File _patchinfo of Package patchinfo.4497
<patchinfo incident="4497"> <issue id="956832" tracker="bnc">VUL-0: CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list</issue> <issue id="959006" tracker="bnc">VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS</issue> <issue id="958007" tracker="bnc">VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164)</issue> <issue id="958009" tracker="bnc">VUL-0: CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165)</issue> <issue id="956592" tracker="bnc">VUL-0: xen: virtual PMU is unsupported (XSA-163)</issue> <issue id="958493" tracker="bnc">VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception</issue> <issue id="959387" tracker="bnc">VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage</issue> <issue id="958523" tracker="bnc">VUL-0: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166)</issue> <issue id="957988" tracker="bnc">VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155)</issue> <issue id="956411" tracker="bnc">VUL-0: CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162)</issue> <issue id="958918" tracker="bnc">VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue</issue> <issue id="956408" tracker="bnc">VUL-0: CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159)</issue> <issue id="956409" tracker="bnc">VUL-0: CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160)</issue> <issue id="CVE-2015-8550" tracker="cve" /> <issue id="CVE-2015-7504" tracker="cve" /> <issue id="CVE-2015-8340" tracker="cve" /> <issue id="CVE-2015-8554" tracker="cve" /> <issue id="CVE-2015-8345" tracker="cve" /> <issue id="CVE-2015-8339" tracker="cve" /> <issue id="CVE-2015-8558" tracker="cve" /> <issue id="CVE-2015-8504" tracker="cve" /> <issue id="CVE-2015-8568" tracker="cve" /> <issue id="CVE-2015-8555" tracker="cve" /> <issue id="CVE-2015-8341" tracker="cve" /> <issue id="CVE-2015-5307" tracker="cve" /> <issue id="CVE-2015-7549" tracker="cve" /> <issue id="CVE-2015-8567" tracker="cve" /> <issue id="954018" tracker="bnc">VUL-0: CVE-2015-5307: xen: x86: CPU lockup during AC# fault delivery (XSA-156)</issue> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description> This update for xen fixes the following security issues: - CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage (boo#959387) - CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988) - CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006) - CVE-2015-7549: xen: qemu pci: null pointer dereference issue (boo#958918) - CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception (boo#958493) - CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007) - CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009) - boo#958523: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166) - CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018) - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832) - boo#956592: xen: virtual PMU is unsupported (XSA-163) - CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408) - CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409) - CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411) </description> <summary>Security update for xen</summary> </patchinfo>