Описание
Security update for xen
This update for xen fixes the following issues:
- CVE-2024-36350, CVE-2024-36357: More AMD transient execution attacks (bsc#1246112, XSA-471)
- CVE-2025-27465: Incorrect stubs exception handling for flags recovery (bsc#1244644, XSA-470)
Список пакетов
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Server 15 SP5-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP5
Ссылки
- Link for SUSE-SU-2025:02325-1
- E-Mail link for SUSE-SU-2025:02325-1
- SUSE Security Ratings
- SUSE Bug 1238896
- SUSE Bug 1244644
- SUSE Bug 1246112
- SUSE CVE CVE-2024-36350 page
- SUSE CVE CVE-2024-36357 page
- SUSE CVE CVE-2025-27465 page
Описание
A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
Затронутые продукты
Ссылки
- CVE-2024-36350
- SUSE Bug 1238896
Описание
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
Затронутые продукты
Ссылки
- CVE-2024-36357
- SUSE Bug 1238896
Описание
Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the exception gracefully, treating it as fatal instead.
Затронутые продукты
Ссылки
- CVE-2025-27465
- SUSE Bug 1244644