{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.12.4_38-150100.3.92.1","xen-devel":"4.12.4_38-150100.3.92.1","xen-libs":"4.12.4_38-150100.3.92.1","xen-tools":"4.12.4_38-150100.3.92.1","xen-tools-domU":"4.12.4_38-150100.3.92.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_38-150100.3.92.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.4_38-150100.3.92.1","xen-devel":"4.12.4_38-150100.3.92.1","xen-libs":"4.12.4_38-150100.3.92.1","xen-tools":"4.12.4_38-150100.3.92.1","xen-tools-domU":"4.12.4_38-150100.3.92.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_38-150100.3.92.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.4_38-150100.3.92.1","xen-devel":"4.12.4_38-150100.3.92.1","xen-libs":"4.12.4_38-150100.3.92.1","xen-tools":"4.12.4_38-150100.3.92.1","xen-tools-domU":"4.12.4_38-150100.3.92.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_38-150100.3.92.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).\n- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).\n- CVE-2023-20593: Fixed AMD Zenbleed (XSA-433) (bsc#1213616).\n- CVE-2022-40982: Fixed Intel Gather Data Sampling (XSA-435) (bsc#1214083).\n","id":"SUSE-SU-2023:3902-1","modified":"2023-09-29T13:10:32Z","published":"2023-09-29T13:10:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233902-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215145"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215474"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-40982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20588"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-20593"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-34322"}],"related":["CVE-2022-40982","CVE-2023-20588","CVE-2023-20593","CVE-2023-34322"],"summary":"Security update for xen","upstream":["CVE-2022-40982","CVE-2023-20588","CVE-2023-20593","CVE-2023-34322"]}