<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:3586-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-10-10T11:29:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-10-10T11:29:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-10-10T11:29:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

Security fixes:

- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460) (bsc#1228574)
- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461) (bsc#1228575)
- CVE-2024-45817: Fixed Deadlock in vlapic_error() (XSA-462) (bsc#1230366)

Other fixes:

- Upstream bug fixes (bsc#1027519)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-EC2-BYOS-2024-3586,Image SLES12-SP5-EC2-ECS-On-Demand-2024-3586,Image SLES12-SP5-EC2-On-Demand-2024-3586,Image SLES12-SP5-EC2-SAP-BYOS-2024-3586,Image SLES12-SP5-EC2-SAP-On-Demand-2024-3586,SUSE-2024-3586,SUSE-SLE-SDK-12-SP5-2024-3586,SUSE-SLE-SERVER-12-SP5-2024-3586</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243586-1/</URL>
      <Description>Link for SUSE-SU-2024:3586-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:3586-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1027519</URL>
      <Description>SUSE Bug 1027519</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228574</URL>
      <Description>SUSE Bug 1228574</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228575</URL>
      <Description>SUSE Bug 1228575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230366</URL>
      <Description>SUSE Bug 1230366</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-31145/</URL>
      <Description>SUSE CVE CVE-2024-31145 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-31146/</URL>
      <Description>SUSE CVE CVE-2024-31146 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-45817/</URL>
      <Description>SUSE CVE CVE-2024-45817 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS">Image SLES12-SP5-EC2-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-ECS-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand">Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand">Image SLES12-SP5-EC2-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-BYOS">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-BYOS">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS">Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
      <Branch Type="Product Name" Name="Image SLES12-SP5-EC2-SAP-On-Demand">
        <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand">Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5" CPE="cpe:/o:suse:sle-sdk:12:sp5">SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-4.12.4_56-3.121.1">xen-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-devel-4.12.4_56-3.121.1">xen-devel-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-doc-html-4.12.4_56-3.121.1">xen-doc-html-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-libs-32bit-4.12.4_56-3.121.1">xen-libs-32bit-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-libs-64bit-4.12.4_56-3.121.1">xen-libs-64bit-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.12.4_56-3.121.1">
      <FullProductName ProductID="xen-tools-4.12.4_56-3.121.1">xen-tools-4.12.4_56-3.121.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-ECS-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-ECS-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-On-Demand:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-BYOS">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-BYOS:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-SAP-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-EC2-SAP-On-Demand">
      <FullProductName ProductID="Image SLES12-SP5-EC2-SAP-On-Demand:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of Image SLES12-SP5-EC2-SAP-On-Demand</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1">xen-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1">xen-doc-html-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1">xen-libs-32bit-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1">xen-tools-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1">xen-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1">xen-doc-html-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1">xen-libs-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1">xen-libs-32bit-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1">xen-tools-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1">xen-tools-domU-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.12.4_56-3.121.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1">xen-devel-4.12.4_56-3.121.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Certain PCI devices in a system might be assigned Reserved Memory
Regions (specified via Reserved Memory Region Reporting, "RMRR") for
Intel VT-d or Unity Mapping ranges for AMD-Vi.  These are typically used
for platform tasks such as legacy USB emulation.

Since the precise purpose of these regions is unknown, once a device
associated with such a region is active, the mappings of these regions
need to remain continuouly accessible by the device.  In the logic
establishing these mappings, error handling was flawed, resulting in
such mappings to potentially remain in place when they should have been
removed again.  Respective guests would then gain access to memory
regions which they aren't supposed to have access to.</Note>
    </Notes>
    <CVE>CVE-2024-31145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243586-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-31145.html</URL>
        <Description>CVE-2024-31145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228574</URL>
        <Description>SUSE Bug 1228574</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When multiple devices share resources and one of them is to be passed
through to a guest, security of the entire system and of respective
guests individually cannot really be guaranteed without knowing
internals of any of the involved guests.  Therefore such a configuration
cannot really be security-supported, yet making that explicit was so far
missing.

Resources the sharing of which is known to be problematic include, but
are not limited to
- - PCI Base Address Registers (BARs) of multiple devices mapping to the
  same page (4k on x86),
- - INTx lines.</Note>
    </Notes>
    <CVE>CVE-2024-31146</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243586-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-31146.html</URL>
        <Description>CVE-2024-31146</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228575</URL>
        <Description>SUSE Bug 1228575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register.  Furthermore, the OS
can opt to receive an interrupt when a new error occurs.

It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.

This case causes Xen to recurse through vlapic_error().  The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.

However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock.</Note>
    </Notes>
    <CVE>CVE-2024-45817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-BYOS:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>Image SLES12-SP5-EC2-SAP-On-Demand:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-doc-html-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-32bit-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-libs-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:xen-tools-domU-4.12.4_56-3.121.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:xen-devel-4.12.4_56-3.121.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20243586-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-45817.html</URL>
        <Description>CVE-2024-45817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1230366</URL>
        <Description>SUSE Bug 1230366</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
