VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Module for Server Applications 15 SP5

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5

Vulnerabilities (28)

  • CVE-2023-34323Jan 5, 2024
    affected < 4.17.2_06-150500.3.12.1fixed 4.17.2_06-150500.3.12.1

    When a transaction is committed, C Xenstored will first check the quota is correct before attempting to commit any nodes. It would be possible that accounting is temporarily negative if a node has been removed outside of the transaction. Unfortunately, some versions of C Xensto

  • CVE-2023-34322Jan 5, 2024
    affected < 4.17.2_04-150500.3.9.1fixed 4.17.2_04-150500.3.9.1

    For migration as well as to work around kernels unaware of L1TF (see XSA-273), PV guests may be run in shadow paging mode. Since Xen itself needs to be mapped when PV guests run, Xen and shadowed PV guests run directly the respective shadow page tables. For 64-bit PV guests thi

  • CVE-2022-40982Aug 11, 2023
    affected < 4.17.2_02-150500.3.6.1fixed 4.17.2_02-150500.3.6.1

    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2023-20588Aug 8, 2023
    affected < 4.17.2_04-150500.3.9.1fixed 4.17.2_04-150500.3.9.1

    A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

  • CVE-2023-20569Aug 8, 2023
    affected < 4.17.2_02-150500.3.6.1fixed 4.17.2_02-150500.3.6.1

    A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

  • CVE-2023-20593Jul 24, 2023
    affected < 4.17.2_02-150500.3.6.1fixed 4.17.2_02-150500.3.6.1

    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • CVE-2022-42336May 17, 2023
    affected < 4.17.1_04-150500.3.3.1fixed 4.17.1_04-150500.3.3.1

    Mishandling of guest SSBD selection on AMD hardware The current logic to set SSBD on AMD Family 17h and Hygon Family 18h processors requires that the setting of SSBD is coordinated at a core level, as the setting is shared between threads. Logic was introduced to keep track of ho

  • CVE-2022-42335Apr 25, 2023
    affected < 4.17.1_04-150500.3.3.1fixed 4.17.1_04-150500.3.3.1

    x86 shadow paging arbitrary pointer dereference In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Due to too lax a check in one of the hypervisor routines used for

Page 2 of 2