Security update for xen

The XEN virtualization was updated to fix bugs and security issues:

Security issues fixed:
CVE-2015-0361: XSA-116: xen: xen crash due to use after free on hvm guest teardown

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

CVE-2014-9030: XSA-113: Guest effectable page reference leak in
MMU_MACHPHYS_UPDATE handling

CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO
emulated inside the hypervisor

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode
hypercall argument translation

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86
emulation of far branches

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU
update hypercalls

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can
be evaded by native NMI interrupts

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu
operations are not preemptible

Bugs fixed:
- Restore missing fixes from block-dmmd script

- bnc#904255 - XEN boot hangs in early boot on UEFI system

- Fix missing banner by restoring figlet program

- bnc#903357 - Corrupted save/restore test leaves orphaned data
in xenstore

- bnc#903359 - Temporary migration name is not cleaned up after
migration

- bnc#903850 - Xen: guest user mode triggerable VM exits not
handled by hypervisor

- bnc#866902 - Xen save/restore of HVM guests cuts off disk and networking

- bnc#901317 - increase limit domUloader to 32MB

- bnc#898772 - SLES 12 RC3 - XEN Host crashes when assigning non-VF
device (SR-IOV) to guest

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than
60 vcpus

- bsc#900292 - xl: change default dump directory

- Update xen2libvirt.py to better detect and handle file formats

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than
60 vcpus

- bnc#897906 - libxc: check return values on mmap() and madvise()
on xc_alloc_hypercall_buffer()

- bnc#896023 - Adjust xentop column layout

Fixed bugs
bnc#903359
Temporary migration name is not cleaned up after migration
bnc#905467
VUL-0: CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor
bnc#910681
VUL-0: CVE-2015-0361: XSA-116: xen: xen crash due to use after free on hvm guest teardown
bnc#905465
VUL-0: CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode hypercall argument translation
bnc#906996
VUL-0: CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation
bnc#903970
VUL-0: CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86 emulation of far branches
bnc#901317
increase limit domUloader to 32MB
bnc#900292
xl tries to save core files to missing /var/xen/dump directory
bnc#898772
SLES 12 RC3 - XEN Host crashes when assigning non-VF device (SR-IOV) to guest
bnc#906439
VUL-0: CVE-2014-9030: XSA-113: xen: Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
bnc#903967
VUL-0: CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU update hypercalls
bnc#866902
Xen save/restore of HVM guests cuts off disk and networking
bnc#904255
Partner-L3: XEN boot hangs in early boot on UEFI system
bnc#903357
Corrupted save/restore test leaves orphaned data in xenstore
bnc#882089
Windows 2012 R2 fails to boot up with greater than 60 vcpus
bnc#889526
VUL-0: CVE-2014-5146,CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible
bnc#903850
VUL-0: Xen: guest user mode triggerable VM exits not handled by hypervisor
bnc#897906
libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer()
bnc#896023
Adjust xentop column layout
bnc#826717
VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
Selected Binaries
openSUSE Build Service is sponsored by