<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:4183-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-10-24T14:52:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-10-24T14:52:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-10-24T14:52:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xen fixes the following issues:

- CVE-2023-34323: Fixed a potential crash in C Xenstored due to an
  incorrect assertion (XSA-440) (bsc#1215744).
- CVE-2023-34326: Fixed a missing IOMMU TLB flush on x86 AMD systems
  with IOMMU hardware and PCI passthrough enabled (XSA-442)
  (bsc#1215746).
- CVE-2023-34325: Fixed multiple parsing issues in libfsimage
  (XSA-443) (bsc#1215747).
- CVE-2023-34327, CVE-2023-34328: Fixed multiple issues with AMD x86
  debugging functionality for guests (XSA-444) (bsc#1215748).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SP2-BYOS-Azure-2023-4183,Image SLES15-SP2-HPC-BYOS-Azure-2023-4183,Image SLES15-SP2-SAP-Azure-2023-4183,Image SLES15-SP2-SAP-Azure-LI-BYOS-Production-2023-4183,Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production-2023-4183,Image SLES15-SP2-SAP-BYOS-Azure-2023-4183,Image SLES15-SP2-SAP-BYOS-EC2-HVM-2023-4183,Image SLES15-SP2-SAP-BYOS-GCE-2023-4183,Image SLES15-SP2-SAP-EC2-HVM-2023-4183,Image SLES15-SP2-SAP-GCE-2023-4183,SUSE-2023-4183,SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4183,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4183,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4183</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      <Description>Link for SUSE-SU-2023:4183-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:4183-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215744</URL>
      <Description>SUSE Bug 1215744</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215746</URL>
      <Description>SUSE Bug 1215746</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215747</URL>
      <Description>SUSE Bug 1215747</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215748</URL>
      <Description>SUSE Bug 1215748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34323/</URL>
      <Description>SUSE CVE CVE-2023-34323 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34325/</URL>
      <Description>SUSE CVE CVE-2023-34325 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34326/</URL>
      <Description>SUSE CVE CVE-2023-34326 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34327/</URL>
      <Description>SUSE CVE CVE-2023-34327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-34328/</URL>
      <Description>SUSE CVE CVE-2023-34328 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SP2-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP2-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP2-BYOS-Azure">Image SLES15-SP2-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-HPC-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP2-HPC-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP2-HPC-BYOS-Azure">Image SLES15-SP2-HPC-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-Azure">
        <FullProductName ProductID="Image SLES15-SP2-SAP-Azure">Image SLES15-SP2-SAP-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SP2-SAP-Azure-LI-BYOS-Production">Image SLES15-SP2-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production">Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-BYOS-Azure">
        <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-Azure">Image SLES15-SP2-SAP-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-BYOS-EC2-HVM">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-BYOS-EC2-HVM">
        <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-EC2-HVM">Image SLES15-SP2-SAP-BYOS-EC2-HVM</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-BYOS-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-BYOS-GCE">
        <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-GCE">Image SLES15-SP2-SAP-BYOS-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-EC2-HVM">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-EC2-HVM">
        <FullProductName ProductID="Image SLES15-SP2-SAP-EC2-HVM">Image SLES15-SP2-SAP-EC2-HVM</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP2-SAP-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP2-SAP-GCE">
        <FullProductName ProductID="Image SLES15-SP2-SAP-GCE">Image SLES15-SP2-SAP-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp2">SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp2">SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2" CPE="cpe:/o:suse:sles_sap:15:sp2">SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-4.13.5_06-150200.3.80.1">xen-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-devel-4.13.5_06-150200.3.80.1">xen-devel-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-doc-html-4.13.5_06-150200.3.80.1">xen-doc-html-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-libs-32bit-4.13.5_06-150200.3.80.1">xen-libs-32bit-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-64bit-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-libs-64bit-4.13.5_06-150200.3.80.1">xen-libs-64bit-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-tools-4.13.5_06-150200.3.80.1">xen-tools-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1">
      <FullProductName ProductID="xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1">xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-HPC-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-HPC-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-Azure">
      <FullProductName ProductID="Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-BYOS-Azure">
      <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-BYOS-EC2-HVM">
      <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-BYOS-EC2-HVM</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-BYOS-EC2-HVM">
      <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-BYOS-EC2-HVM</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-BYOS-GCE">
      <FullProductName ProductID="Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-BYOS-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-EC2-HVM">
      <FullProductName ProductID="Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-EC2-HVM</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-EC2-HVM">
      <FullProductName ProductID="Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-EC2-HVM</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP2-SAP-GCE">
      <FullProductName ProductID="Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of Image SLES15-SP2-SAP-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1">xen-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1">xen-devel-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1">xen-tools-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1">xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1">xen-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1">xen-devel-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1">xen-tools-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1">xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server 15 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1">xen-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1">xen-devel-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1">xen-libs-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1">xen-tools-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1">xen-tools-domU-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1">xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When a transaction is committed, C Xenstored will first check
the quota is correct before attempting to commit any nodes.  It would
be possible that accounting is temporarily negative if a node has
been removed outside of the transaction.

Unfortunately, some versions of C Xenstored are assuming that the
quota cannot be negative and are using assert() to confirm it.  This
will lead to C Xenstored crash when tools are built without -DNDEBUG
(this is the default).
</Note>
    </Notes>
    <CVE>CVE-2023-34323</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34323.html</URL>
        <Description>CVE-2023-34323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215744</URL>
        <Description>SUSE Bug 1215744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

libfsimage contains parsing code for several filesystems, most of them based on
grub-legacy code.  libfsimage is used by pygrub to inspect guest disks.

Pygrub runs as the same user as the toolstack (root in a priviledged domain).

At least one issue has been reported to the Xen Security Team that allows an
attacker to trigger a stack buffer overflow in libfsimage.  After further
analisys the Xen Security Team is no longer confident in the suitability of
libfsimage when run against guest controlled input with super user priviledges.

In order to not affect current deployments that rely on pygrub patches are
provided in the resolution section of the advisory that allow running pygrub in
deprivileged mode.

CVE-2023-4949 refers to the original issue in the upstream grub
project ("An attacker with local access to a system (either through a
disk or external drive) can present a modified XFS partition to
grub-legacy in such a way to exploit a memory corruption in grub's XFS
file system implementation.")  CVE-2023-34325 refers specifically to
the vulnerabilities in Xen's copy of libfsimage, which is decended
from a very old version of grub.
</Note>
    </Notes>
    <CVE>CVE-2023-34325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34325.html</URL>
        <Description>CVE-2023-34325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215747</URL>
        <Description>SUSE Bug 1215747</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The caching invalidation guidelines from the AMD-Vi specification (48882—Rev
3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction
(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU
TLB is not flushed.

Such stale DMA mappings can point to memory ranges not owned by the guest, thus
allowing access to unindented memory regions.
</Note>
    </Notes>
    <CVE>CVE-2023-34326</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34326.html</URL>
        <Description>CVE-2023-34326</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215145</URL>
        <Description>SUSE Bug 1215145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215746</URL>
        <Description>SUSE Bug 1215746</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.
</Note>
    </Notes>
    <CVE>CVE-2023-34327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34327.html</URL>
        <Description>CVE-2023-34327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215748</URL>
        <Description>SUSE Bug 1215748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.
</Note>
    </Notes>
    <CVE>CVE-2023-34328</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-HPC-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-LI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-Azure:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-BYOS-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-EC2-HVM:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>Image SLES15-SP2-SAP-GCE:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP2-LTSS:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-devel-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-libs-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-domU-4.13.5_06-150200.3.80.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP2:xen-tools-xendomains-wait-disk-4.13.5_06-150200.3.80.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20234183-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-34328.html</URL>
        <Description>CVE-2023-34328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215748</URL>
        <Description>SUSE Bug 1215748</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
