<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">xen-4.17.0_02-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12561-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">xen-4.17.0_02-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the xen-4.17.0_02-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12561</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-33746/</URL>
      <Description>SUSE CVE CVE-2022-33746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-33748/</URL>
      <Description>SUSE CVE CVE-2022-33748 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.17.0_02-1.1">
      <FullProductName ProductID="xen-4.17.0_02-1.1">xen-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.17.0_02-1.1">
      <FullProductName ProductID="xen-devel-4.17.0_02-1.1">xen-devel-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.17.0_02-1.1">
      <FullProductName ProductID="xen-doc-html-4.17.0_02-1.1">xen-doc-html-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.17.0_02-1.1">
      <FullProductName ProductID="xen-libs-4.17.0_02-1.1">xen-libs-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.17.0_02-1.1">
      <FullProductName ProductID="xen-libs-32bit-4.17.0_02-1.1">xen-libs-32bit-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.17.0_02-1.1">
      <FullProductName ProductID="xen-tools-4.17.0_02-1.1">xen-tools-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.17.0_02-1.1">
      <FullProductName ProductID="xen-tools-domU-4.17.0_02-1.1">xen-tools-domU-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.17.0_02-1.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.17.0_02-1.1">xen-tools-xendomains-wait-disk-4.17.0_02-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-4.17.0_02-1.1">xen-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-devel-4.17.0_02-1.1">xen-devel-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-doc-html-4.17.0_02-1.1">xen-doc-html-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-4.17.0_02-1.1">xen-libs-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-32bit-4.17.0_02-1.1">xen-libs-32bit-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-4.17.0_02-1.1">xen-tools-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-domU-4.17.0_02-1.1">xen-tools-domU-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.17.0_02-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_02-1.1">xen-tools-xendomains-wait-disk-4.17.0_02-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">P2M pool freeing may take excessively long The P2M pool backing second level address translation for guests may be of significant size. Therefore its freeing may take more time than is reasonable without intermediate preemption checks. Such checking for the need to preempt was so far missing.</Note>
    </Notes>
    <CVE>CVE-2022-33746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_02-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-33746.html</URL>
        <Description>CVE-2022-33746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203806</URL>
        <Description>SUSE Bug 1203806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">lock order inversion in transitive grant copy handling As part of XSA-226 a missing cleanup call was inserted on an error handling path. While doing so, locking requirements were not paid attention to. As a result two cooperating guests granting each other transitive grants can cause locks to be acquired nested within one another, but in respectively opposite order. With suitable timing between the involved grant copy operations this may result in the locking up of a CPU.</Note>
    </Notes>
    <CVE>CVE-2022-33748</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.17.0_02-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_02-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-33748.html</URL>
        <Description>CVE-2022-33748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203807</URL>
        <Description>SUSE Bug 1203807</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
