Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-4163 (GCVE-0-2015-4163)
Vulnerability from cvelistv5
Published
2015-06-15 15:00
Modified
2024-08-06 06:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:04:02.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX206006" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "75141", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/75141" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX201145" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "1032568", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032568" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX206006" }, { "name": "DSA-3286", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "75141", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/75141" }, { "name": "SUSE-SU-2015:1157", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX201145" }, { "name": "SUSE-SU-2015:1045", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "1032568", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032568" }, { "name": "SUSE-SU-2015:1042", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX206006", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX206006" }, { "name": "DSA-3286", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "75141", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75141" }, { "name": "SUSE-SU-2015:1157", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "http://support.citrix.com/article/CTX201145", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX201145" }, { "name": "SUSE-SU-2015:1045", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "http://xenbits.xen.org/xsa/advisory-134.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "1032568", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032568" }, { "name": "SUSE-SU-2015:1042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-4163", "datePublished": "2015-06-15T15:00:00", "dateReserved": "2015-06-02T00:00:00", "dateUpdated": "2024-08-06T06:04:02.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-4163\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-06-15T15:59:12.413\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.\"},{\"lang\":\"es\",\"value\":\"GNTTABOP_swap_grant_ref en Xen 4.2 hasta 4.5 no comprueba la versi\u00f3n de la operaci\u00f3n de ceder tablas, lo que permite a dominios locales invitados causar una denegaci\u00f3n de servicio (referencia a puntero nulo) a trav\u00e9s de una hiperllamada sin GNTTABOP_setup_table o GNTTABOP_set_version.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47640819-FC43-49ED-8A77-728C3D7255B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2448537F-87AD-45C1-9FB0-7A49CA31BD76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36B2265-70E1-413B-A7CF-79D39E9ADCFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF948E6A-07BE-4C7D-8A98-002E89D35F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0E23B94-1726-4F63-84BB-8D83FAB156D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F784EF07-DBEC-492A-A0F4-F9F7B2551A0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1044792C-D544-457C-9391-4F3B5BAB978D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF23B21B-594A-42E2-AF90-D5C4246B39A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40F356B-4F5F-485D-A53A-8CE4629D6931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90CCECD0-C0F9-45A8-8699-64428637EBCA\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.citrix.com/article/CTX201145\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/75141\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1032568\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-134.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX206006\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.citrix.com/article/CTX201145\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3286\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/75141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1032568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xenbits.xen.org/xsa/advisory-134.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX206006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/476.html\\\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e\"}}" } }
suse-su-2015:1045-1
Vulnerability from csaf_suse
Published
2015-06-05 12:53
Modified
2015-06-05 12:53
Summary
Security update for Xen
Notes
Title of the patch
Security update for Xen
Description of the patch
Xen was updated to fix seven security vulnerabilities:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bnc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bnc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bnc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bnc#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
(XSA-134, bnc#932790)
* CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bnc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bnc#932996)
Security Issues:
* CVE-2015-4103
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
* CVE-2015-4104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
* CVE-2015-4105
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
* CVE-2015-4106
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
* CVE-2015-4163
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163>
* CVE-2015-4164
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
* CVE-2015-3209
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>
Patchnames
sdksp3-xen-201506,sledsp3-xen-201506,slessp3-xen-201506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix seven security vulnerabilities:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bnc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bnc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bnc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bnc#931628)\n * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.\n (XSA-134, bnc#932790)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bnc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bnc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp3-xen-201506,sledsp3-xen-201506,slessp3-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1045-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1045-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151045-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1045-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:53:19Z", "generator": { "date": "2015-06-05T12:53:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1045-1", "initial_release_date": "2015-06-05T12:53:19Z", "revision_history": [ { "date": "2015-06-05T12:53:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.i586", "product": { "name": "xen-devel-4.2.5_08-0.9.1.i586", "product_id": "xen-devel-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "product_id": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.i586", "product": { "name": "xen-libs-4.2.5_08-0.9.1.i586", "product_id": "xen-libs-4.2.5_08-0.9.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64", "product_id": "xen-devel-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-4.2.5_08-0.9.1.x86_64", "product_id": "xen-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-html-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "product_id": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-4.2.5_08-0.9.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "product_id": "xen-tools-domU-4.2.5_08-0.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-devel-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_08-0.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_08-0.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-html-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-doc-pdf-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-32bit-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-libs-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:xen-tools-domU-4.2.5_08-0.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP3:xen-devel-4.2.5_08-0.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:53:19Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1157-1
Vulnerability from csaf_suse
Published
2015-06-05 12:47
Modified
2015-06-05 12:47
Summary
Security update for Xen
Notes
Title of the patch
Security update for Xen
Description of the patch
Xen was updated to fix six security issues:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bsc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bsc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bsc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bsc#931628)
* CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bsc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bsc#932996)
Security Issues:
* CVE-2015-4103
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103>
* CVE-2015-4104
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104>
* CVE-2015-4105
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105>
* CVE-2015-4106
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106>
* CVE-2015-4163
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163>
* CVE-2015-4164
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164>
* CVE-2015-3209
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209>
Patchnames
slessp2-xen-201506
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Xen", "title": "Title of the patch" }, { "category": "description", "text": "\nXen was updated to fix six security issues:\n\n * CVE-2015-4103: Potential unintended writes to host MSI message data\n field via qemu. (XSA-128, bsc#931625)\n * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.\n (XSA-129, bsc#931626)\n * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error\n messages. (XSA-130, bsc#931627)\n * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,\n bsc#931628)\n * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest\n to host escape. (XSA-135, bsc#932770)\n * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,\n bsc#932996)\n\nSecurity Issues:\n\n * CVE-2015-4103\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103\u003e\n * CVE-2015-4104\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104\u003e\n * CVE-2015-4105\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105\u003e\n * CVE-2015-4106\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106\u003e\n * CVE-2015-4163\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163\u003e\n * CVE-2015-4164\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164\u003e\n * CVE-2015-3209\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209\u003e\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-xen-201506", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1157-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1157-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151157-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1157-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for Xen", "tracking": { "current_release_date": "2015-06-05T12:47:22Z", "generator": { "date": "2015-06-05T12:47:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1157-1", "initial_release_date": "2015-06-05T12:47:22Z", "revision_history": [ { "date": "2015-06-05T12:47:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.i586", "product": { "name": "xen-devel-4.1.6_08-0.13.1.i586", "product_id": "xen-devel-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.i586", "product": { "name": "xen-libs-4.1.6_08-0.13.1.i586", "product_id": "xen-libs-4.1.6_08-0.13.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-4.1.6_08-0.13.1.x86_64", "product_id": "xen-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64", "product_id": "xen-devel-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-html-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "product_id": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "product_id": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "product_id": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-4.1.6_08-0.13.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "product_id": "xen-tools-domU-4.1.6_08-0.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-devel-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-html-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64" }, "product_reference": "xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.1.6_08-0.13.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" }, "product_reference": "xen-tools-domU-4.1.6_08-0.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.6_08_3.0.101_0.7.29-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.6_08-0.13.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.6_08-0.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-05T12:47:22Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
suse-su-2015:1042-1
Vulnerability from csaf_suse
Published
2015-06-03 12:47
Modified
2015-06-03 12:47
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
Xen was updated to fix seven security issues and one non-security bug.
The following vulnerabilities were fixed:
* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)
The following non-security bug was fixed:
* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares
Patchnames
SUSE-SLE-DESKTOP-12-2015-262,SUSE-SLE-SDK-12-2015-262,SUSE-SLE-SERVER-12-2015-262
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "Xen was updated to fix seven security issues and one non-security bug.\n\nThe following vulnerabilities were fixed:\n\n* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (bnc#931625)\n* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (bnc#931626)\n* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (bnc#931627)\n* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (bnc#931628)\n* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (bnc#932790)\n* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (bnc#932770)\n* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (bnc#932996)\n\nThe following non-security bug was fixed:\n\n* bnc#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2015-262,SUSE-SLE-SDK-12-2015-262,SUSE-SLE-SERVER-12-2015-262", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2015_1042-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2015:1042-1", "url": "https://www.suse.com/support/update/announcement/2015/suse-su-20151042-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2015:1042-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" }, { "category": "self", "summary": "SUSE Bug 906689", "url": "https://bugzilla.suse.com/906689" }, { "category": "self", "summary": "SUSE Bug 931625", "url": "https://bugzilla.suse.com/931625" }, { "category": "self", "summary": "SUSE Bug 931626", "url": "https://bugzilla.suse.com/931626" }, { "category": "self", "summary": "SUSE Bug 931627", "url": "https://bugzilla.suse.com/931627" }, { "category": "self", "summary": "SUSE Bug 931628", "url": "https://bugzilla.suse.com/931628" }, { "category": "self", "summary": "SUSE Bug 932770", "url": "https://bugzilla.suse.com/932770" }, { "category": "self", "summary": "SUSE Bug 932790", "url": "https://bugzilla.suse.com/932790" }, { "category": "self", "summary": "SUSE Bug 932996", "url": "https://bugzilla.suse.com/932996" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3209 page", "url": "https://www.suse.com/security/cve/CVE-2015-3209/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4103 page", "url": "https://www.suse.com/security/cve/CVE-2015-4103/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4104 page", "url": "https://www.suse.com/security/cve/CVE-2015-4104/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4105 page", "url": "https://www.suse.com/security/cve/CVE-2015-4105/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4106 page", "url": "https://www.suse.com/security/cve/CVE-2015-4106/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4163 page", "url": "https://www.suse.com/security/cve/CVE-2015-4163/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-4164 page", "url": "https://www.suse.com/security/cve/CVE-2015-4164/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2015-06-03T12:47:57Z", "generator": { "date": "2015-06-03T12:47:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2015:1042-1", "initial_release_date": "2015-06-03T12:47:57Z", "revision_history": [ { "date": "2015-06-03T12:47:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.2_06-21.1.x86_64", "product": { "name": "xen-4.4.2_06-21.1.x86_64", "product_id": "xen-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "product_id": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "product_id": "xen-libs-32bit-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.4.2_06-21.1.x86_64", "product": { "name": "xen-devel-4.4.2_06-21.1.x86_64", "product_id": "xen-devel-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64", "product_id": "xen-doc-html-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-4.4.2_06-21.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64", "product_id": "xen-tools-domU-4.4.2_06-21.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-devel-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-doc-html-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.2_06-21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.2_06-21.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3209" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3209", "url": "https://www.suse.com/security/cve/CVE-2015-3209" }, { "category": "external", "summary": "SUSE Bug 932267 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932267" }, { "category": "external", "summary": "SUSE Bug 932770 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932770" }, { "category": "external", "summary": "SUSE Bug 932823 for CVE-2015-3209", "url": "https://bugzilla.suse.com/932823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-3209" }, { "cve": "CVE-2015-4103", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4103" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4103", "url": "https://www.suse.com/security/cve/CVE-2015-4103" }, { "category": "external", "summary": "SUSE Bug 931625 for CVE-2015-4103", "url": "https://bugzilla.suse.com/931625" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4103" }, { "cve": "CVE-2015-4104", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4104" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4104", "url": "https://www.suse.com/security/cve/CVE-2015-4104" }, { "category": "external", "summary": "SUSE Bug 931626 for CVE-2015-4104", "url": "https://bugzilla.suse.com/931626" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "important" } ], "title": "CVE-2015-4104" }, { "cve": "CVE-2015-4105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4105" } ], "notes": [ { "category": "general", "text": "Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4105", "url": "https://www.suse.com/security/cve/CVE-2015-4105" }, { "category": "external", "summary": "SUSE Bug 931627 for CVE-2015-4105", "url": "https://bugzilla.suse.com/931627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4105" }, { "cve": "CVE-2015-4106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4106" } ], "notes": [ { "category": "general", "text": "QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4106", "url": "https://www.suse.com/security/cve/CVE-2015-4106" }, { "category": "external", "summary": "SUSE Bug 931628 for CVE-2015-4106", "url": "https://bugzilla.suse.com/931628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4106" }, { "cve": "CVE-2015-4163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4163" } ], "notes": [ { "category": "general", "text": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4163", "url": "https://www.suse.com/security/cve/CVE-2015-4163" }, { "category": "external", "summary": "SUSE Bug 932790 for CVE-2015-4163", "url": "https://bugzilla.suse.com/932790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4163" }, { "cve": "CVE-2015-4164", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-4164" } ], "notes": [ { "category": "general", "text": "The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-4164", "url": "https://www.suse.com/security/cve/CVE-2015-4164" }, { "category": "external", "summary": "SUSE Bug 932996 for CVE-2015-4164", "url": "https://bugzilla.suse.com/932996" }, { "category": "external", "summary": "SUSE Bug 950367 for CVE-2015-4164", "url": "https://bugzilla.suse.com/950367" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Desktop 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.2_06_k3.12.39_47-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.2_06-21.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12:xen-devel-4.4.2_06-21.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2015-06-03T12:47:57Z", "details": "moderate" } ], "title": "CVE-2015-4164" } ] }
ghsa-586c-2349-hf65
Vulnerability from github
Published
2022-05-14 02:13
Modified
2022-05-14 02:13
VLAI Severity ?
Details
GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
{ "affected": [], "aliases": [ "CVE-2015-4163" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-06-15T15:59:00Z", "severity": "MODERATE" }, "details": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "id": "GHSA-586c-2349-hf65", "modified": "2022-05-14T02:13:59Z", "published": "2022-05-14T02:13:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-4163" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201604-03" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX206006" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "type": "WEB", "url": "http://support.citrix.com/article/CTX201145" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/75141" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032568" }, { "type": "WEB", "url": "http://xenbits.xen.org/xsa/advisory-134.html" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2015-4163
Vulnerability from fkie_nvd
Published
2015-06-15 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html | ||
cve@mitre.org | http://support.citrix.com/article/CTX201145 | ||
cve@mitre.org | http://www.debian.org/security/2015/dsa-3286 | ||
cve@mitre.org | http://www.securityfocus.com/bid/75141 | ||
cve@mitre.org | http://www.securitytracker.com/id/1032568 | ||
cve@mitre.org | http://xenbits.xen.org/xsa/advisory-134.html | Vendor Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201604-03 | ||
cve@mitre.org | https://support.citrix.com/article/CTX206006 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.citrix.com/article/CTX201145 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3286 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/75141 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032568 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-134.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201604-03 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX206006 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "47640819-FC43-49ED-8A77-728C3D7255B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2448537F-87AD-45C1-9FB0-7A49CA31BD76", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "E36B2265-70E1-413B-A7CF-79D39E9ADCFB", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF948E6A-07BE-4C7D-8A98-002E89D35F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C0E23B94-1726-4F63-84BB-8D83FAB156D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "F784EF07-DBEC-492A-A0F4-F9F7B2551A0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1044792C-D544-457C-9391-4F3B5BAB978D", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "CF23B21B-594A-42E2-AF90-D5C4246B39A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*", "matchCriteriaId": "A40F356B-4F5F-485D-A53A-8CE4629D6931", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "90CCECD0-C0F9-45A8-8699-64428637EBCA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version." }, { "lang": "es", "value": "GNTTABOP_swap_grant_ref en Xen 4.2 hasta 4.5 no comprueba la versi\u00f3n de la operaci\u00f3n de ceder tablas, lo que permite a dominios locales invitados causar una denegaci\u00f3n de servicio (referencia a puntero nulo) a trav\u00e9s de una hiperllamada sin GNTTABOP_setup_table o GNTTABOP_set_version." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2015-4163", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-06-15T15:59:12.413", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "cve@mitre.org", "url": "http://support.citrix.com/article/CTX201145" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/75141" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1032568" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "cve@mitre.org", "url": "https://support.citrix.com/article/CTX206006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.citrix.com/article/CTX201145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/75141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX206006" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-4163
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-4163", "description": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "id": "GSD-2015-4163", "references": [ "https://www.suse.com/security/cve/CVE-2015-4163.html", "https://www.debian.org/security/2015/dsa-3286", "https://advisories.mageia.org/CVE-2015-4163.html", "https://linux.oracle.com/cve/CVE-2015-4163.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-4163" ], "details": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.", "id": "GSD-2015-4163", "modified": "2023-12-13T01:19:59.767329Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX206006", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX206006" }, { "name": "DSA-3286", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "75141", "refsource": "BID", "url": "http://www.securityfocus.com/bid/75141" }, { "name": "SUSE-SU-2015:1157", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "http://support.citrix.com/article/CTX201145", "refsource": "CONFIRM", "url": "http://support.citrix.com/article/CTX201145" }, { "name": "SUSE-SU-2015:1045", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "http://xenbits.xen.org/xsa/advisory-134.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "1032568", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032568" }, { "name": "SUSE-SU-2015:1042", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-4163" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://xenbits.xen.org/xsa/advisory-134.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-134.html" }, { "name": "75141", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/75141" }, { "name": "http://support.citrix.com/article/CTX201145", "refsource": "CONFIRM", "tags": [], "url": "http://support.citrix.com/article/CTX201145" }, { "name": "1032568", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032568" }, { "name": "DSA-3286", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3286" }, { "name": "SUSE-SU-2015:1157", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" }, { "name": "SUSE-SU-2015:1045", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" }, { "name": "SUSE-SU-2015:1042", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "https://support.citrix.com/article/CTX206006", "refsource": "CONFIRM", "tags": [], "url": "https://support.citrix.com/article/CTX206006" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:26Z", "publishedDate": "2015-06-15T15:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…