xen was updated to version 4.4.3 to fix nine security issues.
These security issues were fixed: - CVE-2015-4037: The slirpsmb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267). - CVE-2014-0222: Integer overflow in the qcowopen function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642). - CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367). - CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165). - CVE-2015-5239: Integer overflow in vncclientread() and protocolclientmsg() (bsc#944463). - CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697). - CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703). - CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705). - CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).
These non-security issues were fixed: - bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed - bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC - bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed - bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed - bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores - bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors - bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort - bsc#949549: xm create hangs when maxmen value is enclosed in quotes
{ "binaries": [ { "xen-kmp-pae": "4.4.3_02_3.0.101_65-26.2", "xen-tools-domU": "4.4.3_02-26.2", "xen-kmp-default": "4.4.3_02_3.0.101_65-26.2", "xen-libs": "4.4.3_02-26.2", "xen-doc-html": "4.4.3_02-26.2", "xen-libs-32bit": "4.4.3_02-26.2", "xen-tools": "4.4.3_02-26.2", "xen": "4.4.3_02-26.2" } ] }
{ "binaries": [ { "xen-kmp-pae": "4.4.3_02_3.0.101_65-26.2", "xen-tools-domU": "4.4.3_02-26.2", "xen-kmp-default": "4.4.3_02_3.0.101_65-26.2", "xen-libs": "4.4.3_02-26.2", "xen-doc-html": "4.4.3_02-26.2", "xen-libs-32bit": "4.4.3_02-26.2", "xen-tools": "4.4.3_02-26.2", "xen": "4.4.3_02-26.2" } ] }
{ "binaries": [ { "xen-kmp-pae": "4.4.3_02_3.0.101_65-26.2", "xen-tools-domU": "4.4.3_02-26.2", "xen-kmp-default": "4.4.3_02_3.0.101_65-26.2", "xen-libs": "4.4.3_02-26.2", "xen-doc-html": "4.4.3_02-26.2", "xen-libs-32bit": "4.4.3_02-26.2", "xen-tools": "4.4.3_02-26.2", "xen": "4.4.3_02-26.2" } ] }