Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
patchinfo.196
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.196
<patchinfo incident="196"> <issue id="903359" tracker="bnc" /> <issue id="905467" tracker="bnc" /> <issue id="903357" tracker="bnc" /> <issue id="897614" tracker="bnc">Virtualization/xen: Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available</issue> <issue id="882089" tracker="bnc">Windows 2012 R2 fails to boot up with greater than 60 vcpus</issue> <issue id="903970" tracker="bnc">VUL-0: CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86 emulation of far branches</issue> <issue id="901317" tracker="bnc" /> <issue id="900292" tracker="bnc" /> <issue id="898772" tracker="bnc" /> <issue id="906439" tracker="bnc">VUL-0: CVE-2014-9030: XSA-113: xen: Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling</issue> <issue id="903967" tracker="bnc">VUL-0: CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU update hypercalls</issue> <issue id="896023" tracker="bnc">L3: Adjust xentop column layout</issue> <issue id="826717" tracker="bnc">VUL-0: CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts</issue> <issue id="905465" tracker="bnc" /> <issue id="889526" tracker="bnc">VUL-0: CVE-2014-5146,CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations are not preemptible</issue> <issue id="866902" tracker="bnc">Xen save/restore of HVM guests cuts off disk and networking</issue> <issue id="903850" tracker="bnc" /> <issue id="897906" tracker="bnc">libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer()</issue> <issue id="CVE-2014-5146" tracker="cve" /> <issue id="CVE-2014-8594" tracker="cve" /> <issue id="CVE-2014-8595" tracker="cve" /> <issue id="CVE-2014-9030" tracker="cve" /> <issue id="CVE-2014-5149" tracker="cve" /> <issue id="CVE-2013-3495" tracker="cve" /> <issue id="CVE-2014-8866" tracker="cve" /> <issue id="CVE-2014-8867" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description>xen was updated to fix nine security issues. These security issues were fixed: - Guest affectable page reference leak in MMU_MACHPHYS_UPDATE handling (CVE-2014-9030). - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor (CVE-2014-8867). - Excessive checking in compatibility mode hypercall argument translation (CVE-2014-8866). - Guest user mode triggerable VM exits not handled by hypervisor (bnc#9038500). - Missing privilege level checks in x86 emulation of far branches (CVE-2014-8595). - Insufficient restrictions on certain MMU update hypercalls (CVE-2014-8594). - Long latency virtual-mmu operations are not preemptible (CVE-2014-5146, CVE-2014-5149). - Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts (CVE-2013-3495). These non-security issues were fixed: - Corrupted save/restore test leaves orphaned data in xenstore (bnc#903357). - Temporary migration name is not cleaned up after migration (bnc#903359). - Xen save/restore of HVM guests cuts off disk and networking (bnc#866902). - increase limit domUloader to 32MB (bnc#901317). - XEN Host crashes when assigning non-VF device (SR-IOV) to guest (bnc#898772). - Windows 2012 R2 fails to boot up with greater than 60 vcpus (bnc#882089). - Restrict requires on grub2-x86_64-xen to x86_64 hosts - Change default dump directory (bsc#900292). - Update xen2libvirt.py to better detect and handle file formats - libxc: check return values on mmap() and madvise() on xc_alloc_hypercall_buffer() (bnc#897906). - Bug `xen-tools` uninstallable; grub2-x86_64-xen dependency not available (bnc#897614). - Adjust xentop column layout (bnc#896023). </description> <summary>Security update for xen</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor