Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02326-1

Опубликовано: 16 июл. 2025
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

Security fixes:

  • CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117)
  • CVE-2024-53241: Fixed Xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282)
  • CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043)
  • CVE-2024-36350, CVE-2024-36357: More AMD transient execution attacks (bsc#1246112, XSA-471)
  • CVE-2025-27465: Incorrect stubs exception handling for flags recovery (bsc#1244644, XSA-470)

Other fixes:

  • Upstream bug fixes (bsc#1027519)

Список пакетов

SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise Micro 5.3
xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise Micro 5.4
xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise Server 15 SP4-LTSS
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1
SUSE Manager Proxy 4.3
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1
SUSE Manager Server 4.3
xen-4.16.7_02-150400.4.72.1
xen-devel-4.16.7_02-150400.4.72.1
xen-libs-4.16.7_02-150400.4.72.1
xen-tools-4.16.7_02-150400.4.72.1
xen-tools-domU-4.16.7_02-150400.4.72.1
xen-tools-xendomains-wait-disk-4.16.7_02-150400.4.72.1

Описание

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки

Описание

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки

Описание

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки

Описание

In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page Instead of jumping to the Xen hypercall page for doing the iret hypercall, directly code the required sequence in xen-asm.S. This is done in preparation of no longer using hypercall page at all, as it has shown to cause problems with speculation mitigations. This is part of XSA-466 / CVE-2024-53241.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки

Описание

unknown


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки

Описание

Certain instructions need intercepting and emulating by Xen. In some cases Xen emulates the instruction by replaying it, using an executable stub. Some instructions may raise an exception, which is supposed to be handled gracefully. Certain replayed instructions have additional logic to set up and recover the changes to the arithmetic flags. For replayed instructions where the flags recovery logic is used, the metadata for exception handling was incorrect, preventing Xen from handling the the exception gracefully, treating it as fatal instead.


Затронутые продукты
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-devel-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-libs-4.16.7_02-150400.4.72.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xen-tools-4.16.7_02-150400.4.72.1

Ссылки