<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:2338-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-12-22T08:41:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-12-22T08:41:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-12-22T08:41:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-xen-20151203-12277,sledsp4-xen-20151203-12277,slessp4-xen-20151203-12277</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      <Description>Link for SUSE-SU-2015:2338-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:2338-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/947165</URL>
      <Description>SUSE Bug 947165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/950703</URL>
      <Description>SUSE Bug 950703</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/950704</URL>
      <Description>SUSE Bug 950704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/950705</URL>
      <Description>SUSE Bug 950705</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/950706</URL>
      <Description>SUSE Bug 950706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/951845</URL>
      <Description>SUSE Bug 951845</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954018</URL>
      <Description>SUSE Bug 954018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954405</URL>
      <Description>SUSE Bug 954405</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/955399</URL>
      <Description>SUSE Bug 955399</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956408</URL>
      <Description>SUSE Bug 956408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956409</URL>
      <Description>SUSE Bug 956409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956411</URL>
      <Description>SUSE Bug 956411</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956592</URL>
      <Description>SUSE Bug 956592</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/956832</URL>
      <Description>SUSE Bug 956832</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5307/</URL>
      <Description>SUSE CVE CVE-2015-5307 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7311/</URL>
      <Description>SUSE CVE CVE-2015-7311 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7504/</URL>
      <Description>SUSE CVE CVE-2015-7504 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7835/</URL>
      <Description>SUSE CVE CVE-2015-7835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7969/</URL>
      <Description>SUSE CVE CVE-2015-7969 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7970/</URL>
      <Description>SUSE CVE CVE-2015-7970 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7971/</URL>
      <Description>SUSE CVE CVE-2015-7971 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7972/</URL>
      <Description>SUSE CVE CVE-2015-7972 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8104/</URL>
      <Description>SUSE CVE CVE-2015-8104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8339/</URL>
      <Description>SUSE CVE CVE-2015-8339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8340/</URL>
      <Description>SUSE CVE CVE-2015-8340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8341/</URL>
      <Description>SUSE CVE CVE-2015-8341 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8345/</URL>
      <Description>SUSE CVE CVE-2015-8345 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4" CPE="cpe:/o:suse:suse_sled:11:sp4">SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.4.3_06-29.1">
      <FullProductName ProductID="xen-devel-4.4.3_06-29.1">xen-devel-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.4.3_06-29.1">
      <FullProductName ProductID="xen-4.4.3_06-29.1">xen-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.4.3_06-29.1">
      <FullProductName ProductID="xen-doc-html-4.4.3_06-29.1">xen-doc-html-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.4.3_06_3.0.101_65-29.1">
      <FullProductName ProductID="xen-kmp-default-4.4.3_06_3.0.101_65-29.1">xen-kmp-default-4.4.3_06_3.0.101_65-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1">
      <FullProductName ProductID="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1">xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.4.3_06-29.1">
      <FullProductName ProductID="xen-libs-4.4.3_06-29.1">xen-libs-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.4.3_06-29.1">
      <FullProductName ProductID="xen-libs-32bit-4.4.3_06-29.1">xen-libs-32bit-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.4.3_06-29.1">
      <FullProductName ProductID="xen-tools-4.4.3_06-29.1">xen-tools-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.4.3_06-29.1">
      <FullProductName ProductID="xen-tools-domU-4.4.3_06-29.1">xen-tools-domU-4.4.3_06-29.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1">xen-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1">xen-doc-html-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1">xen-kmp-default-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1">xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1">xen-libs-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1">xen-libs-32bit-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1">xen-tools-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1">xen-tools-domU-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Desktop 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1">xen-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1">xen-doc-html-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1">xen-kmp-default-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1">xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1">xen-libs-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1">xen-libs-32bit-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1">xen-tools-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1">xen-tools-domU-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1">xen-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1">xen-doc-html-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1">xen-kmp-default-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1">xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1">xen-libs-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1">xen-libs-32bit-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1">xen-tools-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1">xen-tools-domU-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.4.3_06-29.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1">xen-devel-4.4.3_06-29.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.</Note>
    </Notes>
    <CVE>CVE-2015-5307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5307.html</URL>
        <Description>CVE-2015-5307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.</Note>
    </Notes>
    <CVE>CVE-2015-7311</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7311.html</URL>
        <Description>CVE-2015-7311</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/947165</URL>
        <Description>SUSE Bug 947165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.</Note>
    </Notes>
    <CVE>CVE-2015-7504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7504.html</URL>
        <Description>CVE-2015-7504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956411</URL>
        <Description>SUSE Bug 956411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.</Note>
    </Notes>
    <CVE>CVE-2015-7835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7835.html</URL>
        <Description>CVE-2015-7835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940929</URL>
        <Description>SUSE Bug 940929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/947159</URL>
        <Description>SUSE Bug 947159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.</Note>
    </Notes>
    <CVE>CVE-2015-7969</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7969.html</URL>
        <Description>CVE-2015-7969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950703</URL>
        <Description>SUSE Bug 950703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950705</URL>
        <Description>SUSE Bug 950705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.</Note>
    </Notes>
    <CVE>CVE-2015-7970</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7970.html</URL>
        <Description>CVE-2015-7970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950704</URL>
        <Description>SUSE Bug 950704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.</Note>
    </Notes>
    <CVE>CVE-2015-7971</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7971.html</URL>
        <Description>CVE-2015-7971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950706</URL>
        <Description>SUSE Bug 950706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."</Note>
    </Notes>
    <CVE>CVE-2015-7972</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7972.html</URL>
        <Description>CVE-2015-7972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950704</URL>
        <Description>SUSE Bug 950704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951845</URL>
        <Description>SUSE Bug 951845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.</Note>
    </Notes>
    <CVE>CVE-2015-8104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8104.html</URL>
        <Description>CVE-2015-8104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215748</URL>
        <Description>SUSE Bug 1215748</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.</Note>
    </Notes>
    <CVE>CVE-2015-8339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8339.html</URL>
        <Description>CVE-2015-8339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.</Note>
    </Notes>
    <CVE>CVE-2015-8340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8340.html</URL>
        <Description>CVE-2015-8340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.</Note>
    </Notes>
    <CVE>CVE-2015-8341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8341.html</URL>
        <Description>CVE-2015-8341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956409</URL>
        <Description>SUSE Bug 956409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.</Note>
    </Notes>
    <CVE>CVE-2015-8345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.3_06_3.0.101_65-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.3_06-29.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.3_06-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20152338-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8345.html</URL>
        <Description>CVE-2015-8345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956829</URL>
        <Description>SUSE Bug 956829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956832</URL>
        <Description>SUSE Bug 956832</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
