This update fixes the following security issues in xen:
- CVE-2012-5510: Grant table version switch list
corruption vulnerability (XSA-26)
- CVE-2012-5511: Several HVM operations do not validate
the range of their inputs (XSA-27)
- CVE-2012-5512: HVMOP_get_mem_access crash /
HVMOP_set_mem_access information leak (XSA-28)
- CVE-2012-5513: XENMEM_exchange may overwrite
hypervisor memory (XSA-29)
- CVE-2012-5514: Missing unlock in
guest_physmap_mark_populate_on_demand() (XSA-30)
- CVE-2012-5515: Several memory hypercall operations
allow invalid extent order values (XSA-31)
Also the following bugs have been fixed and upstream
patches have been applied:
- FATAL PAGE FAULT in hypervisor (arch_do_domctl)
- 25931-x86-domctl-iomem-mapping-checks.patch
- 26132-tmem-save-NULL-check.patch
- 26134-x86-shadow-invlpg-check.patch
- 26148-vcpu-timer-overflow.patch (Replaces
CVE-2012-4535-xsa20.patch)
- 26149-x86-p2m-physmap-error-path.patch (Replaces
CVE-2012-4537-xsa22.patch)
- 26150-x86-shadow-unhook-toplevel-check.patch
(Replaces CVE-2012-4538-xsa23.patch)
- 26151-gnttab-compat-get-status-frames.patch (Replaces
CVE-2012-4539-xsa24.patch)
- bnc#792476 - efi files missing in latest XEN update