Hello community,

here is the log from the commit of package patchinfo.1159 for 
openSUSE:12.1:Update checked in at 2012-12-23 19:31:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.1:Update/patchinfo.1159 (Old)
 and      /work/SRC/openSUSE:12.1:Update/.patchinfo.1159.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.1159", Maintainer is ""

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="1159">
  <packager>charlesa</packager>
  <issue tracker="bnc" id="792476">efi files missing in latest XEN 
update</issue>
  <issue tracker="bnc" id="777628">guest "disappears" after live 
migration</issue>
  <issue tracker="bnc" id="789988">FATAL PAGE FAULT in hypervisor 
(arch_do_domctl)</issue>
  <issue tracker="bnc" id="789950">VUL-0: CVE-2012-5515: xen: Several memory 
hypercall operations allow invalid extent order values (XSA-31)</issue>
  <issue tracker="cve" id="CVE-2012-5515"></issue>
  <issue tracker="cve" id="CVE-2012-5514"></issue>
  <issue tracker="bnc" id="789948">VUL-0: CVE-2012-5514: xen: Missing unlock in 
guest_physmap_mark_populate_on_demand() (XSA-30)</issue>
  <issue tracker="cve" id="CVE-2012-5513"></issue>
  <issue tracker="bnc" id="789951">VUL-0: CVE-2012-5513: xen: XENMEM_exchange 
may overwrite hypervisor memory (XSA-29)</issue>
  <issue tracker="bnc" id="789940">VUL-0: CVE-2012-5512: xen: 
HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak 
(XSA-28)</issue>
  <issue tracker="cve" id="CVE-2012-5512"></issue>
  <issue tracker="bnc" id="789944">VUL-0: CVE-2012-5511: xen: Several HVM 
operations do not validate the range of their inputs (XSA-27)</issue>
  <issue tracker="cve" id="CVE-2012-5511"></issue>
  <issue tracker="bnc" id="789945">VUL-0: CVE-2012-5510: xen: Grant table 
version switch list corruption vulnerability (XSA-26)</issue>
  <issue tracker="cve" id="CVE-2012-5510"></issue>
  <category>security</category>
  <rating>important</rating>
  <summary>xen: security update to fix various denial of service 
issues</summary>
  <description>XEN was updated to fix various denial of service issues.


- bnc#789945 - CVE-2012-5510: xen: Grant table version
  switch list corruption vulnerability (XSA-26)

- bnc#789944 - CVE-2012-5511: xen: Several HVM operations do
  not validate the range of their inputs (XSA-27)

- bnc#789940 - CVE-2012-5512: xen: HVMOP_get_mem_access
  crash / HVMOP_set_mem_access information leak (XSA-28)

- bnc#789951 - CVE-2012-5513: xen: XENMEM_exchange may
  overwrite hypervisor memory (XSA-29)

- bnc#789948 - CVE-2012-5514: xen: Missing unlock in
  guest_physmap_mark_populate_on_demand() (XSA-30)

- bnc#789950 - CVE-2012-5515: xen: Several memory hypercall
  operations allow invalid extent order values (XSA-31)

- bnc#789988 - FATAL PAGE FAULT in hypervisor (arch_do_domctl)

- Upstream patches from Jan
  26132-tmem-save-NULL-check.patch
  26134-x86-shadow-invlpg-check.patch
  26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch)
  26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch)
  26150-x86-shadow-unhook-toplevel-check.patch (Replaces 
CVE-2012-4538-xsa23.patch)

- bnc#777628 - guest "disappears" after live migration
  Updated block-dmmd script


- Fix exception in balloon.py and osdep.py
  xen-max-free-mem.diff
- bnc#792476 - efi files missing in latest XEN update
  Revert c/s 25751 EFI Makefile changes in 23614-x86_64-EFI-boot.patch
</description>
  <reboot_needed/>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to