SUSE update for xen



Published: 2023-01-26

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU69153

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23824

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in certain processor models offered by AMD. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Update the affected package xen to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Server for SAP: 15-SP1

SUSE Linux Enterprise High Performance Computing: 15-SP1-LTSS

SUSE Enterprise Storage: 6

SUSE CaaS Platform: 4.0

SUSE Linux Enterprise Server: 15-SP1-LTSS

xen-tools-domU-debuginfo: before 4.12.4_32-150100.3.83.1

xen-tools-domU: before 4.12.4_32-150100.3.83.1

xen-tools-debuginfo: before 4.12.4_32-150100.3.83.1

xen-tools: before 4.12.4_32-150100.3.83.1

xen-libs-debuginfo: before 4.12.4_32-150100.3.83.1

xen-libs: before 4.12.4_32-150100.3.83.1

xen-devel: before 4.12.4_32-150100.3.83.1

xen-debugsource: before 4.12.4_32-150100.3.83.1

xen: before 4.12.4_32-150100.3.83.1

External links

http://www.suse.com/support/update/announcement/2023/suse-su-20230154-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###