xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-10-12T07:51:07Z",
"details": "moderate"
}
],
"title": "CVE-2023-34328"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.