Hello community,

here is the log from the commit of package patchinfo.3399 for 
openSUSE:13.1:Update checked in at 2015-02-06 10:16:59
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1:Update/patchinfo.3399 (Old)
 and      /work/SRC/openSUSE:13.1:Update/.patchinfo.3399.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.3399"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="3399">
  <issue id="903359" tracker="bnc">Temporary migration name is not cleaned up 
after migration</issue>
  <issue id="910681" tracker="bnc">VUL-0: CVE-2015-0361: XSA-116: xen: xen 
crash due to use after free on hvm guest teardown</issue>
  <issue id="905465" tracker="bnc">VUL-0: CVE-2014-8866: XSA-111: xen: 
Excessive checking in compatibility mode hypercall argument translation</issue>
  <issue id="906996" tracker="bnc">VUL-0: CVE-2014-9065, CVE-2014-9066: 
XSA-114: xen: p2m lock starvation</issue>
  <issue id="903970" tracker="bnc">VUL-0: CVE-2014-8595: XSA-110: xen: Missing 
privilege level checks in x86 emulation of far branches</issue>
  <issue id="901317" tracker="bnc">increase limit domUloader to 32MB</issue>
  <issue id="900292" tracker="bnc">xl tries to save core files to missing 
/var/xen/dump directory</issue>
  <issue id="905467" tracker="bnc">VUL-0: CVE-2014-8867: XSA-112: xen: 
Insufficient bounding of "REP MOVS" to MMIO emulated inside the 
hypervisor</issue>
  <issue id="906439" tracker="bnc">VUL-0: CVE-2014-9030: XSA-113: xen: Guest 
effectable page reference leak in MMU_MACHPHYS_UPDATE handling</issue>
  <issue id="903967" tracker="bnc">VUL-0: CVE-2014-8594: XSA-109: xen: 
Insufficient restrictions on certain MMU update hypercalls</issue>
  <issue id="866902" tracker="bnc">Xen save/restore of HVM guests cuts off disk 
and networking</issue>
  <issue id="826717" tracker="bnc">VUL-0: CVE-2013-3495: XSA-59: xen: Intel 
VT-d Interrupt Remapping engines can be evaded by native NMI interrupts</issue>
  <issue id="903357" tracker="bnc">Corrupted save/restore test leaves orphaned 
data in xenstore</issue>
  <issue id="882089" tracker="bnc">Windows 2012 R2 fails to boot up with 
greater than 60 vcpus</issue>
  <issue id="889526" tracker="bnc">VUL-0: CVE-2014-5146,CVE-2014-5149: xen: 
XSA-97 Long latency virtual-mmu operations are not preemptible</issue>
  <issue id="903850" tracker="bnc">VUL-0: Xen: guest user mode triggerable VM 
exits not handled by hypervisor</issue>
  <issue id="CVE-2014-5146" tracker="cve" />
  <issue id="CVE-2014-8594" tracker="cve" />
  <issue id="CVE-2014-8595" tracker="cve" />
  <issue id="CVE-2015-0361" tracker="cve" />
  <issue id="CVE-2014-9030" tracker="cve" />
  <issue id="CVE-2014-5149" tracker="cve" />
  <issue id="CVE-2014-8866" tracker="cve" />
  <issue id="CVE-2013-3495" tracker="cve" />
  <issue id="CVE-2014-9065" tracker="cve" />
  <issue id="CVE-2014-8867" tracker="cve" />
  <issue id="CVE-2014-9066" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>charlesa</packager>
  <description>
The virtualization software XEN was updated to version 4.3.3 and also
to fix bugs and security issues.

Security issues fixed:
CVE-2015-0361: XSA-116: xen: xen crash due to use after free on hvm guest 
teardown 

CVE-2014-9065, CVE-2014-9066: XSA-114: xen: p2m lock starvation

CVE-2014-9030: XSA-113: Guest effectable page reference leak in 
MMU_MACHPHYS_UPDATE handling

CVE-2014-8867: XSA-112: xen: Insufficient bounding of "REP MOVS" to MMIO 
emulated inside the hypervisor

CVE-2014-8866: XSA-111: xen: Excessive checking in compatibility mode hypercall 
argument translation

CVE-2014-8595: XSA-110: xen: Missing privilege level checks in x86 emulation of 
far branches

CVE-2014-8594: XSA-109: xen: Insufficient restrictions on certain MMU update 
hypercalls

CVE-2013-3495: XSA-59: xen: Intel VT-d Interrupt Remapping engines can be 
evaded by native NMI interrupts

CVE-2014-5146, CVE-2014-5149: xen: XSA-97 Long latency virtual-mmu operations 
are not preemptible

Bugs fixed:
- bnc#903357 - Corrupted save/restore test leaves orphaned data
  in xenstore

- bnc#903359 - Temporary migration name is not cleaned up after
  migration

- bnc#903850 - VUL-0: Xen: guest user mode triggerable VM exits not
  handled by hypervisor

- bnc#866902 - L3: Xen save/restore of HVM guests cuts off disk
  and networking

- bnc#901317 - L3: increase limit domUloader to 32MB
  domUloader.py

- bnc#882089 - Windows 2012 R2 fails to boot up with greater than
  60 vcpus

- bsc#900292 - xl: change default dump directory

- Update to Xen 4.3.3
</description>
<reboot_needed/>
  <summary>Security update for xen</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to