OVMSA-2015-0143

OVMSA-2015-0143 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2015-11-06

Description


[4.1.3-25.el5.209.4]
- x86: rate-limit logging in do_xen{oprof,pmu}_op()
Some of the sub-ops are acessible to all guests, and hence should be
rate-limited. In the xenoprof case, just like for XSA-146, include them
only in debug builds. Since the vPMU code is rather new, allow them to
be always present, but downgrade them to (rate limited) guest messages.
This is XSA-152.
Signed-off-by: Jan Beulich
Acked-by: Chuck Anderson
Reviewed-by: John Haxby [bug 22088921] {CVE-2015-7971}

[4.1.3-25.el5.209.3]
- xenoprof: free domain's vcpu array
This was overlooked in fb442e2171 ('x86_64: allow more vCPU-s per
guest').
This is XSA-151.
Signed-off-by: Jan Beulich
Reviewed-by: Ian Campbell
Acked-by: Chuck Anderson
Reviewed-by: John Haxby [bug 22088848] {CVE-2015-7969}

[4.1.3-25.el5.209.2]
- x86: guard against undue super page PTE creation
When optional super page support got added (commit bd1cd81d64 'x86: PV
support for hugepages'), two adjustments were missed: mod_l2_entry()
needs to consider the PSE and RW bits when deciding whether to use the
fast path, and the PSE bit must not be removed from L2_DISALLOW_MASK
unconditionally.
This is XSA-148.
Signed-off-by: Jan Beulich
Reviewed-by: Tim Deegan
[backport to Xen 4.1]
Signed-off-by: Andrew Cooper
Acked-by: Chuck Anderson
Reviewed-by: John Haxby [bug 22088424] {CVE-2015-7835}


Related CVEs


CVE-2015-7835
CVE-2015-7969
CVE-2015-7971

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.2 (x86_64) xen-4.1.3-25.el5.209.4.src.rpma160757ba8d9ee08fb7c8acefa8293ab505ac3735599b1455b7888aaf8ed8cebOVMBA-2024-0012ovm3_3.2.1_x86_64_patch
xen-4.1.3-25.el5.209.4.x86_64.rpm16569999a5a5a503bbc092d1f5c1ae4d386c2f842bcde4fac21aa5552629301cOVMBA-2024-0012ovm3_3.2.1_x86_64_patch
xen-devel-4.1.3-25.el5.209.4.x86_64.rpmf227ce8d90c6f33f03012d354147beaef961f7fb99a5a782298602b39153c0c5OVMSA-2019-0048ovm3_3.2.1_x86_64_patch
xen-tools-4.1.3-25.el5.209.4.x86_64.rpm84825d89ac429ce34ea2e7bc45ee3db2b1d9d414dde8ecd01af03912303abe10OVMBA-2024-0012ovm3_3.2.1_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete