6.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
An update that solves two vulnerabilities and has four
fixes is now available.
Description:
This update for xen fixes the following issues:
Updated to version 4.16.2 (bsc#1027519):
- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing
(bsc#1203806).
- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
Bugfixes:
- Fixed Xen DomU unable to emulate audio device (bsc#1201994).
- Fixed logic error in built-in default of max_event_channels
(bsc#1167608, bsc#1201631).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3727=1
SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-3727=1
SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3727=1
SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3727=1