<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:2535-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-07-16T12:12:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-07-16T12:12:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-07-16T12:12:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

- CVE-2023-28746: Register File Data Sampling (XSA-452, bsc#1221332)
- CVE-2023-46842: HVM hypercalls may trigger Xen bug check (XSA-454, bsc#1221984)
- CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (XSA-453, bsc#1221334)
- CVE-2024-2201: Mitigation for Native Branch History Injection (XSA-456, bsc#1222453)
- CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455, bsc#1222302)
- CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-2535,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2535,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2535,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2535</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      <Description>Link for SUSE-SU-2024:2535-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:2535-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214083</URL>
      <Description>SUSE Bug 1214083</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221332</URL>
      <Description>SUSE Bug 1221332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221334</URL>
      <Description>SUSE Bug 1221334</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221984</URL>
      <Description>SUSE Bug 1221984</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222302</URL>
      <Description>SUSE Bug 1222302</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222453</URL>
      <Description>SUSE Bug 1222453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227355</URL>
      <Description>SUSE Bug 1227355</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-28746/</URL>
      <Description>SUSE CVE CVE-2023-28746 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-46842/</URL>
      <Description>SUSE CVE CVE-2023-46842 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2193/</URL>
      <Description>SUSE CVE CVE-2024-2193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2201/</URL>
      <Description>SUSE CVE CVE-2024-2201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-31142/</URL>
      <Description>SUSE CVE CVE-2024-31142 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-31143/</URL>
      <Description>SUSE CVE CVE-2024-31143 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp2">SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp2">SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2" CPE="cpe:/o:suse:sles_sap:15:sp2">SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-4.13.5_12-150200.3.93.1">xen-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-devel-4.13.5_12-150200.3.93.1">xen-devel-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-doc-html-4.13.5_12-150200.3.93.1">xen-doc-html-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-libs-4.13.5_12-150200.3.93.1">xen-libs-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-libs-32bit-4.13.5_12-150200.3.93.1">xen-libs-32bit-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-libs-64bit-4.13.5_12-150200.3.93.1">xen-libs-64bit-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-tools-4.13.5_12-150200.3.93.1">xen-tools-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-tools-domU-4.13.5_12-150200.3.93.1">xen-tools-domU-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1">xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1">xen-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1">xen-devel-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1">xen-libs-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1">xen-tools-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1">xen-tools-domU-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1">xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1">xen-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1">xen-devel-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1">xen-libs-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1">xen-tools-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1">xen-tools-domU-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1">xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1">xen-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1">xen-devel-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1">xen-libs-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1">xen-tools-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1">xen-tools-domU-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1">xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.</Note>
    </Notes>
    <CVE>CVE-2023-28746</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-28746.html</URL>
        <Description>CVE-2023-28746</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213456</URL>
        <Description>SUSE Bug 1213456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221323</URL>
        <Description>SUSE Bug 1221323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes.  This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.

When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation.  Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers.  For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.

Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall.  When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.
</Note>
    </Notes>
    <CVE>CVE-2023-46842</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-46842.html</URL>
        <Description>CVE-2023-46842</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221984</URL>
        <Description>SUSE Bug 1221984</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.</Note>
    </Notes>
    <CVE>CVE-2024-2193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2193.html</URL>
        <Description>CVE-2024-2193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217857</URL>
        <Description>SUSE Bug 1217857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.</Note>
    </Notes>
    <CVE>CVE-2024-2201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2201.html</URL>
        <Description>CVE-2024-2201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212111</URL>
        <Description>SUSE Bug 1212111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1217339</URL>
        <Description>SUSE Bug 1217339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Because of a logical error in XSA-407 (Branch Type Confusion), the
mitigation is not applied properly when it is intended to be used.
XSA-434 (Speculative Return Stack Overflow) uses the same
infrastructure, so is equally impacted.

For more details, see:
  https://xenbits.xen.org/xsa/advisory-407.html
  https://xenbits.xen.org/xsa/advisory-434.html
</Note>
    </Notes>
    <CVE>CVE-2024-31142</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-31142.html</URL>
        <Description>CVE-2024-31142</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222302</URL>
        <Description>SUSE Bug 1222302</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An optional feature of PCI MSI called "Multiple Message" allows a
device to use multiple consecutive interrupt vectors.  Unlike for MSI-X,
the setting up of these consecutive vectors needs to happen all in one
go.  In this handling an error path could be taken in different
situations, with or without a particular lock held.  This error path
wrongly releases the lock even when it is not currently held.
</Note>
    </Notes>
    <CVE>CVE-2024-31143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_12-150200.3.93.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_12-150200.3.93.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20242535-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-31143.html</URL>
        <Description>CVE-2024-31143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227355</URL>
        <Description>SUSE Bug 1227355</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
