<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0126-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-01-14T18:12:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-01-14T18:12:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-01-14T18:12:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for xen fixes the following issues:

- CVE-2015-8567,CVE-2015-8568: xen: qemu: net: vmxnet3: host memory leakage (boo#959387)
- CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988)
- CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006)
- CVE-2015-7549: xen: qemu pci: null pointer dereference issue (boo#958918)
- CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception (boo#958493)
- CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007)
- CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009)
- boo#958523: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166)
- CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832)
- CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018)
- boo#956592: xen: virtual PMU is unsupported (XSA-163)
- CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408)
- CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409)
- CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0126-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.5.2_04-9.2">
      <FullProductName ProductID="xen-4.5.2_04-9.2">xen-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.5.2_04-9.2">
      <FullProductName ProductID="xen-devel-4.5.2_04-9.2">xen-devel-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.5.2_04-9.2">
      <FullProductName ProductID="xen-doc-html-4.5.2_04-9.2">xen-doc-html-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2">
      <FullProductName ProductID="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2">xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.5.2_04-9.2">
      <FullProductName ProductID="xen-libs-4.5.2_04-9.2">xen-libs-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.5.2_04-9.2">
      <FullProductName ProductID="xen-libs-32bit-4.5.2_04-9.2">xen-libs-32bit-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.5.2_04-9.2">
      <FullProductName ProductID="xen-tools-4.5.2_04-9.2">xen-tools-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.5.2_04-9.2">
      <FullProductName ProductID="xen-tools-domU-4.5.2_04-9.2">xen-tools-domU-4.5.2_04-9.2</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-4.5.2_04-9.2">xen-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2">xen-devel-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2">xen-doc-html-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.5.2_04_k4.1.13_5-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2">xen-kmp-default-4.5.2_04_k4.1.13_5-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2">xen-libs-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2">xen-libs-32bit-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2">xen-tools-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.5.2_04-9.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2">xen-tools-domU-4.5.2_04-9.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.</Note>
    </Notes>
    <CVE>CVE-2015-5307</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.7</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5307.html</URL>
        <Description>CVE-2015-5307</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/953527</URL>
        <Description>SUSE Bug 953527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954018</URL>
        <Description>SUSE Bug 954018</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954404</URL>
        <Description>SUSE Bug 954404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954405</URL>
        <Description>SUSE Bug 954405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.</Note>
    </Notes>
    <CVE>CVE-2015-7504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7504.html</URL>
        <Description>CVE-2015-7504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956411</URL>
        <Description>SUSE Bug 956411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.</Note>
    </Notes>
    <CVE>CVE-2015-7549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7549.html</URL>
        <Description>CVE-2015-7549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958917</URL>
        <Description>SUSE Bug 958917</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958918</URL>
        <Description>SUSE Bug 958918</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.</Note>
    </Notes>
    <CVE>CVE-2015-8339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8339.html</URL>
        <Description>CVE-2015-8339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.</Note>
    </Notes>
    <CVE>CVE-2015-8340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8340.html</URL>
        <Description>CVE-2015-8340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956408</URL>
        <Description>SUSE Bug 956408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.</Note>
    </Notes>
    <CVE>CVE-2015-8341</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.5</BaseScore>
        <Vector>AV:A/AC:L/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8341.html</URL>
        <Description>CVE-2015-8341</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956409</URL>
        <Description>SUSE Bug 956409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.</Note>
    </Notes>
    <CVE>CVE-2015-8345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.2</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8345.html</URL>
        <Description>CVE-2015-8345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956829</URL>
        <Description>SUSE Bug 956829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/956832</URL>
        <Description>SUSE Bug 956832</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.</Note>
    </Notes>
    <CVE>CVE-2015-8504</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8504.html</URL>
        <Description>CVE-2015-8504</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958491</URL>
        <Description>SUSE Bug 958491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958493</URL>
        <Description>SUSE Bug 958493</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.</Note>
    </Notes>
    <CVE>CVE-2015-8550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8550.html</URL>
        <Description>CVE-2015-8550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052256</URL>
        <Description>SUSE Bug 1052256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957988</URL>
        <Description>SUSE Bug 957988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."</Note>
    </Notes>
    <CVE>CVE-2015-8554</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8554.html</URL>
        <Description>CVE-2015-8554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958007</URL>
        <Description>SUSE Bug 958007</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-8555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8555.html</URL>
        <Description>CVE-2015-8555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958009</URL>
        <Description>SUSE Bug 958009</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.</Note>
    </Notes>
    <CVE>CVE-2015-8558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8558.html</URL>
        <Description>CVE-2015-8558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959005</URL>
        <Description>SUSE Bug 959005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959006</URL>
        <Description>SUSE Bug 959006</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976109</URL>
        <Description>SUSE Bug 976109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/976111</URL>
        <Description>SUSE Bug 976111</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).</Note>
    </Notes>
    <CVE>CVE-2015-8567</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.3</BaseScore>
        <Vector>AV:A/AC:M/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8567.html</URL>
        <Description>CVE-2015-8567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959386</URL>
        <Description>SUSE Bug 959386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959387</URL>
        <Description>SUSE Bug 959387</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.</Note>
    </Notes>
    <CVE>CVE-2015-8568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:xen-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-devel-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-doc-html-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-kmp-default-4.5.2_04_k4.1.13_5-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-32bit-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-libs-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-4.5.2_04-9.2</ProductID>
        <ProductID>openSUSE Leap 42.1:xen-tools-domU-4.5.2_04-9.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8568.html</URL>
        <Description>CVE-2015-8568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959386</URL>
        <Description>SUSE Bug 959386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959387</URL>
        <Description>SUSE Bug 959387</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
