update for xen

This update of XEN fixed multiple security flaws that could be exploited by local attackers to cause a Denial of Service or potentially escalate privileges. Additionally, several other upstream changes were backported.

Fixed bugs
bnc#725169
xen-4.0.2_21511_03-0.5.3: bootup hangs
bnc#706574
xm console DomUName hang after "xm save/restore" of PVM on the latest Xen
bnc#757537
VUL-0: xen: CVE-2012-0217 PV guest escalation
bnc#683580
Xen Hypervisor occasionally hangs forever during boot up after the message "Enabled directed EOI with ioapic_ack_old on!
bnc#726332
Xen changeset 21326 introduces considerable performance hit
bnc#649209
Xen live migrations slow
bnc#706106
Inconsistent reporting of VM names during migration
bnc#739585
Xen block-attach fails after repeated attach/detach
bnc#736824
Microcode patches for AMD's 15h processors panic the system
bnc#740165
VUL-0: kvm: qemu heap overflow in e1000 device emulation
bnc#691256
unable to open a connection to the XEN Hypervisor
bnc#727515
Fragmented packets hang network boot of HVM guest
bnc#714183
Since last update Xen VM's don't start if the name contains dots (as in 'example.mydomain.com')
bnc#734826
xm rename doesn't work anymore
bnc#712051
VUL-1: xen: IOMMU fault livelock
bnc#732782
xm create hangs when maxmen value is enclosed in "quotes"
bnc#708025
xm console <domain> does not work: xenconsole: Could not read tty from store: No such file or directory
bnc#704160
crm resource migrate fails with xen machines
bnc#715655
No support for performance counters for Westmere E7-8837 and SandyBridge i5-2500
bnc#764077
VUL-0: EMBARGOED: xen: XSA-9: denial of service on older AMD systems
bnc#746702
Xen HVM DomU crash during Windows Server 2008 R2 install, when maxmem > memory
bnc#694863
kexec fails in xen
bnc#757970
VUL-1: xen: guest denial of service on syscall GPF generation
bnc#716695
dom-us using tap devices will not start
bnc#701686
kdump hangs on megaraid_sas driver
bnc#712823
Xen guest does not start reliable when rebooted
CVE-CVE-2012-0029
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted l
Selected Binaries
openSUSE Build Service is sponsored by