From d94eeb297b3cc929b5f9559cf44f40267697e2d3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adrian=20Schr=C3=B6ter?= Date: Mon, 25 Nov 2024 14:47:13 +0100 Subject: [PATCH] Adding patchinfo patchinfo.20241115083427995106.269002615871826 --- .../_patchinfo | 86 +++++++++++++++++++ 1 file changed, 86 insertions(+) create mode 100644 patchinfo.20241115083427995106.269002615871826/_patchinfo diff --git a/patchinfo.20241115083427995106.269002615871826/_patchinfo b/patchinfo.20241115083427995106.269002615871826/_patchinfo new file mode 100644 index 0000000..4138096 --- /dev/null +++ b/patchinfo.20241115083427995106.269002615871826/_patchinfo @@ -0,0 +1,86 @@ + + + Xen: Missing upstream bug fixes + The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen. + VUL-0: CVE-2023-46839: xen: phantom functions assigned to incorrect contexts (XSA-449) + VUL-0: CVE-2023-46840: xen: VT-d: Failure to quarantine devices in !HVM builds (XSA-450) + VUL-0: CVE-2023-46841: xen: x86: shadow stack vs exceptions from emulation stubs + VUL-0: CVE-2023-28746: xen: x86: Register File Data Sampling (XSA-452) + VUL-0: CVE-2024-2193: xen: GhostRace: Speculative Race Conditions (XSA-453) + VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may trigger Xen bug check (XSA-454) + VUL-0: CVE-2024-31142: xen: x86: Incorrect logic for BTC/SRSO mitigations (XSA-455) + VUL-0: CVE-2024-2201: xen: x86: Native Branch History Injection (XSA-456) + Package xen does not build with gcc14 because of new errors + VUL-0: CVE-2024-31143: xen: double unlock in x86 guest IRQ handling (XSA-458) + VUL-0: CVE-2024-31145: xen: error handling in x86 IOMMU identity mapping (XSA-460) + VUL-0: CVE-2024-31146: xen: PCI device pass-through with shared resources (XSA-461) + + + + + + + + + + + + charlesa + critical + security + Security update for xen + This update for xen fixes the following issues: + +- Update to Xen 4.18.3 security bug fix release (bsc#1027519) + * No upstream changelog found in sources or webpage +- bsc#1228574 - VUL-0: CVE-2024-31145: xen: error handling in x86 + IOMMU identity mapping (XSA-460) +- bsc#1228575 - VUL-0: CVE-2024-31146: xen: PCI device pass-through + with shared resources (XSA-461) +- bsc#1227355 - VUL-0: CVE-2024-31143: xen: double unlock in x86 + guest IRQ handling (XSA-458) +- bsc#1214718 - The system hangs intermittently when Power Control + Mode is set to Minimum Power on SLES15SP5 Xen +- Upstream bug fixes (bsc#1027519) + +- bsc#1225953 - Package xen does not build with gcc14 because of + new errors +- bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may + trigger Xen bug check (XSA-454) +- Upstream bug fixes (bsc#1027519) + +- Update to Xen 4.18.2 security bug fix release (bsc#1027519) + xen-4.18.2-testing-src.tar.bz2 + * No upstream changelog found in sources or webpage +- bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may + trigger Xen bug check (XSA-454) +- bsc#1222302 - VUL-0: CVE-2024-31142: xen: x86: Incorrect logic + for BTC/SRSO mitigations (XSA-455) +- bsc#1222453 - VUL-0: CVE-2024-2201: xen: x86: Native Branch + History Injection (XSA-456) +- bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative + Race Conditions (XSA-453) + +- Update to Xen 4.18.1 bug fix release (bsc#1027519) + xen-4.18.1-testing-src.tar.bz2 + * No upstream changelog found in sources or webpage +- bsc#1221332 - VUL-0: CVE-2023-28746: xen: x86: Register File Data + Sampling (XSA-452) +- bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative + Race Conditions (XSA-453) +- bsc#1219885 - VUL-0: CVE-2023-46841: xen: x86: shadow stack vs + exceptions from emulation stubs (XSA-451) + +- Upstream bug fixes (bsc#1027519) +- bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions + assigned to incorrect contexts (XSA-449) +- bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to + quarantine devices in !HVM builds (XSA-450) +- bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to + quarantine devices in !HVM builds (XSA-450) +- bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions + assigned to incorrect contexts (XSA-449) + + xen + +