<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">xen-4.16.0_04-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11781-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">xen-4.16.0_04-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the xen-4.16.0_04-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11781</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23033/</URL>
      <Description>SUSE CVE CVE-2022-23033 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23034/</URL>
      <Description>SUSE CVE CVE-2022-23034 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23035/</URL>
      <Description>SUSE CVE CVE-2022-23035 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.16.0_04-3.1">
      <FullProductName ProductID="xen-4.16.0_04-3.1">xen-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.16.0_04-3.1">
      <FullProductName ProductID="xen-devel-4.16.0_04-3.1">xen-devel-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.16.0_04-3.1">
      <FullProductName ProductID="xen-doc-html-4.16.0_04-3.1">xen-doc-html-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.16.0_04-3.1">
      <FullProductName ProductID="xen-libs-4.16.0_04-3.1">xen-libs-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.16.0_04-3.1">
      <FullProductName ProductID="xen-libs-32bit-4.16.0_04-3.1">xen-libs-32bit-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.16.0_04-3.1">
      <FullProductName ProductID="xen-tools-4.16.0_04-3.1">xen-tools-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.16.0_04-3.1">
      <FullProductName ProductID="xen-tools-domU-4.16.0_04-3.1">xen-tools-domU-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.16.0_04-3.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.16.0_04-3.1">xen-tools-xendomains-wait-disk-4.16.0_04-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-4.16.0_04-3.1">xen-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-devel-4.16.0_04-3.1">xen-devel-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-doc-html-4.16.0_04-3.1">xen-doc-html-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-4.16.0_04-3.1">xen-libs-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-32bit-4.16.0_04-3.1">xen-libs-32bit-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-4.16.0_04-3.1">xen-tools-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-domU-4.16.0_04-3.1">xen-tools-domU-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.16.0_04-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.16.0_04-3.1">xen-tools-xendomains-wait-disk-4.16.0_04-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pagetable on Arm (p2m_remove_mapping, guest_physmap_remove_page, and p2m_set_entry with mfn set to INVALID_MFN) do not actually clear the pagetable entry if the entry doesn't have the valid bit set. It is possible to have a valid pagetable entry without the valid bit set when a guest operating system uses set/way cache maintenance instructions. For instance, a guest issuing a set/way cache maintenance instruction, then calling the XENMEM_decrease_reservation hypercall to give back memory pages to Xen, might be able to retain access to those pages even after Xen started reusing them for other purposes.</Note>
    </Notes>
    <CVE>CVE-2022-23033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.16.0_04-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23033.html</URL>
        <Description>CVE-2022-23033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194576</URL>
        <Description>SUSE Bug 1194576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.</Note>
    </Notes>
    <CVE>CVE-2022-23034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.16.0_04-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23034.html</URL>
        <Description>CVE-2022-23034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194581</URL>
        <Description>SUSE Bug 1194581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.</Note>
    </Notes>
    <CVE>CVE-2022-23035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.16.0_04-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.16.0_04-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23035.html</URL>
        <Description>CVE-2022-23035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194588</URL>
        <Description>SUSE Bug 1194588</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
