{"affected":[{"ecosystem_specific":{"binaries":[{"xen-libs":"4.14.5_08-150300.3.40.1","xen-tools-domU":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.14.5_08-150300.3.40.1","xen-devel":"4.14.5_08-150300.3.40.1","xen-tools":"4.14.5_08-150300.3.40.1","xen-tools-xendomains-wait-disk":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen-libs":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen-libs":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen-libs":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"openSUSE:Leap Micro 5.2","name":"xen","purl":"pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.14.5_08-150300.3.40.1","xen-devel":"4.14.5_08-150300.3.40.1","xen-doc-html":"4.14.5_08-150300.3.40.1","xen-libs":"4.14.5_08-150300.3.40.1","xen-libs-32bit":"4.14.5_08-150300.3.40.1","xen-tools":"4.14.5_08-150300.3.40.1","xen-tools-domU":"4.14.5_08-150300.3.40.1","xen-tools-xendomains-wait-disk":"4.14.5_08-150300.3.40.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.3","name":"xen","purl":"pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.14.5_08-150300.3.40.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806)\n- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807)\n- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)\n- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)\n- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)\n- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)\n- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)\n- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)\n- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)\n- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)\n- xen: Frontends vulnerable to backends (bsc#1193923)\n","id":"SUSE-SU-2022:3947-1","modified":"2022-11-11T08:04:35Z","published":"2022-11-11T08:04:35Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20223947-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33747"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42317"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42326"}],"related":["CVE-2022-33746","CVE-2022-33747","CVE-2022-33748","CVE-2022-42309","CVE-2022-42310","CVE-2022-42311","CVE-2022-42312","CVE-2022-42313","CVE-2022-42314","CVE-2022-42315","CVE-2022-42316","CVE-2022-42317","CVE-2022-42318","CVE-2022-42319","CVE-2022-42320","CVE-2022-42321","CVE-2022-42322","CVE-2022-42323","CVE-2022-42325","CVE-2022-42326"],"summary":"Security update for xen","upstream":["CVE-2022-33746","CVE-2022-33747","CVE-2022-33748","CVE-2022-42309","CVE-2022-42310","CVE-2022-42311","CVE-2022-42312","CVE-2022-42313","CVE-2022-42314","CVE-2022-42315","CVE-2022-42316","CVE-2022-42317","CVE-2022-42318","CVE-2022-42319","CVE-2022-42320","CVE-2022-42321","CVE-2022-42322","CVE-2022-42323","CVE-2022-42325","CVE-2022-42326"]}