Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Maintenance:3849
patchinfo
_patchinfo
Overview
Details
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo
<patchinfo incident="3849"> <packager>charlesa</packager> <issue tracker="cve" id="CVE-2015-2751"></issue> <issue tracker="cve" id="CVE-2015-4103"></issue> <issue tracker="cve" id="CVE-2015-4104"></issue> <issue tracker="cve" id="CVE-2015-4105"></issue> <issue tracker="cve" id="CVE-2015-4106"></issue> <issue tracker="cve" id="CVE-2015-4163"></issue> <issue tracker="cve" id="CVE-2015-3209"></issue> <issue tracker="cve" id="CVE-2015-4164"></issue> <issue tracker="bnc" id="922709">VUL-0: CVE-2015-2751: xen: XSA-127: Certain domctl operations may be abused to lock up the host</issue> <issue tracker="bnc" id="931625">VUL-0: CVE-2015-4103: xen: Potential unintended writes to host MSI message data field via qemu (XSA-128)</issue> <issue tracker="bnc" id="931626">VUL-0: CVE-2015-4104: xen: PCI MSI mask bits inadvertently exposed to guests (XSA-129)</issue> <issue tracker="bnc" id="931627">VUL-0: CVE-2015-4105: xen: Guest triggerable qemu MSI-X pass-through error messages (XSA-130)</issue> <issue tracker="bnc" id="931628">VUL-0: CVE-2015-4106: xen: Unmediated PCI register access in qemu (XSA-131)</issue> <issue tracker="bnc" id="932790">VUL-0: CVE-2015-4163: xen: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134)</issue> <issue tracker="bnc" id="932770">VUL-0: CVE-2015-3209: qemu,xen,kvm: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135)</issue> <issue tracker="bnc" id="932996">VUL-0: CVE-2015-4164: xen: DoS through iret hypercall handler (XSA-136)</issue> <category>security</category> <rating>important</rating> <summary>Security update for xen</summary> <description>Xen was updated to fix eight vulnerabilities. The following vulnerabilities were fixed: * CVE-2015-2751: Certain domctl operations may be abused to lock up the host (XSA-127 boo#922709) * CVE-2015-4103: Potential unintended writes to host MSI message data field via qemu (XSA-128) (boo#931625) * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests (XSA-129) (boo#931626) * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error messages (XSA-130) (boo#931627) * CVE-2015-4106: Unmediated PCI register access in qemu (XSA-131) (boo#931628) * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior (XSA-134) (boo#932790) * CVE-2015-3209: heap overflow in qemu pcnet controller allowing guest to host escape (XSA-135) (boo#932770) * CVE-2015-4164: DoS through iret hypercall handler (XSA-136) (boo#932996)</description> <reboot_needed/> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor