OVMSA-2016-0012

OVMSA-2016-0012 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2016-02-12

Description


[3.4.0-0.2.25]
- XSA-125: Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64 GFNs (or less) (Jan Beulich) [20732412] {CVE-2015-2752}
- XSA-126: xen: limit guest control of PCI command register (Jan Beulich) [20739399] {CVE-2015-2756}
- XSA-128: xen: properly gate host writes of modified PCI CFG contents (Jan Beulich) [21157440] {CVE-2015-4103}
- XSA-129: xen: don't allow guest to control MSI mask register (Jan Beulich) [21158692] {CVE-2015-4104}
- XSA-130: xen/MSI-X: disable logging by default (Jan Beulich) [21159408] {CVE-2015-4105}
- XSA-131: [PATCH 1/8] xen/MSI: don't open-code pass-through of enable bit modifications (Jan Beulich) [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 2/8] xen/pt: consolidate PM capability emu_mask [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 3/8] xen/pt: correctly handle PM status bit [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 4/8] xen/pt: split out calculation of throughable mask in PCI config space handling [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 5/8] xen/pt: mark all PCIe capability bits read-only [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 6/8] xen/pt: mark reserved bits in PCI config space fields [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 7/8] xen/pt: add a few PCI config space field descriptions [21164529] {CVE-2015-4106}
- XSA-131: [PATCH 8/8] xen/pt: unknown PCI config space fields should be read-only [21164529] {CVE-2015-4106}


Related CVEs


CVE-2015-2756
CVE-2015-4104
CVE-2015-2752
CVE-2015-4103
CVE-2015-4105
CVE-2015-4106

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 2.2 (i386) xen-3.4.0-0.2.25.el5.src.rpm60e86b4c7b4c2c6422e7b8b8a1ffda0444ad8d8960fdb1ef8c00577c26f507d3-ovm22_i386_latest
xen-3.4.0-0.2.25.el5.i386.rpm6199979ac59427ed7f22803bcfc4cbc0d5898f005f016d0d2ae9ca5e88eb7833-ovm22_i386_latest
xen-64-3.4.0-0.2.25.el5.noarch.rpm87d49e18d084e32cb529ac4bbe80321805813815830b207aff47402474b96be3-ovm22_i386_latest
xen-debugger-3.4.0-0.2.25.el5.noarch.rpm6f3389aa7d1c043e20413a87525d2ad2d5f57157709f3d0e5c602f1d6eced173-ovm22_i386_latest
xen-devel-3.4.0-0.2.25.el5.i386.rpm812c944bd2cdb275f8ae158bf0b98968e7afacf12e8593e228e5a639cae208b9-ovm22_i386_latest
xen-pvhvm-devel-3.4.0-0.2.25.el5.i386.rpm753696efb4454351c67efa128b6fecfcf4d90415909aefa361826ca60a6657dc-ovm22_i386_latest
xen-tools-3.4.0-0.2.25.el5.i386.rpme0542f9fd62d43d12c5fc9380d2f1c12f6d36bd1eeebda104fa8c48dd415f4e0-ovm22_i386_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete