[SUSE-SU-2015:2306-1] Security update for xen
Security update for xen
This update fixes the following security issues:
bsc#956832 - CVE-2015-8345: xen: qemu: net: eepro100:
infinite loop in processing command block listbsc#956408 - CVE-2015-8339, CVE-2015-8340: xen:
XENMEM_exchange error handling issues (XSA-159)
xsa159.patchbsc#956411 - CVE-2015-7504: xen: heap buffer overflow
vulnerability in pcnet emulator (XSA-162)bsc#954405 - CVE-2015-8104: Xen: guest to host DoS by
triggering an infinite loop in microcode via #DB exceptionbsc#953527 - CVE-2015-5307: kernel: kvm/xen: x86: avoid
guest->host DOS by intercepting #AC (XSA-156)bsc#950704 - CVE-2015-7970: xen: x86: Long latency
populate-on-demand operation is not preemptible (XSA-150)bsc#951845 - CVE-2015-7972: xen: x86: populate-on-demand
balloon size inaccuracy can crash guests (XSA-153)bsc#950703 - CVE-2015-7969: xen: leak of main per-domain
vcpu pointer array (DoS) (XSA-149)bsc#950705 - CVE-2015-7969: xen: x86: leak of per-domain
profiling-related vcpu pointer array (DoS) (XSA-151)bsc#950706 - CVE-2015-7971: xen: x86: some pmu and
profiling hypercalls log without rate limiting (XSA-152)
- ID
- SUSE-SU-2015:2306-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2015/suse-su-20152306-1/
- Published
-
2015-12-18T17:18:02
(8 years ago) - Modified
-
2015-12-18T17:18:02
(8 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- DSA-3396-1
- DSA-3414-1
- DSA-3426-1
- DSA-3454-1
- DSA-3469-1
- DSA-3470-1
- DSA-3471-1
- DSA-3519-1
- ELSA-2015-2552
- ELSA-2015-2636
- ELSA-2015-2694
- ELSA-2015-3107
- ELSA-2016-3502
- ELSA-2016-3503
- FEDORA-2015-08e4af5a20
- FEDORA-2015-115c302856
- FEDORA-2015-12a089920e
- FEDORA-2015-242be2c240
- FEDORA-2015-2773b85b49
- FEDORA-2015-394835a3f6
- FEDORA-2015-668d213dc3
- FEDORA-2015-6f6b79efe2
- FEDORA-2015-a931b02be2
- FEDORA-2015-cd94ad8d7c
- FEDORA-2015-f150b2a8c8
- FEDORA-2015-f2c534bc12
- FREEBSD:2CABFBAB-8BFB-11E5-BD18-002590263BF5
- FREEBSD:405446F4-B1B3-11E5-9728-002590263BF5
- FREEBSD:83350009-881E-11E5-AB94-002590263BF5
- FREEBSD:B56FE6BB-B1B1-11E5-9728-002590263BF5
- FREEBSD:BCAD3FAA-B40C-11E5-9728-002590263BF5
- FREEBSD:C0E76D33-8821-11E5-AB94-002590263BF5
- FREEBSD:E3792855-881F-11E5-AB94-002590263BF5
- FREEBSD:E4848CA4-8820-11E5-AB94-002590263BF5
- FREEBSD:FC1F8795-881D-11E5-AB94-002590263BF5
- GLSA-201602-01
- GLSA-201604-03
- MS:CVE-2015-7504
- RHSA-2015:2552
- RHSA-2015:2636
- RHSA-2015:2694
- SUSE-SU-2015:1853-1
- SUSE-SU-2015:1894-1
- SUSE-SU-2015:1908-1
- SUSE-SU-2015:1952-1
- SUSE-SU-2015:2108-1
- SUSE-SU-2015:2194-1
- SUSE-SU-2015:2324-1
- SUSE-SU-2015:2326-1
- SUSE-SU-2015:2328-1
- SUSE-SU-2015:2338-1
- SUSE-SU-2015:2339-1
- SUSE-SU-2015:2350-1
- SUSE-SU-2016:0010-1
- SUSE-SU-2016:0020-1
- SUSE-SU-2016:0021-1
- SUSE-SU-2016:0354-1
- SUSE-SU-2016:0459-1
- SUSE-SU-2016:0873-1
- SUSE-SU-2016:0955-1
- SUSE-SU-2016:1318-1
- SUSE-SU-2016:1745-1
- SUSE-SU-2016:2074-1
- USN-2800-1
- USN-2801-1
- USN-2802-1
- USN-2803-1
- USN-2804-1
- USN-2805-1
- USN-2806-1
- USN-2807-1
- USN-2828-1
- USN-2840-1
- USN-2841-1
- USN-2841-2
- USN-2842-1
- USN-2842-2
- USN-2843-1
- USN-2843-2
- USN-2844-1
- XSA-149
- XSA-150
- XSA-151
- XSA-152
- XSA-153
- XSA-156
- XSA-159
- XSA-162
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/xen?arch=x86_64&distro=sles-11&sp=2 | suse | xen | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-tools?arch=x86_64&distro=sles-11&sp=2 | suse | xen-tools | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-tools-domU?arch=x86_64&distro=sles-11&sp=2 | suse | xen-tools-domU | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-tools-domU?arch=i586&distro=sles-11&sp=2 | suse | xen-tools-domU | < 4.1.6_08-23.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/xen-libs?arch=x86_64&distro=sles-11&sp=2 | suse | xen-libs | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-libs?arch=i586&distro=sles-11&sp=2 | suse | xen-libs | < 4.1.6_08-23.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/xen-libs-32bit?arch=x86_64&distro=sles-11&sp=2 | suse | xen-libs-32bit | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-kmp-trace?arch=x86_64&distro=sles-11&sp=2 | suse | xen-kmp-trace | < 4.1.6_08_3.0.101_0.7.37-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-kmp-trace?arch=i586&distro=sles-11&sp=2 | suse | xen-kmp-trace | < 4.1.6_08_3.0.101_0.7.37-23.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/xen-kmp-pae?arch=i586&distro=sles-11&sp=2 | suse | xen-kmp-pae | < 4.1.6_08_3.0.101_0.7.37-23.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/xen-kmp-default?arch=x86_64&distro=sles-11&sp=2 | suse | xen-kmp-default | < 4.1.6_08_3.0.101_0.7.37-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-kmp-default?arch=i586&distro=sles-11&sp=2 | suse | xen-kmp-default | < 4.1.6_08_3.0.101_0.7.37-23.1 | sles-11 | i586 | |
Affected | pkg:rpm/suse/xen-doc-pdf?arch=x86_64&distro=sles-11&sp=2 | suse | xen-doc-pdf | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-doc-html?arch=x86_64&distro=sles-11&sp=2 | suse | xen-doc-html | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-devel?arch=x86_64&distro=sles-11&sp=2 | suse | xen-devel | < 4.1.6_08-23.1 | sles-11 | x86_64 | |
Affected | pkg:rpm/suse/xen-devel?arch=i586&distro=sles-11&sp=2 | suse | xen-devel | < 4.1.6_08-23.1 | sles-11 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |