Xen was updated to 4.2.3 c/s 26170 to fix various bugs and security issues.
Following issues were fixed:
- bnc#845520 - CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies
- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error
"No memory for trampoline"
- Improvements to block-dmmd script bnc#828623
- bnc#840196 - MTU size on Dom0 gets reset when booting DomU with e1000 device
- bnc#840592 - CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation
- bnc#841766 - CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation
- bnc#842511 - CVE-2013-4368: XSA-67: xen: Information leak through outs instruction emulation
- bnc#842512 - CVE-2013-4369: XSA-68: xen: possible null dereference when parsing vif ratelimiting info
- bnc#842513 - CVE-2013-4370: XSA-69: xen: misplaced free in ocaml xc_vcpu_getaffinity stub
- bnc#842514 - CVE-2013-4371: XSA-70: xen: use-after-free in libxl_list_cpupool under memory pressure
- bnc#842515 - CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
- bnc#839596 - CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs
- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform
and with xen environment, in booting stage ,xen hypervisor will
panic.
- bnc#833796 - Xen: migration broken from xsave-capable to xsave-incapable host
- bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h”
cannot power off system
- bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and
sles11sp3 with xen environment, xen hypervisor will panic on
multiple blades nPar.
- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform
and with xen environment, in booting stage ,xen hypervisor will
panic.
- bnc#835896 - vcpus not started after upgrading Dom0 from 11SP2 to
SP3
- bnc#836239 - SLES 11 SP3 Xen security patch does not
automatically update UEFI boot binary
-
Submitted by
Charles Arnold (charlesa)
- Reboot is suggested