{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.13.5_06-150200.3.80.1","xen-devel":"4.13.5_06-150200.3.80.1","xen-libs":"4.13.5_06-150200.3.80.1","xen-tools":"4.13.5_06-150200.3.80.1","xen-tools-domU":"4.13.5_06-150200.3.80.1","xen-tools-xendomains-wait-disk":"4.13.5_06-150200.3.80.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.5_06-150200.3.80.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.5_06-150200.3.80.1","xen-devel":"4.13.5_06-150200.3.80.1","xen-libs":"4.13.5_06-150200.3.80.1","xen-tools":"4.13.5_06-150200.3.80.1","xen-tools-domU":"4.13.5_06-150200.3.80.1","xen-tools-xendomains-wait-disk":"4.13.5_06-150200.3.80.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.5_06-150200.3.80.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.13.5_06-150200.3.80.1","xen-devel":"4.13.5_06-150200.3.80.1","xen-libs":"4.13.5_06-150200.3.80.1","xen-tools":"4.13.5_06-150200.3.80.1","xen-tools-domU":"4.13.5_06-150200.3.80.1","xen-tools-xendomains-wait-disk":"4.13.5_06-150200.3.80.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.5_06-150200.3.80.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2023-34323: Fixed a potential crash in C Xenstored due to an\n  incorrect assertion (XSA-440) (bsc#1215744).\n- CVE-2023-34326: Fixed a missing IOMMU TLB flush on x86 AMD systems\n  with IOMMU hardware and PCI passthrough enabled (XSA-442)\n  (bsc#1215746).\n- CVE-2023-34325: Fixed multiple parsing issues in libfsimage\n  (XSA-443) (bsc#1215747).\n- CVE-2023-34327, CVE-2023-34328: Fixed multiple issues with AMD x86\n  debugging functionality for guests (XSA-444) (bsc#1215748).\n","id":"SUSE-SU-2023:4183-1","modified":"2023-10-24T14:52:38Z","published":"2023-10-24T14:52:38Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215746"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34323"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34325"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34326"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34328"}],"related":["CVE-2023-34323","CVE-2023-34325","CVE-2023-34326","CVE-2023-34327","CVE-2023-34328"],"summary":"Security update for xen","upstream":["CVE-2023-34323","CVE-2023-34325","CVE-2023-34326","CVE-2023-34327","CVE-2023-34328"]}