suse-su-2022:14886-1
Vulnerability from csaf_suse
Published
2022-02-17 08:52
Modified
2022-02-17 08:52
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues:
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
Patchnames
slessp4-xen-14886
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)\n- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-xen-14886",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_14886-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:14886-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-202214886-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:14886-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html"
},
{
"category": "self",
"summary": "SUSE Bug 1194581",
"url": "https://bugzilla.suse.com/1194581"
},
{
"category": "self",
"summary": "SUSE Bug 1194588",
"url": "https://bugzilla.suse.com/1194588"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23034 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23034/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23035/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2022-02-17T08:52:37Z",
"generator": {
"date": "2022-02-17T08:52:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:14886-1",
"initial_release_date": "2022-02-17T08:52:37Z",
"revision_history": [
{
"date": "2022-02-17T08:52:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"product": {
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"product_id": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"product_id": "xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_52-61.70.1.i586",
"product": {
"name": "xen-libs-4.4.4_52-61.70.1.i586",
"product_id": "xen-libs-4.4.4_52-61.70.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_52-61.70.1.i586",
"product": {
"name": "xen-tools-domU-4.4.4_52-61.70.1.i586",
"product_id": "xen-tools-domU-4.4.4_52-61.70.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-4.4.4_52-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-doc-html-4.4.4_52-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-libs-4.4.4_52-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_52-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-tools-4.4.4_52-61.70.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_52-61.70.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_52-61.70.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_52-61.70.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586"
},
"product_reference": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_52-61.70.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586"
},
"product_reference": "xen-libs-4.4.4_52-61.70.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_52-61.70.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586"
},
"product_reference": "xen-tools-domU-4.4.4_52-61.70.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_52-61.70.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_52-61.70.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-23034",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23034"
}
],
"notes": [
{
"category": "general",
"text": "A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23034",
"url": "https://www.suse.com/security/cve/CVE-2022-23034"
},
{
"category": "external",
"summary": "SUSE Bug 1194581 for CVE-2022-23034",
"url": "https://bugzilla.suse.com/1194581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-17T08:52:37Z",
"details": "low"
}
],
"title": "CVE-2022-23034"
},
{
"cve": "CVE-2022-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23035"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest\u0027s use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23035",
"url": "https://www.suse.com/security/cve/CVE-2022-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1194588 for CVE-2022-23035",
"url": "https://bugzilla.suse.com/1194588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_52_3.0.101_108.132-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_52_3.0.101_108.132-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_52-61.70.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_52-61.70.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-02-17T08:52:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-23035"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…