{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-ESPOS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-BCL","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Manager Proxy 4.1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%204.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Manager Retail Branch Server 4.1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Manager Server 4.1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Manager%20Server%204.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.4_16-150200.3.65.1","xen-devel":"4.13.4_16-150200.3.65.1","xen-libs":"4.13.4_16-150200.3.65.1","xen-tools":"4.13.4_16-150200.3.65.1","xen-tools-domU":"4.13.4_16-150200.3.65.1","xen-tools-xendomains-wait-disk":"4.13.4_16-150200.3.65.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Enterprise%20Storage%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.4_16-150200.3.65.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806).\n- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).\n- CVE-2021-28689: Fixed speculative vulnerabilities with bare (non-shim) 32-bit PV guests (bsc#1185104).\n- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)\n- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)\n- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)\n- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)\n- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)\n- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)\n- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)\n- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)\n- xen: Frontends vulnerable to backends (bsc#1193923).\n","id":"SUSE-SU-2022:3971-1","modified":"2022-11-14T13:24:42Z","published":"2022-11-14T13:24:42Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20223971-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167608"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1193923"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199966"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204482"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204485"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204488"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204489"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204494"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-28689"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42309"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42310"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42313"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42314"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42315"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42316"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42317"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42319"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42320"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42321"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-42326"}],"related":["CVE-2021-28689","CVE-2022-33746","CVE-2022-33748","CVE-2022-42309","CVE-2022-42310","CVE-2022-42311","CVE-2022-42312","CVE-2022-42313","CVE-2022-42314","CVE-2022-42315","CVE-2022-42316","CVE-2022-42317","CVE-2022-42318","CVE-2022-42319","CVE-2022-42320","CVE-2022-42321","CVE-2022-42322","CVE-2022-42323","CVE-2022-42325","CVE-2022-42326"],"summary":"Security update for xen","upstream":["CVE-2021-28689","CVE-2022-33746","CVE-2022-33748","CVE-2022-42309","CVE-2022-42310","CVE-2022-42311","CVE-2022-42312","CVE-2022-42313","CVE-2022-42314","CVE-2022-42315","CVE-2022-42316","CVE-2022-42317","CVE-2022-42318","CVE-2022-42319","CVE-2022-42320","CVE-2022-42321","CVE-2022-42322","CVE-2022-42323","CVE-2022-42325","CVE-2022-42326"]}