<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0124-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-01-14T18:12:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-01-14T18:12:22Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-01-14T18:12:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for xen fixes the following security issues:

- CVE-2015-8550: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988)
- CVE-2015-8558: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006)
- CVE-2015-7549: qemu pci: null pointer dereference issue (boo#958918)
- CVE-2015-8504: qemu: ui: vnc: avoid floating point exception (boo#958493)
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007) 
- CVE-2015-8555: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009)
- boo#958523 xen: ioreq handling possibly susceptible to multiple read issue (XSA-166)
- CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832)
- boo#956592: xen: virtual PMU is unsupported (XSA-163)
- CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408)
- CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409)
- CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411)
- CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142, boo#947165)
- CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception (boo#954405)
- CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018)
- CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150, boo#950704)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0124-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="xen-4.3.4_10-53.1">
      <FullProductName ProductID="xen-4.3.4_10-53.1">xen-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.3.4_10-53.1">
      <FullProductName ProductID="xen-devel-4.3.4_10-53.1">xen-devel-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.3.4_10-53.1">
      <FullProductName ProductID="xen-doc-html-4.3.4_10-53.1">xen-doc-html-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.3.4_10_k3.11.10_29-53.1">
      <FullProductName ProductID="xen-kmp-default-4.3.4_10_k3.11.10_29-53.1">xen-kmp-default-4.3.4_10_k3.11.10_29-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1">
      <FullProductName ProductID="xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1">xen-kmp-desktop-4.3.4_10_k3.11.10_29-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1">
      <FullProductName ProductID="xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1">xen-kmp-pae-4.3.4_10_k3.11.10_29-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.3.4_10-53.1">
      <FullProductName ProductID="xen-libs-4.3.4_10-53.1">xen-libs-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.3.4_10-53.1">
      <FullProductName ProductID="xen-libs-32bit-4.3.4_10-53.1">xen-libs-32bit-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.3.4_10-53.1">
      <FullProductName ProductID="xen-tools-4.3.4_10-53.1">xen-tools-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.3.4_10-53.1">
      <FullProductName ProductID="xen-tools-domU-4.3.4_10-53.1">xen-tools-domU-4.3.4_10-53.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-xend-tools-4.3.4_10-53.1">
      <FullProductName ProductID="xen-xend-tools-4.3.4_10-53.1">xen-xend-tools-4.3.4_10-53.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.</Note>
    </Notes>
    <CVE>CVE-2015-5307</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5307.html</URL>
        <Description>CVE-2015-5307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.</Note>
    </Notes>
    <CVE>CVE-2015-7311</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7311.html</URL>
        <Description>CVE-2015-7311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/947165</URL>
        <Description>SUSE Bug 947165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.</Note>
    </Notes>
    <CVE>CVE-2015-7504</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7504.html</URL>
        <Description>CVE-2015-7504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956411</URL>
        <Description>SUSE Bug 956411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.</Note>
    </Notes>
    <CVE>CVE-2015-7549</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7549.html</URL>
        <Description>CVE-2015-7549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958917</URL>
        <Description>SUSE Bug 958917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958918</URL>
        <Description>SUSE Bug 958918</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.</Note>
    </Notes>
    <CVE>CVE-2015-7970</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7970.html</URL>
        <Description>CVE-2015-7970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950704</URL>
        <Description>SUSE Bug 950704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.</Note>
    </Notes>
    <CVE>CVE-2015-8104</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8104.html</URL>
        <Description>CVE-2015-8104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.</Note>
    </Notes>
    <CVE>CVE-2015-8339</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8339.html</URL>
        <Description>CVE-2015-8339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.</Note>
    </Notes>
    <CVE>CVE-2015-8340</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8340.html</URL>
        <Description>CVE-2015-8340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.</Note>
    </Notes>
    <CVE>CVE-2015-8341</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8341.html</URL>
        <Description>CVE-2015-8341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956409</URL>
        <Description>SUSE Bug 956409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.</Note>
    </Notes>
    <CVE>CVE-2015-8345</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8345.html</URL>
        <Description>CVE-2015-8345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956829</URL>
        <Description>SUSE Bug 956829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956832</URL>
        <Description>SUSE Bug 956832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.</Note>
    </Notes>
    <CVE>CVE-2015-8504</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8504.html</URL>
        <Description>CVE-2015-8504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958491</URL>
        <Description>SUSE Bug 958491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958493</URL>
        <Description>SUSE Bug 958493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.</Note>
    </Notes>
    <CVE>CVE-2015-8550</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8550.html</URL>
        <Description>CVE-2015-8550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957988</URL>
        <Description>SUSE Bug 957988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."</Note>
    </Notes>
    <CVE>CVE-2015-8554</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8554.html</URL>
        <Description>CVE-2015-8554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958007</URL>
        <Description>SUSE Bug 958007</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-8555</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8555.html</URL>
        <Description>CVE-2015-8555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958009</URL>
        <Description>SUSE Bug 958009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.</Note>
    </Notes>
    <CVE>CVE-2015-8558</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8558.html</URL>
        <Description>CVE-2015-8558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959005</URL>
        <Description>SUSE Bug 959005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959006</URL>
        <Description>SUSE Bug 959006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976109</URL>
        <Description>SUSE Bug 976109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976111</URL>
        <Description>SUSE Bug 976111</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
