Security update for xen

xen was updated to fix 12 security issues.

These security issues were fixed:
- CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
- CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).
- CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165).
- CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712).
- CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634).

These non-security issues were fixed:
- bsc#907514: Bus fatal error and sles12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has been observed
- bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg()
- bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue
- bsc#925466: Kdump does not work in a XEN environment

Fixed bugs
bnc#877642
VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows
bnc#901488
Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
bnc#907514
Bus fatal error & sles12 sudden reboot has been observed
bnc#910258
SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
bnc#918984
Bus fatal error & sles11-SP4 sudden reboot has been observed
bnc#923967
Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed
bnc#925466
Kdump does not work in a XEN environment
bnc#932267
VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c
bnc#935634
VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow
bnc#938344
VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM
bnc#939709
VUL-0: CVE-2015-5166: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol
bnc#939712
VUL-0: CVE-2015-5165: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model
bnc#944463
VUL-1: CVE-2015-5239: qemu,kvm,xen: Integer overflow in vnc_client_read() and protocol_client_msg()
bnc#944697
VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue
bnc#945167
Running command ’ xl pci-assignable-add 03:10.1’ secondly show errors
bnc#947165
VUL-1: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142)
bnc#949138
Setting vcpu affinity under Xen causes libvirtd abort
bnc#950367
VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148)
bnc#950703
VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149)
bnc#950705
VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151)
bnc#950706
VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152)
bnc#951845
VUL-1: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153)
Selected Binaries
openSUSE Build Service is sponsored by