Xen was updated to fix the following security issues:
* CVE-2016-2841: net: ne2000: infinite loop in ne2000_receive
(bsc#969351)
* CVE-2016-2391: usb: multiple eof_timers in ohci module leads to null
pointer dereference (bsc#967101)
* CVE-2016-2270: x86: inconsistent cachability flags on guest mappings
(XSA-154) (bsc#965315)
* CVE-2016-2271: VMX: guest user mode may crash guest with
non-canonical RIP (XSA-170) (bsc#965317)
* CVE-2015-5278: Infinite loop in ne2000_receive() function
(bsc#964947)
* CVE-2014-0222: qcow1: validate L2 table size to avoid integer
overflows (bsc#964925)
* CVE-2014-7815: vnc: insufficient bits_per_pixel from the client
sanitization (bsc#962627)
* CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions
(bsc#960726)
Security Issues:
* CVE-2016-2841
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841</a>>
* CVE-2016-2391
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391</a>>
* CVE-2016-2270
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270</a>>
* CVE-2016-2271
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271</a>>
* CVE-2015-5278
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278</a>>
* CVE-2014-0222
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222</a>>
* CVE-2014-7815
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815</a>>
* CVE-2015-8743
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743</a>>