openSUSE: 2022:0333-1 important: xen
Description
This update for xen fixes the following issues: - CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576) - CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581) - CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588) Special Instructions and Notes: Please reboot the system after installing this update.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-333=1
Package List
- openSUSE Leap 15.3 (aarch64 x86_64): xen-4.14.3_06-150300.3.18.2 xen-debugsource-4.14.3_06-150300.3.18.2 xen-devel-4.14.3_06-150300.3.18.2 xen-doc-html-4.14.3_06-150300.3.18.2 xen-libs-4.14.3_06-150300.3.18.2 xen-libs-debuginfo-4.14.3_06-150300.3.18.2 xen-tools-4.14.3_06-150300.3.18.2 xen-tools-debuginfo-4.14.3_06-150300.3.18.2 xen-tools-domU-4.14.3_06-150300.3.18.2 xen-tools-domU-debuginfo-4.14.3_06-150300.3.18.2 - openSUSE Leap 15.3 (noarch): xen-tools-xendomains-wait-disk-4.14.3_06-150300.3.18.2 - openSUSE Leap 15.3 (x86_64): xen-libs-32bit-4.14.3_06-150300.3.18.2 xen-libs-32bit-debuginfo-4.14.3_06-150300.3.18.2
References
https://www.suse.com/security/cve/CVE-2022-23033.html https://www.suse.com/security/cve/CVE-2022-23034.html https://www.suse.com/security/cve/CVE-2022-23035.html https://bugzilla.suse.com/1194576 https://bugzilla.suse.com/1194581 https://bugzilla.suse.com/1194588