Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2016-02-12 |
[3.4.0-0.2.25]
- XSA-125: Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) (Jan Beulich) [20732412] {CVE-2015-2752}
- XSA-126: xen: limit guest control of PCI command register (Jan Beulich) [20739399] {CVE-2015-2756}
- XSA-128: xen: properly gate host writes of modified PCI CFG contents (Jan Beulich) [21157440] {CVE-2015-4103}
- XSA-129: xen: don't allow guest to control MSI mask register (Jan Beulich) [21158692] {CVE-2015-4104}
- XSA-130: xen/MSI-X: disable logging by default (Jan Beulich) [21159408] {CVE-2015-4105}
- XSA-131: [PATCH 1/8] xen/MSI: don't open-code pass-through of enable bit modifications (Jan Beulich) [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 2/8] xen/pt: consolidate PM capability emu_mask [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 3/8] xen/pt: correctly handle PM status bit [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 4/8] xen/pt: split out calculation of throughable mask in PCI config space handling [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 5/8] xen/pt: mark all PCIe capability bits read-only [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 6/8] xen/pt: mark reserved bits in PCI config space fields [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 7/8] xen/pt: add a few PCI config space field descriptions [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 8/8] xen/pt: unknown PCI config space fields should be read-only [21164529] {CVE-2015-4106}
CVE-2015-2756 |
CVE-2015-4104 |
CVE-2015-2752 |
CVE-2015-4103 |
CVE-2015-4105 |
CVE-2015-4106 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle VM 2.2 (i386) | xen-3.4.0-0.2.25.el5.src.rpm | 60e86b4c7b4c2c6422e7b8b8a1ffda0444ad8d8960fdb1ef8c00577c26f507d3 | - | ovm22_i386_latest |
xen-3.4.0-0.2.25.el5.i386.rpm | 6199979ac59427ed7f22803bcfc4cbc0d5898f005f016d0d2ae9ca5e88eb7833 | - | ovm22_i386_latest | |
xen-64-3.4.0-0.2.25.el5.noarch.rpm | 87d49e18d084e32cb529ac4bbe80321805813815830b207aff47402474b96be3 | - | ovm22_i386_latest | |
xen-debugger-3.4.0-0.2.25.el5.noarch.rpm | 6f3389aa7d1c043e20413a87525d2ad2d5f57157709f3d0e5c602f1d6eced173 | - | ovm22_i386_latest | |
xen-devel-3.4.0-0.2.25.el5.i386.rpm | 812c944bd2cdb275f8ae158bf0b98968e7afacf12e8593e228e5a639cae208b9 | - | ovm22_i386_latest | |
xen-pvhvm-devel-3.4.0-0.2.25.el5.i386.rpm | 753696efb4454351c67efa128b6fecfcf4d90415909aefa361826ca60a6657dc | - | ovm22_i386_latest | |
xen-tools-3.4.0-0.2.25.el5.i386.rpm | e0542f9fd62d43d12c5fc9380d2f1c12f6d36bd1eeebda104fa8c48dd415f4e0 | - | ovm22_i386_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team