2024-11-29 13:05:29 +01:00
|
|
|
<patchinfo incident="108">
|
2024-11-25 14:47:13 +01:00
|
|
|
<!-- generated from request(s) 343438 -->
|
|
|
|
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
|
|
|
|
<issue tracker="bnc" id="1214718">The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen.</issue>
|
|
|
|
<issue tracker="bnc" id="1218851">VUL-0: CVE-2023-46839: xen: phantom functions assigned to incorrect contexts (XSA-449)</issue>
|
|
|
|
<issue tracker="bnc" id="1219080">VUL-0: CVE-2023-46840: xen: VT-d: Failure to quarantine devices in !HVM builds (XSA-450)</issue>
|
|
|
|
<issue tracker="bnc" id="1219885">VUL-0: CVE-2023-46841: xen: x86: shadow stack vs exceptions from emulation stubs</issue>
|
|
|
|
<issue tracker="bnc" id="1221332">VUL-0: CVE-2023-28746: xen: x86: Register File Data Sampling (XSA-452)</issue>
|
|
|
|
<issue tracker="bnc" id="1221334">VUL-0: CVE-2024-2193: xen: GhostRace: Speculative Race Conditions (XSA-453)</issue>
|
|
|
|
<issue tracker="bnc" id="1221984">VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may trigger Xen bug check (XSA-454)</issue>
|
|
|
|
<issue tracker="bnc" id="1222302">VUL-0: CVE-2024-31142: xen: x86: Incorrect logic for BTC/SRSO mitigations (XSA-455)</issue>
|
|
|
|
<issue tracker="bnc" id="1222453">VUL-0: CVE-2024-2201: xen: x86: Native Branch History Injection (XSA-456)</issue>
|
|
|
|
<issue tracker="bnc" id="1225953">Package xen does not build with gcc14 because of new errors</issue>
|
|
|
|
<issue tracker="bnc" id="1227355">VUL-0: CVE-2024-31143: xen: double unlock in x86 guest IRQ handling (XSA-458)</issue>
|
|
|
|
<issue tracker="bnc" id="1228574">VUL-0: CVE-2024-31145: xen: error handling in x86 IOMMU identity mapping (XSA-460)</issue>
|
|
|
|
<issue tracker="bnc" id="1228575">VUL-0: CVE-2024-31146: xen: PCI device pass-through with shared resources (XSA-461)</issue>
|
|
|
|
<issue tracker="cve" id="2023-28746"/>
|
|
|
|
<issue tracker="cve" id="2023-46839"/>
|
|
|
|
<issue tracker="cve" id="2023-46840"/>
|
|
|
|
<issue tracker="cve" id="2023-46841"/>
|
|
|
|
<issue tracker="cve" id="2023-46842"/>
|
|
|
|
<issue tracker="cve" id="2024-2193"/>
|
|
|
|
<issue tracker="cve" id="2024-2201"/>
|
|
|
|
<issue tracker="cve" id="2024-31142"/>
|
|
|
|
<issue tracker="cve" id="2024-31143"/>
|
|
|
|
<issue tracker="cve" id="2024-31145"/>
|
|
|
|
<issue tracker="cve" id="2024-31146"/>
|
|
|
|
<packager>charlesa</packager>
|
|
|
|
<rating>critical</rating>
|
|
|
|
<category>security</category>
|
|
|
|
<summary>Security update for xen</summary>
|
|
|
|
<description>This update for xen fixes the following issues:
|
|
|
|
|
|
|
|
- Update to Xen 4.18.3 security bug fix release (bsc#1027519)
|
|
|
|
* No upstream changelog found in sources or webpage
|
|
|
|
- bsc#1228574 - VUL-0: CVE-2024-31145: xen: error handling in x86
|
|
|
|
IOMMU identity mapping (XSA-460)
|
|
|
|
- bsc#1228575 - VUL-0: CVE-2024-31146: xen: PCI device pass-through
|
|
|
|
with shared resources (XSA-461)
|
|
|
|
- bsc#1227355 - VUL-0: CVE-2024-31143: xen: double unlock in x86
|
|
|
|
guest IRQ handling (XSA-458)
|
|
|
|
- bsc#1214718 - The system hangs intermittently when Power Control
|
|
|
|
Mode is set to Minimum Power on SLES15SP5 Xen
|
|
|
|
- Upstream bug fixes (bsc#1027519)
|
|
|
|
|
|
|
|
- bsc#1225953 - Package xen does not build with gcc14 because of
|
|
|
|
new errors
|
|
|
|
- bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may
|
|
|
|
trigger Xen bug check (XSA-454)
|
|
|
|
- Upstream bug fixes (bsc#1027519)
|
|
|
|
|
|
|
|
- Update to Xen 4.18.2 security bug fix release (bsc#1027519)
|
|
|
|
xen-4.18.2-testing-src.tar.bz2
|
|
|
|
* No upstream changelog found in sources or webpage
|
|
|
|
- bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may
|
|
|
|
trigger Xen bug check (XSA-454)
|
|
|
|
- bsc#1222302 - VUL-0: CVE-2024-31142: xen: x86: Incorrect logic
|
|
|
|
for BTC/SRSO mitigations (XSA-455)
|
|
|
|
- bsc#1222453 - VUL-0: CVE-2024-2201: xen: x86: Native Branch
|
|
|
|
History Injection (XSA-456)
|
|
|
|
- bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative
|
|
|
|
Race Conditions (XSA-453)
|
|
|
|
|
|
|
|
- Update to Xen 4.18.1 bug fix release (bsc#1027519)
|
|
|
|
xen-4.18.1-testing-src.tar.bz2
|
|
|
|
* No upstream changelog found in sources or webpage
|
|
|
|
- bsc#1221332 - VUL-0: CVE-2023-28746: xen: x86: Register File Data
|
|
|
|
Sampling (XSA-452)
|
|
|
|
- bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative
|
|
|
|
Race Conditions (XSA-453)
|
|
|
|
- bsc#1219885 - VUL-0: CVE-2023-46841: xen: x86: shadow stack vs
|
|
|
|
exceptions from emulation stubs (XSA-451)
|
|
|
|
|
|
|
|
- Upstream bug fixes (bsc#1027519)
|
|
|
|
- bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions
|
|
|
|
assigned to incorrect contexts (XSA-449)
|
|
|
|
- bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to
|
|
|
|
quarantine devices in !HVM builds (XSA-450)
|
|
|
|
- bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to
|
|
|
|
quarantine devices in !HVM builds (XSA-450)
|
|
|
|
- bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions
|
|
|
|
assigned to incorrect contexts (XSA-449)
|
|
|
|
</description>
|
|
|
|
<package>xen</package>
|
|
|
|
<seperate_build_arch/>
|
2024-11-29 13:05:29 +01:00
|
|
|
</patchinfo>
|