{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.4.2_04-18.1","xen-kmp-default":"4.4.2_04_k3.12.39_47-18.1","xen-libs":"4.4.2_04-18.1","xen-libs-32bit":"4.4.2_04-18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.2_04-18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen-devel":"4.4.2_04-18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.2_04-18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.4.2_04-18.1","xen-doc-html":"4.4.2_04-18.1","xen-kmp-default":"4.4.2_04_k3.12.39_47-18.1","xen-libs":"4.4.2_04-18.1","xen-libs-32bit":"4.4.2_04-18.1","xen-tools":"4.4.2_04-18.1","xen-tools-domU":"4.4.2_04-18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.2_04-18.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.4.2_04-18.1","xen-doc-html":"4.4.2_04-18.1","xen-kmp-default":"4.4.2_04_k3.12.39_47-18.1","xen-libs":"4.4.2_04-18.1","xen-libs-32bit":"4.4.2_04-18.1","xen-tools":"4.4.2_04-18.1","xen-tools-domU":"4.4.2_04-18.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.2_04-18.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nXEN was updated to fix two security issues and bugs.\n\nSecurity issues fixed:\n* CVE-2015-3340: Xen did not initialize certain fields, which allowed\n  certain remote service domains to obtain sensitive information from\n  memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist\n  request.\n\n* CVE-2015-2751: Xen, when using toolstack disaggregation, allowed remote\n  domains with partial management control to cause a denial of service\n  (host lock) via unspecified domctl operations.\n\n* CVE-2015-2752: The XEN_DOMCTL_memory_mapping hypercall in Xen, when\n  using a PCI passthrough device, was not preemptable, which allowed local\n  x86 HVM domain users to cause a denial of service (host CPU consumption)\n  via a crafted request to the device model (qemu-dm).\n\n* CVE-2015-3456: Fixed a buffer overflow in the floppy drive emulation, which could be used\n  to denial of service attacks or potential code execution against the host.\n\nBugs fixed:\n- xentop: Fix memory leak on read failure \n","id":"SUSE-SU-2015:0923-1","modified":"2015-05-12T21:54:24Z","published":"2015-05-12T21:54:24Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20150923-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/922705"},{"type":"REPORT","url":"https://bugzilla.suse.com/922709"},{"type":"REPORT","url":"https://bugzilla.suse.com/927967"},{"type":"REPORT","url":"https://bugzilla.suse.com/929339"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3456"}],"related":["CVE-2015-2751","CVE-2015-2752","CVE-2015-3340","CVE-2015-3456"],"summary":"Security update for xen","upstream":["CVE-2015-2751","CVE-2015-2752","CVE-2015-3340","CVE-2015-3456"]}