SuSE: 2015:1643-1: important: Xen
Summary
Xen was updated to fix the following security issues:
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM.
(bsc#938344)
* CVE-2015-3209: Heap overflow in QEMU's pcnet controller allowing
guest to host escape. (bsc#932770)
* CVE-2015-4164: DoS through iret hypercall handler. (bsc#932996)
* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139
device model. (XSA-140, bsc#939712)
Security Issues:
* CVE-2015-5154
References
#932770 #932996 #938344 #939712
Cross- CVE-2015-3209 CVE-2015-4164 CVE-2015-5154
CVE-2015-5165
Affected Products:
SUSE Linux Enterprise Server 10 SP4 LTSS
https://www.suse.com/security/cve/CVE-2015-3209.html
https://www.suse.com/security/cve/CVE-2015-4164.html
https://www.suse.com/security/cve/CVE-2015-5154.html
https://www.suse.com/security/cve/CVE-2015-5165.html
https://bugzilla.suse.com/932770
https://bugzilla.suse.com/932996
https://bugzilla.suse.com/938344
https://bugzilla.suse.com/939712
https://scc.suse.com:443/patches/