This update fixes the following security issues:
bsc#956832 - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list
bsc#956408 - CVE-2015-8339, CVE-2015-8340: xen: XENMEM_exchange error handling issues (XSA-159) xsa159.patch
bsc#956411 - CVE-2015-7504: xen: heap buffer overflow vulnerability in pcnet emulator (XSA-162)
bsc#954405 - CVE-2015-8104: Xen: guest to host DoS by triggering an infinite loop in microcode via #DB exception
bsc#953527 - CVE-2015-5307: kernel: kvm/xen: x86: avoid guest->host DOS by intercepting #AC (XSA-156)
bsc#950704 - CVE-2015-7970: xen: x86: Long latency populate-on-demand operation is not preemptible (XSA-150)
bsc#951845 - CVE-2015-7972: xen: x86: populate-on-demand balloon size inaccuracy can crash guests (XSA-153)
bsc#950703 - CVE-2015-7969: xen: leak of main per-domain vcpu pointer array (DoS) (XSA-149)
{ "binaries": [ { "xen-kmp-pae": "4.1.6_08_3.0.101_0.7.37-23.1", "xen-doc-pdf": "4.1.6_08-23.1", "xen-kmp-default": "4.1.6_08_3.0.101_0.7.37-23.1", "xen-kmp-trace": "4.1.6_08_3.0.101_0.7.37-23.1", "xen-doc-html": "4.1.6_08-23.1", "xen-libs-32bit": "4.1.6_08-23.1", "xen-libs": "4.1.6_08-23.1", "xen-tools": "4.1.6_08-23.1", "xen-tools-domU": "4.1.6_08-23.1", "xen-devel": "4.1.6_08-23.1", "xen": "4.1.6_08-23.1" } ] }