SuSE: 2015:1157-1: important: Xen
Summary
Xen was updated to fix six security issues:
* CVE-2015-4103: Potential unintended writes to host MSI message data
field via qemu. (XSA-128, bsc#931625)
* CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
(XSA-129, bsc#931626)
* CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
messages. (XSA-130, bsc#931627)
* CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
bsc#931628)
* CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
to host escape. (XSA-135, bsc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
bsc#932996)
Security Issues:
* CVE-2015-4103
References
#931625 #931626 #931627 #931628 #932770 #932996
Cross- CVE-2015-3209 CVE-2015-4103 CVE-2015-4104
CVE-2015-4105 CVE-2015-4106 CVE-2015-4163
CVE-2015-4164
Affected Products:
SUSE Linux Enterprise Server 11 SP2 LTSS
https://www.suse.com/security/cve/CVE-2015-3209.html
https://www.suse.com/security/cve/CVE-2015-4103.html
https://www.suse.com/security/cve/CVE-2015-4104.html
https://www.suse.com/security/cve/CVE-2015-4105.html
https://www.suse.com/security/cve/CVE-2015-4106.html
https://www.suse.com/security/cve/CVE-2015-4163.html
https://www.suse.com/security/cve/CVE-2015-4164.html
https://bugzilla.suse.com/931625
https://bugzilla.suse.com/931626
https://bugzilla.suse.com/931627
https://bugzilla.suse.com/931628
https://bugzilla.suse.com/932770
https://bugzilla.suse.com/932996
https://scc.suse.com:443/patches/