<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Xen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0944-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2013-03-13T11:27:38Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2013-03-13T11:27:38Z</InitialReleaseDate>
    <CurrentReleaseDate>2013-03-13T11:27:38Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Xen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp2-xen</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      <Description>Link for SUSE-SU-2015:0944-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0944-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/777628</URL>
      <Description>SUSE Bug 777628</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789940</URL>
      <Description>SUSE Bug 789940</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789944</URL>
      <Description>SUSE Bug 789944</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789945</URL>
      <Description>SUSE Bug 789945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789948</URL>
      <Description>SUSE Bug 789948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789950</URL>
      <Description>SUSE Bug 789950</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789951</URL>
      <Description>SUSE Bug 789951</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/789988</URL>
      <Description>SUSE Bug 789988</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/792476</URL>
      <Description>SUSE Bug 792476</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/793927</URL>
      <Description>SUSE Bug 793927</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/794316</URL>
      <Description>SUSE Bug 794316</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/797014</URL>
      <Description>SUSE Bug 797014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/797031</URL>
      <Description>SUSE Bug 797031</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/797523</URL>
      <Description>SUSE Bug 797523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/798188</URL>
      <Description>SUSE Bug 798188</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/799694</URL>
      <Description>SUSE Bug 799694</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/800156</URL>
      <Description>SUSE Bug 800156</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/800275</URL>
      <Description>SUSE Bug 800275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/802690</URL>
      <Description>SUSE Bug 802690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/805094</URL>
      <Description>SUSE Bug 805094</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/806736</URL>
      <Description>SUSE Bug 806736</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/910441</URL>
      <Description>SUSE Bug 910441</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/927967</URL>
      <Description>SUSE Bug 927967</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/929339</URL>
      <Description>SUSE Bug 929339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5510/</URL>
      <Description>SUSE CVE CVE-2012-5510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5511/</URL>
      <Description>SUSE CVE CVE-2012-5511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5512/</URL>
      <Description>SUSE CVE CVE-2012-5512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5513/</URL>
      <Description>SUSE CVE CVE-2012-5513 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5514/</URL>
      <Description>SUSE CVE CVE-2012-5514 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5515/</URL>
      <Description>SUSE CVE CVE-2012-5515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5634/</URL>
      <Description>SUSE CVE CVE-2012-5634 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-6075/</URL>
      <Description>SUSE CVE CVE-2012-6075 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0153/</URL>
      <Description>SUSE CVE CVE-2013-0153 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3340/</URL>
      <Description>SUSE CVE CVE-2015-3340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3456/</URL>
      <Description>SUSE CVE CVE-2015-3456 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2" CPE="cpe:/o:suse:suse_sles:11:sp2">SUSE Linux Enterprise Server 11 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2" CPE="cpe:/o:suse:sles_sap:11:sp2">SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xen-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-4.1.4_02-0.5.1">xen-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-devel-4.1.6_08-0.11.1">
      <FullProductName ProductID="xen-devel-4.1.6_08-0.11.1">xen-devel-4.1.6_08-0.11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-html-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-doc-html-4.1.4_02-0.5.1">xen-doc-html-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-doc-pdf-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-doc-pdf-4.1.4_02-0.5.1">xen-doc-pdf-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1">
      <FullProductName ProductID="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1">
      <FullProductName ProductID="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1">
      <FullProductName ProductID="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-libs-4.1.4_02-0.5.1">xen-libs-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-libs-32bit-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-libs-32bit-4.1.4_02-0.5.1">xen-libs-32bit-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-tools-4.1.4_02-0.5.1">xen-tools-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xen-tools-domU-4.1.4_02-0.5.1">
      <FullProductName ProductID="xen-tools-domU-4.1.4_02-0.5.1">xen-tools-domU-4.1.4_02-0.5.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xen-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1">xen-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.1.6_08-0.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1">xen-devel-4.1.6_08-0.11.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1">xen-doc-html-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-pdf-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1">xen-doc-pdf-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1">xen-libs-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1">xen-libs-32bit-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1">xen-tools-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1">xen-tools-domU-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1">xen-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.1.6_08-0.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1">xen-devel-4.1.6_08-0.11.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1">xen-doc-html-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-pdf-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1">xen-doc-pdf-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1">xen-libs-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1">xen-libs-32bit-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1">xen-tools-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1">xen-tools-domU-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1">xen-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-devel-4.1.6_08-0.11.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1">xen-devel-4.1.6_08-0.11.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-html-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1">xen-doc-html-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-doc-pdf-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1">xen-doc-pdf-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1">xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1">xen-libs-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-libs-32bit-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1">xen-libs-32bit-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1">xen-tools-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xen-tools-domU-4.1.4_02-0.5.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1">xen-tools-domU-4.1.4_02-0.5.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2012-5510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5510.html</URL>
        <Description>CVE-2012-5510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789945</URL>
        <Description>SUSE Bug 789945</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.</Note>
    </Notes>
    <CVE>CVE-2012-5511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5511.html</URL>
        <Description>CVE-2012-5511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789944</URL>
        <Description>SUSE Bug 789944</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the HVMOP_set_mem_access handler in Xen 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) or obtain sensitive information via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2012-5512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5512.html</URL>
        <Description>CVE-2012-5512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789940</URL>
        <Description>SUSE Bug 789940</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.</Note>
    </Notes>
    <CVE>CVE-2012-5513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5513.html</URL>
        <Description>CVE-2012-5513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789951</URL>
        <Description>SUSE Bug 789951</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2012-5514</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5514.html</URL>
        <Description>CVE-2012-5514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789948</URL>
        <Description>SUSE Bug 789948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789988</URL>
        <Description>SUSE Bug 789988</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.</Note>
    </Notes>
    <CVE>CVE-2012-5515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5515.html</URL>
        <Description>CVE-2012-5515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/789950</URL>
        <Description>SUSE Bug 789950</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.</Note>
    </Notes>
    <CVE>CVE-2012-5634</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5634.html</URL>
        <Description>CVE-2012-5634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/794316</URL>
        <Description>SUSE Bug 794316</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800275</URL>
        <Description>SUSE Bug 800275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/840592</URL>
        <Description>SUSE Bug 840592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.</Note>
    </Notes>
    <CVE>CVE-2012-6075</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-6075.html</URL>
        <Description>CVE-2012-6075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/797523</URL>
        <Description>SUSE Bug 797523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800275</URL>
        <Description>SUSE Bug 800275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/840592</URL>
        <Description>SUSE Bug 840592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.</Note>
    </Notes>
    <CVE>CVE-2013-0153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0153.html</URL>
        <Description>CVE-2013-0153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800275</URL>
        <Description>SUSE Bug 800275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/800802</URL>
        <Description>SUSE Bug 800802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/840592</URL>
        <Description>SUSE Bug 840592</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.</Note>
    </Notes>
    <CVE>CVE-2015-3340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3340.html</URL>
        <Description>CVE-2015-3340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927967</URL>
        <Description>SUSE Bug 927967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.</Note>
    </Notes>
    <CVE>CVE-2015-3456</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-devel-4.1.6_08-0.11.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-html-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-doc-pdf-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-32bit-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-libs-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-4.1.4_02-0.5.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP2:xen-tools-domU-4.1.4_02-0.5.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150944-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3456.html</URL>
        <Description>CVE-2015-3456</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/929339</URL>
        <Description>SUSE Bug 929339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932770</URL>
        <Description>SUSE Bug 932770</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935900</URL>
        <Description>SUSE Bug 935900</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
