Xen: Missing upstream bug fixes The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen. VUL-0: CVE-2023-46839: xen: phantom functions assigned to incorrect contexts (XSA-449) VUL-0: CVE-2023-46840: xen: VT-d: Failure to quarantine devices in !HVM builds (XSA-450) VUL-0: CVE-2023-46841: xen: x86: shadow stack vs exceptions from emulation stubs VUL-0: CVE-2023-28746: xen: x86: Register File Data Sampling (XSA-452) VUL-0: CVE-2024-2193: xen: GhostRace: Speculative Race Conditions (XSA-453) VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may trigger Xen bug check (XSA-454) VUL-0: CVE-2024-31142: xen: x86: Incorrect logic for BTC/SRSO mitigations (XSA-455) VUL-0: CVE-2024-2201: xen: x86: Native Branch History Injection (XSA-456) Package xen does not build with gcc14 because of new errors VUL-0: CVE-2024-31143: xen: double unlock in x86 guest IRQ handling (XSA-458) VUL-0: CVE-2024-31145: xen: error handling in x86 IOMMU identity mapping (XSA-460) VUL-0: CVE-2024-31146: xen: PCI device pass-through with shared resources (XSA-461) charlesa critical security Security update for xen This update for xen fixes the following issues: - Update to Xen 4.18.3 security bug fix release (bsc#1027519) * No upstream changelog found in sources or webpage - bsc#1228574 - VUL-0: CVE-2024-31145: xen: error handling in x86 IOMMU identity mapping (XSA-460) - bsc#1228575 - VUL-0: CVE-2024-31146: xen: PCI device pass-through with shared resources (XSA-461) - bsc#1227355 - VUL-0: CVE-2024-31143: xen: double unlock in x86 guest IRQ handling (XSA-458) - bsc#1214718 - The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen - Upstream bug fixes (bsc#1027519) - bsc#1225953 - Package xen does not build with gcc14 because of new errors - bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may trigger Xen bug check (XSA-454) - Upstream bug fixes (bsc#1027519) - Update to Xen 4.18.2 security bug fix release (bsc#1027519) xen-4.18.2-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may trigger Xen bug check (XSA-454) - bsc#1222302 - VUL-0: CVE-2024-31142: xen: x86: Incorrect logic for BTC/SRSO mitigations (XSA-455) - bsc#1222453 - VUL-0: CVE-2024-2201: xen: x86: Native Branch History Injection (XSA-456) - bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative Race Conditions (XSA-453) - Update to Xen 4.18.1 bug fix release (bsc#1027519) xen-4.18.1-testing-src.tar.bz2 * No upstream changelog found in sources or webpage - bsc#1221332 - VUL-0: CVE-2023-28746: xen: x86: Register File Data Sampling (XSA-452) - bsc#1221334 - VUL-0: CVE-2024-2193: xen: GhostRace: Speculative Race Conditions (XSA-453) - bsc#1219885 - VUL-0: CVE-2023-46841: xen: x86: shadow stack vs exceptions from emulation stubs (XSA-451) - Upstream bug fixes (bsc#1027519) - bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions assigned to incorrect contexts (XSA-449) - bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to quarantine devices in !HVM builds (XSA-450) - bsc#1219080 - VUL-0: CVE-2023-46840: xen: VT-d: Failure to quarantine devices in !HVM builds (XSA-450) - bsc#1218851 - VUL-0: CVE-2023-46839: xen: phantom functions assigned to incorrect contexts (XSA-449) xen