<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">xen-4.17.0_06-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12833-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">xen-4.17.0_06-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the xen-4.17.0_06-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12833</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-42331/</URL>
      <Description>SUSE CVE CVE-2022-42331 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-42332/</URL>
      <Description>SUSE CVE CVE-2022-42332 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-42333/</URL>
      <Description>SUSE CVE CVE-2022-42333 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.17.0_06-1.1">
      <FullProductName ProductID="xen-4.17.0_06-1.1">xen-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.17.0_06-1.1">
      <FullProductName ProductID="xen-devel-4.17.0_06-1.1">xen-devel-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.17.0_06-1.1">
      <FullProductName ProductID="xen-doc-html-4.17.0_06-1.1">xen-doc-html-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.17.0_06-1.1">
      <FullProductName ProductID="xen-libs-4.17.0_06-1.1">xen-libs-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.17.0_06-1.1">
      <FullProductName ProductID="xen-libs-32bit-4.17.0_06-1.1">xen-libs-32bit-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.17.0_06-1.1">
      <FullProductName ProductID="xen-tools-4.17.0_06-1.1">xen-tools-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.17.0_06-1.1">
      <FullProductName ProductID="xen-tools-domU-4.17.0_06-1.1">xen-tools-domU-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.17.0_06-1.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.17.0_06-1.1">xen-tools-xendomains-wait-disk-4.17.0_06-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-4.17.0_06-1.1">xen-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-devel-4.17.0_06-1.1">xen-devel-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-doc-html-4.17.0_06-1.1">xen-doc-html-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-4.17.0_06-1.1">xen-libs-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-libs-32bit-4.17.0_06-1.1">xen-libs-32bit-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-4.17.0_06-1.1">xen-tools-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-domU-4.17.0_06-1.1">xen-tools-domU-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.17.0_06-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_06-1.1">xen-tools-xendomains-wait-disk-4.17.0_06-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be attacked with a variety of speculative attacks.</Note>
    </Notes>
    <CVE>CVE-2022-42331</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_06-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-42331.html</URL>
        <Description>CVE-2022-42331</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209019</URL>
        <Description>SUSE Bug 1209019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tables as well as auxiliary data structures. To migrate or snapshot guests, Xen additionally runs them in so called log-dirty mode. The data structures needed by the log-dirty tracking are part of aformentioned auxiliary data. In order to keep error handling efforts within reasonable bounds, for operations which may require memory allocations shadow mode logic ensures up front that enough memory is available for the worst case requirements. Unfortunately, while page table memory is properly accounted for on the code path requiring the potential establishing of new shadows, demands by the log-dirty infrastructure were not taken into consideration. As a result, just established shadow page tables could be freed again immediately, while other code is still accessing them on the assumption that they would remain allocated.</Note>
    </Notes>
    <CVE>CVE-2022-42332</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_06-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-42332.html</URL>
        <Description>CVE-2022-42332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209017</URL>
        <Description>SUSE Bug 1209017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly override defaults which would otherwise be put in place. While not exposed to the affected guests themselves, the interface specifically exists for domains controlling such guests. This interface may therefore be used by not fully privileged entities, e.g. qemu running deprivileged in Dom0 or qemu running in a so called stub-domain. With this exposure it is an issue that - the number of the such controlled regions was unbounded (CVE-2022-42333), - installation and removal of such regions was not properly serialized (CVE-2022-42334).</Note>
    </Notes>
    <CVE>CVE-2022-42333</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:xen-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-devel-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-doc-html-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-32bit-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-libs-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-domU-4.17.0_06-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.17.0_06-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-42333.html</URL>
        <Description>CVE-2022-42333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209018</URL>
        <Description>SUSE Bug 1209018</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
