Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02325-1

Опубликовано: 16 июл. 2025
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • CVE-2024-36350, CVE-2024-36357: More AMD transient execution attacks (bsc#1246112, XSA-471)
  • CVE-2025-27465: Incorrect stubs exception handling for flags recovery (bsc#1244644, XSA-470)

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS
xen-4.17.5_10-150500.3.50.1
xen-devel-4.17.5_10-150500.3.50.1
xen-libs-4.17.5_10-150500.3.50.1
xen-tools-4.17.5_10-150500.3.50.1
xen-tools-domU-4.17.5_10-150500.3.50.1
xen-tools-xendomains-wait-disk-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS
xen-4.17.5_10-150500.3.50.1
xen-devel-4.17.5_10-150500.3.50.1
xen-libs-4.17.5_10-150500.3.50.1
xen-tools-4.17.5_10-150500.3.50.1
xen-tools-domU-4.17.5_10-150500.3.50.1
xen-tools-xendomains-wait-disk-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise Micro 5.5
xen-libs-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise Server 15 SP5-LTSS
xen-4.17.5_10-150500.3.50.1
xen-devel-4.17.5_10-150500.3.50.1
xen-libs-4.17.5_10-150500.3.50.1
xen-tools-4.17.5_10-150500.3.50.1
xen-tools-domU-4.17.5_10-150500.3.50.1
xen-tools-xendomains-wait-disk-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise Server for SAP Applications 15 SP5
xen-4.17.5_10-150500.3.50.1
xen-devel-4.17.5_10-150500.3.50.1
xen-libs-4.17.5_10-150500.3.50.1
xen-tools-4.17.5_10-150500.3.50.1
xen-tools-domU-4.17.5_10-150500.3.50.1
xen-tools-xendomains-wait-disk-4.17.5_10-150500.3.50.1

Описание

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-devel-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-libs-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-tools-4.17.5_10-150500.3.50.1

Ссылки

Описание

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-devel-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-libs-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-tools-4.17.5_10-150500.3.50.1

Ссылки

Описание

Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the exception gracefully, treating it as fatal instead.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-devel-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-libs-4.17.5_10-150500.3.50.1
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:xen-tools-4.17.5_10-150500.3.50.1

Ссылки
Уязвимость SUSE-SU-2025:02325-1