Lucene search

K
suseSuseOPENSUSE-SU-2015:2003-1
HistoryNov 17, 2015 - 11:10 a.m.

Security update for xen (important)

2015-11-1711:10:33
lists.opensuse.org
14

0.04 Low

EPSS

Percentile

91.1%

xen was updated to fix 12 security issues.

These security issues were fixed:

  • CVE-2015-7972: Populate-on-demand balloon size inaccuracy can crash
    guests (bsc#951845).
  • CVE-2015-7969: Leak of main per-domain vcpu pointer array (DoS)
    (bsc#950703).
  • CVE-2015-7969: Leak of per-domain profiling-related vcpu pointer array
    (DoS) (bsc#950705).
  • CVE-2015-7971: Some pmu and profiling hypercalls log without rate
    limiting (bsc#950706).
  • CVE-2015-4037: Insecure temporary file use in /net/slirp.c (bsc#932267).
  • CVE-2014-0222: Validate L2 table size to avoid integer overflows
    (bsc#877642).
  • CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests
    (bsc#950367).
  • CVE-2015-7311: libxl fails to honour readonly flag on disks with
    qemu-xen (bsc#947165).
  • CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device
    model (bsc#939712).
  • CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol
    (bsc#939709).
  • CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  • CVE-2015-3259: xl command line config handling stack overflow
    (bsc#935634).

These non-security issues were fixed:

  • bsc#907514: Bus fatal error and sles12 sudden reboot has been observed
  • bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of
    guest with VT-d NIC
  • bsc#918984: Bus fatal error and sles11-SP4 sudden reboot has been
    observed
  • bsc#923967: Partner-L3: Bus fatal error and sles11-SP3 sudden reboot has
    been observed
  • bsc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting
    in irq problems on servers with a large amount of CPU cores
  • bsc#945167: Running command xl pci-assignable-add 03:10.1 secondly show
    errors
  • bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
  • bsc#944463: VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in
    vnc_client_read() and protocol_client_msg()
  • bsc#944697: VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue
  • bsc#925466: Kdump does not work in a XEN environment