{"affected":[{"ecosystem_specific":{"binaries":[{"xen-devel":"4.2.5_14-18.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.5_14-18.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.2.5_14-18.2","xen-doc-html":"4.2.5_14-18.2","xen-doc-pdf":"4.2.5_14-18.2","xen-kmp-default":"4.2.5_14_3.0.101_0.47.67-18.2","xen-kmp-pae":"4.2.5_14_3.0.101_0.47.67-18.2","xen-libs":"4.2.5_14-18.2","xen-libs-32bit":"4.2.5_14-18.2","xen-tools":"4.2.5_14-18.2","xen-tools-domU":"4.2.5_14-18.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 11 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.5_14-18.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.2.5_14-18.2","xen-doc-html":"4.2.5_14-18.2","xen-doc-pdf":"4.2.5_14-18.2","xen-kmp-default":"4.2.5_14_3.0.101_0.47.67-18.2","xen-kmp-pae":"4.2.5_14_3.0.101_0.47.67-18.2","xen-libs":"4.2.5_14-18.2","xen-libs-32bit":"4.2.5_14-18.2","xen-tools":"4.2.5_14-18.2","xen-tools-domU":"4.2.5_14-18.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.5_14-18.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.2.5_14-18.2","xen-doc-html":"4.2.5_14-18.2","xen-doc-pdf":"4.2.5_14-18.2","xen-kmp-default":"4.2.5_14_3.0.101_0.47.67-18.2","xen-kmp-pae":"4.2.5_14_3.0.101_0.47.67-18.2","xen-libs":"4.2.5_14-18.2","xen-libs-32bit":"4.2.5_14-18.2","xen-tools":"4.2.5_14-18.2","xen-tools-domU":"4.2.5_14-18.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-TERADATA","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.5_14-18.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.2.5_14-18.2","xen-doc-html":"4.2.5_14-18.2","xen-doc-pdf":"4.2.5_14-18.2","xen-kmp-default":"4.2.5_14_3.0.101_0.47.67-18.2","xen-kmp-pae":"4.2.5_14_3.0.101_0.47.67-18.2","xen-libs":"4.2.5_14-18.2","xen-libs-32bit":"4.2.5_14-18.2","xen-tools":"4.2.5_14-18.2","xen-tools-domU":"4.2.5_14-18.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP3","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.5_14-18.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"xen was updated to fix nine security issues.\n\nThese security issues were fixed:\n- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).\n- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).\n- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).\n- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).\n- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).\n- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).\n- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).\n- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).\n- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).\n\nThese non-security issues were fixed:\n- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed\n- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC\n- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed\n- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed\n- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working\n","id":"SUSE-SU-2015:1853-1","modified":"2015-10-29T16:37:05Z","published":"2015-10-29T16:37:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20151853-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/877642"},{"type":"REPORT","url":"https://bugzilla.suse.com/907514"},{"type":"REPORT","url":"https://bugzilla.suse.com/910258"},{"type":"REPORT","url":"https://bugzilla.suse.com/918984"},{"type":"REPORT","url":"https://bugzilla.suse.com/923967"},{"type":"REPORT","url":"https://bugzilla.suse.com/932267"},{"type":"REPORT","url":"https://bugzilla.suse.com/941074"},{"type":"REPORT","url":"https://bugzilla.suse.com/944463"},{"type":"REPORT","url":"https://bugzilla.suse.com/944697"},{"type":"REPORT","url":"https://bugzilla.suse.com/947165"},{"type":"REPORT","url":"https://bugzilla.suse.com/950367"},{"type":"REPORT","url":"https://bugzilla.suse.com/950703"},{"type":"REPORT","url":"https://bugzilla.suse.com/950705"},{"type":"REPORT","url":"https://bugzilla.suse.com/950706"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2014-0222"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-4037"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-5239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-6815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7311"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7969"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7971"}],"related":["CVE-2014-0222","CVE-2015-4037","CVE-2015-5239","CVE-2015-6815","CVE-2015-7311","CVE-2015-7835","CVE-2015-7969","CVE-2015-7971"],"summary":"Security update for xen","upstream":["CVE-2014-0222","CVE-2015-4037","CVE-2015-5239","CVE-2015-6815","CVE-2015-7311","CVE-2015-7835","CVE-2015-7969","CVE-2015-7971"]}