SUSE-SU-2015:1479-2

Source
https://www.suse.com/support/update/announcement/2015/suse-su-20151479-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2015:1479-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2015:1479-2
Related
Published
2015-08-11T14:48:25Z
Modified
2015-08-11T14:48:25Z
Summary
Security update for xen
Details

xen was updated to fix the following security issues:

  • CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
  • CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
  • CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
  • CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
  • CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
  • CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
References

Affected packages

SUSE:Linux Enterprise Desktop 11 SP3 / xen

Package

Name
xen
Purl
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.5_12-15.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-kmp-pae": "4.2.5_12_3.0.101_0.47.55-15.1",
            "xen-doc-pdf": "4.2.5_12-15.1",
            "xen-kmp-default": "4.2.5_12_3.0.101_0.47.55-15.1",
            "xen-libs": "4.2.5_12-15.1",
            "xen-doc-html": "4.2.5_12-15.1",
            "xen-libs-32bit": "4.2.5_12-15.1",
            "xen-tools": "4.2.5_12-15.1",
            "xen-tools-domU": "4.2.5_12-15.1",
            "xen": "4.2.5_12-15.1"
        }
    ]
}