Security update for xen

Xen was updated to fix 6 security issues.

These security issues were fixed:
- CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642).
- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705 bsc#950703).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845).

Fixed bugs
bnc#877642
VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows
bnc#932267
VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c
bnc#950367
VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148)
bnc#950703
VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149)
bnc#950705
VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151)
bnc#950706
VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152)
bnc#951845
VUL-1: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153)
Selected Binaries
openSUSE Build Service is sponsored by