Description
Security Update for Xen
Following bug and security fixes were applied:
- bnc#776995 - attaching scsi control luns with pvscsi
- xend/pvscsi: fix passing of SCSI control LUNs
xen-bug776995-pvscsi-no-devname.patch
- xend/pvscsi: fix usage of persistant device names for
SCSI devices xen-bug776995-pvscsi-persistent-names.patch
- xend/pvscsi sysfs parser for Linux 3.0
xen-bug776995-pvscsi-sysfs-parser.patch
- bnc#777090 - CVE-2012-3494: xen: hypercall set_debugreg
vulnerability (XSA-12) CVE-2012-3494-xsa12.patch
- bnc#777088 - CVE-2012-3495: xen: hypercall
physdev_get_free_pirq vulnerability (XSA-13)
CVE-2012-3495-xsa13.patch
- bnc#777091 - CVE-2012-3496: xen: XENMEM_populate_physmap
DoS vulnerability (XSA-14) CVE-2012-3496-xsa14.patch
- bnc#777086 - CVE-2012-3498: xen: PHYSDEVOP_map_pirq index
vulnerability (XSA-16) CVE-2012-3498-xsa16.patch
- bnc#777084 - CVE-2012-3515: xen: Qemu VT100 emulation
vulnerability (XSA-17) CVE-2012-3515-xsa17.patch
- Upstream patches from Jan 25734-x86-MCG_CTL-default.patch
25735-x86-cpuid-masking-XeonE5.patch
25744-hypercall-return-long.patch
- Update to Xen 4.1.3 c/s 23336