SUSE Security Update: Security update for xen
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3727-1
Rating:             moderate
References:         #1027519 #1167608 #1201631 #1201994 #1203806 
                    #1203807 
Cross-References:   CVE-2022-33746 CVE-2022-33748
CVSS scores:
                    CVE-2022-33746 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2022-33746 (SUSE): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
                    CVE-2022-33748 (NVD) : 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
                    CVE-2022-33748 (SUSE): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Micro 5.3
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Module for Server Applications 15-SP4
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.3
                    SUSE Manager Retail Branch Server 4.3
                    SUSE Manager Server 4.3
                    openSUSE Leap 15.4
______________________________________________________________________________

   An update that solves two vulnerabilities and has four
   fixes is now available.

Description:

   This update for xen fixes the following issues:

     Updated to version 4.16.2 (bsc#1027519):

     - CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing
       (bsc#1203806).
     - CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).


     Bugfixes:

     - Fixed Xen DomU unable to emulate audio device (bsc#1201994).
     - Fixed logic error in built-in default of max_event_channels
       (bsc#1167608, bsc#1201631).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-3727=1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-3727=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3727=1

   - SUSE Linux Enterprise Micro 5.3:

      zypper in -t patch SUSE-SLE-Micro-5.3-2022-3727=1



Package List:

   - openSUSE Leap 15.4 (aarch64 x86_64):

      xen-4.16.2_06-150400.4.11.1
      xen-debugsource-4.16.2_06-150400.4.11.1
      xen-devel-4.16.2_06-150400.4.11.1
      xen-doc-html-4.16.2_06-150400.4.11.1
      xen-libs-4.16.2_06-150400.4.11.1
      xen-libs-debuginfo-4.16.2_06-150400.4.11.1
      xen-tools-4.16.2_06-150400.4.11.1
      xen-tools-debuginfo-4.16.2_06-150400.4.11.1
      xen-tools-domU-4.16.2_06-150400.4.11.1
      xen-tools-domU-debuginfo-4.16.2_06-150400.4.11.1

   - openSUSE Leap 15.4 (x86_64):

      xen-libs-32bit-4.16.2_06-150400.4.11.1
      xen-libs-32bit-debuginfo-4.16.2_06-150400.4.11.1

   - openSUSE Leap 15.4 (noarch):

      xen-tools-xendomains-wait-disk-4.16.2_06-150400.4.11.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4 (x86_64):

      xen-4.16.2_06-150400.4.11.1
      xen-debugsource-4.16.2_06-150400.4.11.1
      xen-devel-4.16.2_06-150400.4.11.1
      xen-tools-4.16.2_06-150400.4.11.1
      xen-tools-debuginfo-4.16.2_06-150400.4.11.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):

      xen-tools-xendomains-wait-disk-4.16.2_06-150400.4.11.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):

      xen-debugsource-4.16.2_06-150400.4.11.1
      xen-libs-4.16.2_06-150400.4.11.1
      xen-libs-debuginfo-4.16.2_06-150400.4.11.1
      xen-tools-domU-4.16.2_06-150400.4.11.1
      xen-tools-domU-debuginfo-4.16.2_06-150400.4.11.1

   - SUSE Linux Enterprise Micro 5.3 (x86_64):

      xen-debugsource-4.16.2_06-150400.4.11.1
      xen-libs-4.16.2_06-150400.4.11.1
      xen-libs-debuginfo-4.16.2_06-150400.4.11.1


References:

   https://www.suse.com/security/cve/CVE-2022-33746.html
   https://www.suse.com/security/cve/CVE-2022-33748.html
   https://bugzilla.suse.com/1027519
   https://bugzilla.suse.com/1167608
   https://bugzilla.suse.com/1201631
   https://bugzilla.suse.com/1201994
   https://bugzilla.suse.com/1203806
   https://bugzilla.suse.com/1203807

SUSE: 2022:3727-1 moderate: xen

October 25, 2022
An update that solves two vulnerabilities and has four fixes is now available

Summary

This update for xen fixes the following issues: Updated to version 4.16.2 (bsc#1027519): - CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806). - CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807). Bugfixes: - Fixed Xen DomU unable to emulate audio device (bsc#1201994). - Fixed logic error in built-in default of max_event_channels (bsc#1167608, bsc#1201631). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-3727=1 - SUSE Linux Enterprise Module for Server Applications 15-SP4: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-3727=1 - SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3727=1 - SUSE Linux Enterprise Micro 5.3: zypper in -t patch SUSE-SLE-Micro-5.3-2022-3727=1 Package List: - openSUSE Leap 15.4 (aarch64 x86_64): xen-4.16.2_06-150400.4.11.1 xen-debugsource-4.16.2_06-150400.4.11.1 xen-devel-4.16.2_06-150400.4.11.1 xen-doc-html-4.16.2_06-150400.4.11.1 xen-libs-4.16.2_06-150400.4.11.1 xen-libs-debuginfo-4.16.2_06-150400.4.11.1 xen-tools-4.16.2_06-150400.4.11.1 xen-tools-debuginfo-4.16.2_06-150400.4.11.1 xen-tools-domU-4.16.2_06-150400.4.11.1 xen-tools-domU-debuginfo-4.16.2_06-150400.4.11.1 - openSUSE Leap 15.4 (x86_64): xen-libs-32bit-4.16.2_06-150400.4.11.1 xen-libs-32bit-debuginfo-4.16.2_06-150400.4.11.1 - openSUSE Leap 15.4 (noarch): xen-tools-xendomains-wait-disk-4.16.2_06-150400.4.11.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (x86_64): xen-4.16.2_06-150400.4.11.1 xen-debugsource-4.16.2_06-150400.4.11.1 xen-devel-4.16.2_06-150400.4.11.1 xen-tools-4.16.2_06-150400.4.11.1 xen-tools-debuginfo-4.16.2_06-150400.4.11.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch): xen-tools-xendomains-wait-disk-4.16.2_06-150400.4.11.1 - SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64): xen-debugsource-4.16.2_06-150400.4.11.1 xen-libs-4.16.2_06-150400.4.11.1 xen-libs-debuginfo-4.16.2_06-150400.4.11.1 xen-tools-domU-4.16.2_06-150400.4.11.1 xen-tools-domU-debuginfo-4.16.2_06-150400.4.11.1 - SUSE Linux Enterprise Micro 5.3 (x86_64): xen-debugsource-4.16.2_06-150400.4.11.1 xen-libs-4.16.2_06-150400.4.11.1 xen-libs-debuginfo-4.16.2_06-150400.4.11.1

References

#1027519 #1167608 #1201631 #1201994 #1203806

#1203807

Cross- CVE-2022-33746 CVE-2022-33748

CVSS scores:

CVE-2022-33746 (NVD) : 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2022-33746 (SUSE): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H

CVE-2022-33748 (NVD) : 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2022-33748 (SUSE): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Desktop 15-SP4

SUSE Linux Enterprise High Performance Computing 15-SP4

SUSE Linux Enterprise Micro 5.3

SUSE Linux Enterprise Module for Basesystem 15-SP4

SUSE Linux Enterprise Module for Server Applications 15-SP4

SUSE Linux Enterprise Server 15-SP4

SUSE Linux Enterprise Server for SAP Applications 15-SP4

SUSE Manager Proxy 4.3

SUSE Manager Retail Branch Server 4.3

SUSE Manager Server 4.3

openSUSE Leap 15.4

https://www.suse.com/security/cve/CVE-2022-33746.html

https://www.suse.com/security/cve/CVE-2022-33748.html

https://bugzilla.suse.com/1027519

https://bugzilla.suse.com/1167608

https://bugzilla.suse.com/1201631

https://bugzilla.suse.com/1201994

https://bugzilla.suse.com/1203806

https://bugzilla.suse.com/1203807

Severity
Announcement ID: SUSE-SU-2022:3727-1
Rating: moderate

Related News