Description: | Summary: The remote host is missing an update for the 'Xen' package(s) announced via the SUSE-SU-2015:1045-1 advisory.
Vulnerability Insight: Xen was updated to fix seven security vulnerabilities:
* CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu. (XSA-128, bnc#931625) * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests. (XSA-129, bnc#931626) * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages. (XSA-130, bnc#931627) * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131, bnc#931628) * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior. (XSA-134, bnc#932790) * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest to host escape. (XSA-135, bnc#932770) * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136, bnc#932996)
Security Issues:
* CVE-2015-4103 <[link moved to references]> * CVE-2015-4104 <[link moved to references]> * CVE-2015-4105 <[link moved to references]> * CVE-2015-4106 <[link moved to references]> * CVE-2015-4163 <[link moved to references]> * CVE-2015-4164 <[link moved to references]> * CVE-2015-3209 <[link moved to references]>
Affected Software/OS: 'Xen' package(s) on SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Server for SAP Applications 11-SP3.
Solution: Please install the updated package(s).
CVSS Score: 7.8
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
|