<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0732-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-04-13T12:01:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-04-13T12:01:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-04-13T12:01:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Xen was updated to 4.3.4 to fix multiple vulnerabities and non-security bugs.

The following vulnerabilities were fixed:

- Long latency MMIO mapping operations are not preemptible (XSA-125 CVE-2015-2752 bnc#922705)
- Unmediated PCI command register access in qemu (XSA-126 CVE-2015-2756 bnc#922706)
- Hypervisor memory corruption due to x86 emulator flaw (bnc#919464 CVE-2015-2151 XSA-123)
- Information leak through version information hypercall (bnc#918998  CVE-2015-2045 XSA-122)
- Information leak via internal x86 system device emulation (bnc#918995 (CVE-2015-2044 XSA-121)
- HVM qemu unexpectedly enabling emulated VGA graphics backends (bnc#919663 CVE-2015-2152 XSA-119)
- information leakage when guest sets high resolution (bnc#895528 CVE-2014-3615)

The following non-security bugs were fixed:

- L3: XEN blktap device intermittently fails to connect (bnc#919098) 
- Problems with detecting free loop devices on Xen guest startup (bnc#903680)
- xentop reports 'Found interface vif101.0 but domain 101 does not exist.' (bnc#861318) 
- Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores (bnc#901488)
- SLES11 SP3 Xen VT-d igb NIC doesn't work (bnc#910254)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0732-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="xen-4.3.4_02-41.1">
      <FullProductName ProductID="xen-4.3.4_02-41.1">xen-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.3.4_02-41.1">
      <FullProductName ProductID="xen-devel-4.3.4_02-41.1">xen-devel-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.3.4_02-41.1">
      <FullProductName ProductID="xen-doc-html-4.3.4_02-41.1">xen-doc-html-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.3.4_02_k3.11.10_29-41.1">
      <FullProductName ProductID="xen-kmp-default-4.3.4_02_k3.11.10_29-41.1">xen-kmp-default-4.3.4_02_k3.11.10_29-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.3.4_02_k3.11.10_29-41.1">
      <FullProductName ProductID="xen-kmp-desktop-4.3.4_02_k3.11.10_29-41.1">xen-kmp-desktop-4.3.4_02_k3.11.10_29-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.3.4_02_k3.11.10_29-41.1">
      <FullProductName ProductID="xen-kmp-pae-4.3.4_02_k3.11.10_29-41.1">xen-kmp-pae-4.3.4_02_k3.11.10_29-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.3.4_02-41.1">
      <FullProductName ProductID="xen-libs-4.3.4_02-41.1">xen-libs-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.3.4_02-41.1">
      <FullProductName ProductID="xen-libs-32bit-4.3.4_02-41.1">xen-libs-32bit-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.3.4_02-41.1">
      <FullProductName ProductID="xen-tools-4.3.4_02-41.1">xen-tools-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.3.4_02-41.1">
      <FullProductName ProductID="xen-tools-domU-4.3.4_02-41.1">xen-tools-domU-4.3.4_02-41.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-xend-tools-4.3.4_02-41.1">
      <FullProductName ProductID="xen-xend-tools-4.3.4_02-41.1">xen-xend-tools-4.3.4_02-41.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.</Note>
    </Notes>
    <CVE>CVE-2014-3615</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3615.html</URL>
        <Description>CVE-2014-3615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/895528</URL>
        <Description>SUSE Bug 895528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.</Note>
    </Notes>
    <CVE>CVE-2015-2044</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2044.html</URL>
        <Description>CVE-2015-2044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918995</URL>
        <Description>SUSE Bug 918995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2045</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2045.html</URL>
        <Description>CVE-2015-2045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2151</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2151.html</URL>
        <Description>CVE-2015-2151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919464</URL>
        <Description>SUSE Bug 919464</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.</Note>
    </Notes>
    <CVE>CVE-2015-2152</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2152.html</URL>
        <Description>CVE-2015-2152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919663</URL>
        <Description>SUSE Bug 919663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).</Note>
    </Notes>
    <CVE>CVE-2015-2752</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2752.html</URL>
        <Description>CVE-2015-2752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922705</URL>
        <Description>SUSE Bug 922705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.</Note>
    </Notes>
    <CVE>CVE-2015-2756</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2756.html</URL>
        <Description>CVE-2015-2756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922706</URL>
        <Description>SUSE Bug 922706</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
