Upstream information

CVE-2015-7969 at MITRE

Description

Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.9
Vector AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Note from the SUSE Security Team

Note that CVE-2015-7969 covers both XSA-149 (bsc#950703) and XSA-151 (bsc#950705).

SUSE Bugzilla entries: 950703 [RESOLVED / FIXED], 950705 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP3
  • xen >= 4.2.5_18-21.1
  • xen-doc-html >= 4.2.5_18-21.1
  • xen-doc-pdf >= 4.2.5_18-21.1
  • xen-kmp-default >= 4.2.5_18_3.0.101_0.47.71-21.1
  • xen-kmp-pae >= 4.2.5_18_3.0.101_0.47.71-21.1
  • xen-libs >= 4.2.5_18-21.1
  • xen-libs-32bit >= 4.2.5_18-21.1
  • xen-tools >= 4.2.5_18-21.1
  • xen-tools-domU >= 4.2.5_18-21.1
Patchnames:
sledsp3-xen-12174
sledsp3-xen-20151203-12274
SUSE Linux Enterprise Desktop 11 SP4
  • xen >= 4.4.3_06-29.1
  • xen-doc-html >= 4.4.3_06-29.1
  • xen-kmp-default >= 4.4.3_06_3.0.101_65-29.1
  • xen-kmp-pae >= 4.4.3_06_3.0.101_65-29.1
  • xen-libs >= 4.4.3_06-29.1
  • xen-libs-32bit >= 4.4.3_06-29.1
  • xen-tools >= 4.4.3_06-29.1
  • xen-tools-domU >= 4.4.3_06-29.1
Patchnames:
sledsp4-xen-12184
sledsp4-xen-20151203-12277
SUSE Linux Enterprise Desktop 12 SP1
  • xen >= 4.5.1_12-2.3
  • xen-kmp-default >= 4.5.1_12_k3.12.49_11-2.3
  • xen-libs >= 4.5.1_12-2.3
  • xen-libs-32bit >= 4.5.1_12-2.3
SUSE Linux Enterprise Desktop 12 SP2
  • xen >= 4.7.0_12-23.4
  • xen-libs >= 4.7.0_12-23.4
  • xen-libs-32bit >= 4.7.0_12-23.4
SUSE Linux Enterprise Desktop 12 SP3
  • xen >= 4.9.0_08-2.2
  • xen-libs >= 4.9.0_08-2.2
  • xen-libs-32bit >= 4.9.0_08-2.2
SUSE Linux Enterprise Desktop 12 SP4
  • xen >= 4.11.0_08-1.11
  • xen-libs >= 4.11.0_08-1.11
  • xen-libs-32bit >= 4.11.0_08-1.11
SUSE Linux Enterprise Desktop 12
  • xen >= 4.4.3_06-22.15.1
  • xen-kmp-default >= 4.4.3_06_k3.12.48_52.27-22.15.1
  • xen-libs >= 4.4.3_06-22.15.1
  • xen-libs-32bit >= 4.4.3_06-22.15.1
Patchnames:
SUSE-SLE-DESKTOP-12-2015-1000
SUSE-SLE-DESKTOP-12-2015-795
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise Server 12 SP5
  • xen >= 4.12.1_06-1.1
  • xen-doc-html >= 4.12.1_06-1.1
  • xen-libs >= 4.12.1_06-1.1
  • xen-libs-32bit >= 4.12.1_06-1.1
  • xen-tools >= 4.12.1_06-1.1
  • xen-tools-domU >= 4.12.1_06-1.1
SUSE Linux Enterprise Module for Basesystem 15 SP1
  • xen-libs >= 4.12.0_12-1.1
  • xen-tools-domU >= 4.12.0_12-1.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
  • xen-libs >= 4.13.1_02-1.2
  • xen-tools-domU >= 4.13.1_02-1.2
SUSE Linux Enterprise Module for Basesystem 15 SP3
  • xen-libs >= 4.14.1_16-1.6
  • xen-tools-domU >= 4.14.1_16-1.6
SUSE Linux Enterprise Module for Basesystem 15
  • xen-libs >= 4.10.1_04-1.4
  • xen-tools-domU >= 4.10.1_04-1.4
SUSE Linux Enterprise Module for Server Applications 15 SP1
  • xen >= 4.12.0_12-1.1
  • xen-devel >= 4.12.0_12-1.1
  • xen-tools >= 4.12.0_12-1.1
SUSE Linux Enterprise Module for Server Applications 15 SP2
  • xen >= 4.13.1_02-1.2
  • xen-devel >= 4.13.1_02-1.2
  • xen-tools >= 4.13.1_02-1.2
  • xen-tools-xendomains-wait-disk >= 4.13.1_02-1.2
SUSE Linux Enterprise Module for Server Applications 15 SP3
  • xen >= 4.14.1_16-1.6
  • xen-devel >= 4.14.1_16-1.6
  • xen-tools >= 4.14.1_16-1.6
  • xen-tools-xendomains-wait-disk >= 4.14.1_16-1.6
SUSE Linux Enterprise Module for Server Applications 15
  • xen >= 4.10.1_04-1.4
  • xen-devel >= 4.10.1_04-1.4
  • xen-tools >= 4.10.1_04-1.4
SUSE Linux Enterprise Server 11 SP2-LTSS
  • xen >= 4.1.6_08-23.1
  • xen-devel >= 4.1.6_08-23.1
  • xen-doc-html >= 4.1.6_08-23.1
  • xen-doc-pdf >= 4.1.6_08-23.1
  • xen-kmp-default >= 4.1.6_08_3.0.101_0.7.37-23.1
  • xen-kmp-pae >= 4.1.6_08_3.0.101_0.7.37-23.1
  • xen-kmp-trace >= 4.1.6_08_3.0.101_0.7.37-23.1
  • xen-libs >= 4.1.6_08-23.1
  • xen-libs-32bit >= 4.1.6_08-23.1
  • xen-tools >= 4.1.6_08-23.1
  • xen-tools-domU >= 4.1.6_08-23.1
Patchnames:
slessp2-xen-12199
slessp2-xen-20151201-12273
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server for SAP Applications 11 SP3
  • xen >= 4.2.5_18-21.1
  • xen-doc-html >= 4.2.5_18-21.1
  • xen-doc-pdf >= 4.2.5_18-21.1
  • xen-kmp-default >= 4.2.5_18_3.0.101_0.47.71-21.1
  • xen-kmp-pae >= 4.2.5_18_3.0.101_0.47.71-21.1
  • xen-libs >= 4.2.5_18-21.1
  • xen-libs-32bit >= 4.2.5_18-21.1
  • xen-tools >= 4.2.5_18-21.1
  • xen-tools-domU >= 4.2.5_18-21.1
Patchnames:
slessp3-xen-12174
slessp3-xen-20151203-12274
SUSE Linux Enterprise Server 11 SP4
SUSE Linux Enterprise Server for SAP Applications 11 SP4
  • xen >= 4.4.3_06-29.1
  • xen-doc-html >= 4.4.3_06-29.1
  • xen-kmp-default >= 4.4.3_06_3.0.101_65-29.1
  • xen-kmp-pae >= 4.4.3_06_3.0.101_65-29.1
  • xen-libs >= 4.4.3_06-29.1
  • xen-libs-32bit >= 4.4.3_06-29.1
  • xen-tools >= 4.4.3_06-29.1
  • xen-tools-domU >= 4.4.3_06-29.1
Patchnames:
slessp4-xen-12184
slessp4-xen-20151203-12277
SUSE Linux Enterprise Server 12 SP1
  • xen >= 4.5.1_12-2.3
  • xen-doc-html >= 4.5.1_12-2.3
  • xen-kmp-default >= 4.5.1_12_k3.12.49_11-2.3
  • xen-libs >= 4.5.1_12-2.3
  • xen-libs-32bit >= 4.5.1_12-2.3
  • xen-tools >= 4.5.1_12-2.3
  • xen-tools-domU >= 4.5.1_12-2.3
SUSE Linux Enterprise Server 12 SP2
  • xen >= 4.7.0_12-23.4
  • xen-doc-html >= 4.7.0_12-23.4
  • xen-libs >= 4.7.0_12-23.4
  • xen-libs-32bit >= 4.7.0_12-23.4
  • xen-tools >= 4.7.0_12-23.4
  • xen-tools-domU >= 4.7.0_12-23.4
SUSE Linux Enterprise Server 12 SP3
  • xen >= 4.9.0_08-2.2
  • xen-doc-html >= 4.9.0_08-2.2
  • xen-libs >= 4.9.0_08-2.2
  • xen-libs-32bit >= 4.9.0_08-2.2
  • xen-tools >= 4.9.0_08-2.2
  • xen-tools-domU >= 4.9.0_08-2.2
SUSE Linux Enterprise Server 12 SP4
  • xen >= 4.11.0_08-1.11
  • xen-doc-html >= 4.11.0_08-1.11
  • xen-libs >= 4.11.0_08-1.11
  • xen-libs-32bit >= 4.11.0_08-1.11
  • xen-tools >= 4.11.0_08-1.11
  • xen-tools-domU >= 4.11.0_08-1.11
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server for SAP Applications 12
  • xen >= 4.4.3_06-22.15.1
  • xen-doc-html >= 4.4.3_06-22.15.1
  • xen-kmp-default >= 4.4.3_06_k3.12.48_52.27-22.15.1
  • xen-libs >= 4.4.3_06-22.15.1
  • xen-libs-32bit >= 4.4.3_06-22.15.1
  • xen-tools >= 4.4.3_06-22.15.1
  • xen-tools-domU >= 4.4.3_06-22.15.1
Patchnames:
SUSE-SLE-SERVER-12-2015-1000
SUSE-SLE-SERVER-12-2015-795
SUSE Linux Enterprise Software Development Kit 11 SP3
  • xen-devel >= 4.2.5_18-21.1
Patchnames:
sdksp3-xen-12174
sdksp3-xen-20151203-12274
SUSE Linux Enterprise Software Development Kit 11 SP4
  • xen-devel >= 4.4.3_06-29.1
Patchnames:
sdksp4-xen-12184
sdksp4-xen-20151203-12277
SUSE Linux Enterprise Software Development Kit 12 SP1
  • xen-devel >= 4.5.1_12-2.3
SUSE Linux Enterprise Software Development Kit 12 SP2
  • xen-devel >= 4.7.0_12-23.4
SUSE Linux Enterprise Software Development Kit 12 SP3
  • xen-devel >= 4.9.0_08-2.2
SUSE Linux Enterprise Software Development Kit 12 SP4
  • xen-devel >= 4.11.0_08-1.11
SUSE Linux Enterprise Software Development Kit 12 SP5
  • xen-devel >= 4.12.1_06-1.1
SUSE Linux Enterprise Software Development Kit 12
  • xen-devel >= 4.4.3_06-22.15.1
Patchnames:
SUSE-SLE-SDK-12-2015-1000
SUSE-SLE-SDK-12-2015-795
openSUSE Leap 15.0
  • xen-libs >= 4.10.0_20-lp150.1.2
Patchnames:
openSUSE Leap 15.0 GA xen-libs-4.10.0_20-lp150.1.2
openSUSE Tumbleweed
  • xen >= 4.7.0_12-1.3
  • xen-devel >= 4.7.0_12-1.3
  • xen-doc-html >= 4.7.0_12-1.3
  • xen-libs >= 4.7.0_12-1.3
  • xen-libs-32bit >= 4.7.0_12-1.3
  • xen-tools >= 4.7.0_12-1.3
  • xen-tools-domU >= 4.7.0_12-1.3
Patchnames:
openSUSE Tumbleweed GA xen-4.7.0_12-1.3


First public cloud image revisions this CVE is fixed in:


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SLES for SAP Applications xen Released
SUSE Linux Enterprise Desktop 11 SP2 xen Released
SUSE Linux Enterprise Desktop 11 SP3 xen Released
SUSE Linux Enterprise Desktop 11 SP4 xen Released
SUSE Linux Enterprise Desktop 12 xen Released
SUSE Linux Enterprise Point of Service 11 SP3 xen In progress
SUSE Linux Enterprise Server 11 SP1 LTSS xen Released
SUSE Linux Enterprise Server 11 SP2 xen Released
SUSE Linux Enterprise Server 11 SP2 LTSS xen Released
SUSE Linux Enterprise Server 11 SP2 for VMware xen Released
SUSE Linux Enterprise Server 11 SP3 xen Released
SUSE Linux Enterprise Server 11 SP3 LTSS xen Released
SUSE Linux Enterprise Server 11 SP4 xen Released
SUSE Linux Enterprise Server 11 SP4 LTSS xen In progress
SUSE Linux Enterprise Server 12 xen Released
SUSE Linux Enterprise Server 12 SP2 BCL xen Already fixed
SUSE Linux Enterprise Server 12 SP2 LTSS ERICSSON xen Already fixed
SUSE Linux Enterprise Server 12 SP2 LTSS SAP xen Already fixed
SUSE Linux Enterprise Software Development Kit 11 SP2 xen Released
SUSE Linux Enterprise Software Development Kit 11 SP3 xen Released
SUSE Linux Enterprise Software Development Kit 11 SP4 xen Released
SUSE Linux Enterprise Software Development Kit 12 xen Released