Lucene search

K
suseSuseSUSE-SU-2022:3727-1
HistoryOct 25, 2022 - 12:00 a.m.

Security update for xen (moderate)

2022-10-2500:00:00
lists.opensuse.org
8

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

An update that solves two vulnerabilities and has four
fixes is now available.

Description:

This update for xen fixes the following issues:

 Updated to version 4.16.2 (bsc#1027519):

 - CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing
   (bsc#1203806).
 - CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).


 Bugfixes:

 - Fixed Xen DomU unable to emulate audio device (bsc#1201994).
 - Fixed logic error in built-in default of max_event_channels
   (bsc#1167608, bsc#1201631).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.4:

    zypper in -t patch openSUSE-SLE-15.4-2022-3727=1

  • SUSE Linux Enterprise Module for Server Applications 15-SP4:

    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-3727=1

  • SUSE Linux Enterprise Module for Basesystem 15-SP4:

    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3727=1

  • SUSE Linux Enterprise Micro 5.3:

    zypper in -t patch SUSE-SLE-Micro-5.3-2022-3727=1

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H