<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1092-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-06-14T14:45:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-06-14T14:45:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-06-14T14:45:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Xen was updated to 4.4.2 to fix multiple vulnerabilities and non-security bugs.

The following vulnerabilities were fixed:

* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (boo#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests  (XSA-129) (boo#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (boo#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (boo#931628)
* CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (boo#932996)
* CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (boo#932790)
* CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (boo#932770)
* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used to denial of service attacks or potential code execution against the host. ()
* CVE-2015-3340: Xen did not initialize certain fields, which allowed certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request. ()
* CVE-2015-2752: Long latency MMIO mapping operations are not preemptible (XSA-125 boo#922705)
* CVE-2015-2756: Unmediated PCI command register access in qemu (XSA-126 boo#922706)
* CVE-2015-2751: Certain domctl operations may be abused to lock up the host (XSA-127 boo#922709)
* CVE-2015-2151: Hypervisor memory corruption due to x86 emulator flaw (boo#919464 XSA-123)
* CVE-2015-2045: Information leak through version information hypercall (boo#918998 XSA-122)
* CVE-2015-2044: Information leak via internal x86 system device emulation (boo#918995 (XSA-121)
* CVE-2015-2152: HVM qemu unexpectedly enabling emulated VGA graphics backends (boo#919663 XSA-119)
* CVE-2014-3615: information leakage when guest sets high resolution (boo#895528)

The following non-security bugs were fixed:

* xentop: Fix memory leak on read failure 
* boo#923758: xen dmesg contains bogus output in early boot
* boo#921842: Xentop doesn't display disk statistics for VMs using qdisks
* boo#919098: L3: XEN blktap device intermittently fails to connect 
* boo#882089: Windows 2012 R2 fails to boot up with greater than 60 vcpus
* boo#903680: Problems with detecting free loop devices on Xen guest startup
* boo#861318: xentop reports &amp;quot;Found interface vif101.0 but domain 101 does not exist.&amp;quot;
* boo#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
* boo#910254: SLES11 SP3 Xen VT-d igb NIC doesn't work
* boo#912011: high ping latency after upgrade to latest SLES11SP3 on xen Dom0
* boo#906689: let systemd schedule xencommons after network-online.target and remote-fs.target so that xendomains has access to remote shares

The following functionality was enabled or enhanced:

* Enable spice support in qemu for x86_64
* Add Qxl vga support
* Enhancement to virsh/libvirtd &amp;quot;send-key&amp;quot; command (FATE#317240)
* Add domain_migrate_constraints_set API to Xend's http interface (FATE#317239)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1092-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.4.2_06-23.1">
      <FullProductName ProductID="xen-4.4.2_06-23.1">xen-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-debugsource-4.4.2_06-23.1">
      <FullProductName ProductID="xen-debugsource-4.4.2_06-23.1">xen-debugsource-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.4.2_06-23.1">
      <FullProductName ProductID="xen-devel-4.4.2_06-23.1">xen-devel-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.4.2_06-23.1">
      <FullProductName ProductID="xen-doc-html-4.4.2_06-23.1">xen-doc-html-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1">
      <FullProductName ProductID="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1">xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1">
      <FullProductName ProductID="xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1">xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1">
      <FullProductName ProductID="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1">xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1">
      <FullProductName ProductID="xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1">xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.4.2_06-23.1">
      <FullProductName ProductID="xen-libs-4.4.2_06-23.1">xen-libs-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.4.2_06-23.1">
      <FullProductName ProductID="xen-libs-32bit-4.4.2_06-23.1">xen-libs-32bit-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-debuginfo-4.4.2_06-23.1">
      <FullProductName ProductID="xen-libs-debuginfo-4.4.2_06-23.1">xen-libs-debuginfo-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-debuginfo-32bit-4.4.2_06-23.1">
      <FullProductName ProductID="xen-libs-debuginfo-32bit-4.4.2_06-23.1">xen-libs-debuginfo-32bit-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.4.2_06-23.1">
      <FullProductName ProductID="xen-tools-4.4.2_06-23.1">xen-tools-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-debuginfo-4.4.2_06-23.1">
      <FullProductName ProductID="xen-tools-debuginfo-4.4.2_06-23.1">xen-tools-debuginfo-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.4.2_06-23.1">
      <FullProductName ProductID="xen-tools-domU-4.4.2_06-23.1">xen-tools-domU-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-debuginfo-4.4.2_06-23.1">
      <FullProductName ProductID="xen-tools-domU-debuginfo-4.4.2_06-23.1">xen-tools-domU-debuginfo-4.4.2_06-23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-4.4.2_06-23.1">xen-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-debugsource-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-debugsource-4.4.2_06-23.1">xen-debugsource-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-devel-4.4.2_06-23.1">xen-devel-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-doc-html-4.4.2_06-23.1">xen-doc-html-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1">xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1">xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1">xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1">xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-4.4.2_06-23.1">xen-libs-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1">xen-libs-32bit-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-debuginfo-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1">xen-libs-debuginfo-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-debuginfo-32bit-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1">xen-libs-debuginfo-32bit-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-4.4.2_06-23.1">xen-tools-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-debuginfo-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1">xen-tools-debuginfo-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1">xen-tools-domU-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-debuginfo-4.4.2_06-23.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1">xen-tools-domU-debuginfo-4.4.2_06-23.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.</Note>
    </Notes>
    <CVE>CVE-2014-3615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.7</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3615.html</URL>
        <Description>CVE-2014-3615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/895528</URL>
        <Description>SUSE Bug 895528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.</Note>
    </Notes>
    <CVE>CVE-2015-2044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2044.html</URL>
        <Description>CVE-2015-2044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918995</URL>
        <Description>SUSE Bug 918995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2045</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2045.html</URL>
        <Description>CVE-2015-2045</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2151</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2151.html</URL>
        <Description>CVE-2015-2151</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919464</URL>
        <Description>SUSE Bug 919464</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.</Note>
    </Notes>
    <CVE>CVE-2015-2152</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2152.html</URL>
        <Description>CVE-2015-2152</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918998</URL>
        <Description>SUSE Bug 918998</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/919663</URL>
        <Description>SUSE Bug 919663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.</Note>
    </Notes>
    <CVE>CVE-2015-2751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2751.html</URL>
        <Description>CVE-2015-2751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922709</URL>
        <Description>SUSE Bug 922709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).</Note>
    </Notes>
    <CVE>CVE-2015-2752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2752.html</URL>
        <Description>CVE-2015-2752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922705</URL>
        <Description>SUSE Bug 922705</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.</Note>
    </Notes>
    <CVE>CVE-2015-2756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2756.html</URL>
        <Description>CVE-2015-2756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/922706</URL>
        <Description>SUSE Bug 922706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.</Note>
    </Notes>
    <CVE>CVE-2015-3209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3209.html</URL>
        <Description>CVE-2015-3209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932267</URL>
        <Description>SUSE Bug 932267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932823</URL>
        <Description>SUSE Bug 932823</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.</Note>
    </Notes>
    <CVE>CVE-2015-3340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3340.html</URL>
        <Description>CVE-2015-3340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927967</URL>
        <Description>SUSE Bug 927967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.</Note>
    </Notes>
    <CVE>CVE-2015-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3456.html</URL>
        <Description>CVE-2015-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935900</URL>
        <Description>SUSE Bug 935900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.</Note>
    </Notes>
    <CVE>CVE-2015-4103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4103.html</URL>
        <Description>CVE-2015-4103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931625</URL>
        <Description>SUSE Bug 931625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-4104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4104.html</URL>
        <Description>CVE-2015-4104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931626</URL>
        <Description>SUSE Bug 931626</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.</Note>
    </Notes>
    <CVE>CVE-2015-4105</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4105.html</URL>
        <Description>CVE-2015-4105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931627</URL>
        <Description>SUSE Bug 931627</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-4106</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4106.html</URL>
        <Description>CVE-2015-4106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931628</URL>
        <Description>SUSE Bug 931628</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.</Note>
    </Notes>
    <CVE>CVE-2015-4163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4163.html</URL>
        <Description>CVE-2015-4163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932790</URL>
        <Description>SUSE Bug 932790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.</Note>
    </Notes>
    <CVE>CVE-2015-4164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:xen-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-debugsource-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-devel-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-doc-html-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-default-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-kmp-desktop-debuginfo-4.4.2_06_k3.16.7_21-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-32bit-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-libs-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-debuginfo-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-4.4.2_06-23.1</ProductID>
        <ProductID>openSUSE 13.2:xen-tools-domU-debuginfo-4.4.2_06-23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4164.html</URL>
        <Description>CVE-2015-4164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932996</URL>
        <Description>SUSE Bug 932996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950367</URL>
        <Description>SUSE Bug 950367</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
