File _patchinfo of Package patchinfo
<patchinfo incident="4138"> <issue id="877642" tracker="bnc">VUL-0: CVE-2014-0222: qemu: qcow1: validate L2 table size to avoid integer overflows</issue> <issue id="901488" tracker="bnc">Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores</issue> <issue id="907514" tracker="bnc">Bus fatal error & sles12 sudden reboot has been observed</issue> <issue id="910258" tracker="bnc">SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC</issue> <issue id="918984" tracker="bnc">Bus fatal error & sles11-SP4 sudden reboot has been observed</issue> <issue id="923967" tracker="bnc">Partner-L3: Bus fatal error & sles11-SP3 sudden reboot has been observed</issue> <issue id="925466" tracker="bnc">Kdump does not work in a XEN environment</issue> <issue id="932267" tracker="bnc">VUL-1: CVE-2015-4037: qemu,kvm,xen: insecure temporary file use in /net/slirp.c</issue> <issue id="935634" tracker="bnc">VUL-0: CVE-2015-3259: xen: XSA-137: xl command line config handling stack overflow</issue> <issue id="938344" tracker="bnc">VUL-0: CVE-2015-5154: qemu,kvm,xen: host code execution via IDE subsystem CD-ROM</issue> <issue id="939709" tracker="bnc">VUL-0: CVE-2015-5166: XSA-139: xen: Use after free in QEMU/Xen block unplug protocol</issue> <issue id="939712" tracker="bnc">VUL-0: CVE-2015-5165: XSA-140: QEMU leak of uninitialized heap memory in rtl8139 device model</issue> <issue id="944463" tracker="bnc">VUL-1: CVE-2015-5239: qemu,kvm,xen: Integer overflow in vnc_client_read() and protocol_client_msg()</issue> <issue id="944697" tracker="bnc">VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue</issue> <issue id="945167" tracker="bnc"></issue> <issue id="947165" tracker="bnc">VUL-1: CVE-2015-7311: xen: libxl fails to honour readonly flag on disks with qemu-xen (xsa-142)</issue> <issue id="949138" tracker="bnc">Setting vcpu affinity under Xen causes libvirtd abort</issue> <issue id="950367" tracker="bnc">VUL-0: CVE-2015-7835: xen: x86: Uncontrolled creation of large page mappings by PV guests (XSA-148)</issue> <issue id="950703" tracker="bnc">VUL-1: CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149)</issue> <issue id="950705" tracker="bnc">VUL-1: CVE-2015-7969: xen: x86: leak of per-domain profiling-related vcpu pointer array (DoS) (XSA-151)</issue> <issue id="950706" tracker="bnc">VUL-0: CVE-2015-7971: xen: x86: some pmu and profiling hypercalls log without rate limiting (XSA-152)</issue> <issue id="951845" tracker="bnc">VUL-1: CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153)</issue> <issue id="CVE-2014-0222" tracker="cve" /> <issue id="CVE-2015-3259" tracker="cve" /> <issue id="CVE-2015-4037" tracker="cve" /> <issue id="CVE-2015-5154" tracker="cve" /> <issue id="CVE-2015-5165" tracker="cve" /> <issue id="CVE-2015-5166" tracker="cve" /> <issue id="CVE-2015-5239" tracker="cve" /> <issue id="CVE-2015-6815" tracker="cve" /> <issue id="CVE-2015-7311" tracker="cve" /> <issue id="CVE-2015-7835" tracker="cve" /> <issue id="CVE-2015-7969" tracker="cve" /> <issue id="CVE-2015-7971" tracker="cve" /> <issue id="CVE-2015-7972" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description>xen was updated to fix 12 security issues. These security issues were fixed: - CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash guests (bsc#951845). - CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS) (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array (DoS) (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706). - CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267). - CVE-2014-0222: Validate L2 table size to avoid integer overflows (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl fails to honour readonly flag on disks with qemu-xen (bsc#947165). - CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712). - CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709). - CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344). - CVE-2015-3259: xl command line config handling stack overflow (bsc#935634). These non-security issues were fixed: - bsc#907514: Bus fatal error and sles12 sudden reboot has been observed - bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been observed - bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has been observed - bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores - bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show errors - bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort - bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() - bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue - bsc#925466: Kdump does not work in a XEN environment </description> <summary>Security update for xen</summary> </patchinfo>