Security update for xen (important)

2016-01-14T22:19:10
ID OPENSUSE-SU-2016:0126-1
Type suse
Reporter Suse
Modified 2016-01-14T22:19:10

Description

This update for xen fixes the following issues:

  • CVE-2015-8567,CVE-2015-8568: xen: qemu: net: vmxnet3: host memory leakage (boo#959387)
  • CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155, boo#957988)
  • CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS (boo#959006)
  • CVE-2015-7549: xen: qemu pci: null pointer dereference issue (boo#958918)
  • CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception (boo#958493)
  • CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164, boo#958007)
  • CVE-2015-8555: xen: information leak in legacy x86 FPU/XMM initialization (XSA-165, boo#958009)
  • boo#958523: xen: ioreq handling possibly susceptible to multiple read issue (XSA-166)
  • CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list (boo#956832)
  • CVE-2015-5307: xen: x86: CPU lockup during fault delivery (XSA-156, boo#954018)
  • boo#956592: xen: virtual PMU is unsupported (XSA-163)
  • CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159, boo#956408)
  • CVE-2015-8341: xen: libxl leak of pv kernel and initrd on error (XSA-160, boo#956409)
  • CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162, boo#956411)