OVMSA-2016-0088 - xen security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2016-07-27 |
Description
[4.4.4-75.0.1.el6]
- BUILDINFO: commit=aff08b43b1a504aa14a0fce65302ccf515b69fdf
- Remove unsafe bits from the mod_l?_entry() fastpath (Andrew Cooper) {CVE-2016-6258}
- x86/mm: fully honor PS bits in guest page table walks (Jan Beulich) {CVE-2016-4480} {CVE-2016-4480}
- libxl: Document ~/serial/ correctly (Ian Jackson) {CVE-2016-4962}
- libxl: Cleanup: Have libxl__alloc_vdev use /libxl (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for nic in getinfo (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for nic in libxl_devid_to_device_nic (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for vtpm in getinfo (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for vtpm list (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for disk in getinfo (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend for disk eject event (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend in libxl__device_nextid (Ian Jackson) {CVE-2016-4962}
- libxl: Do not trust frontend in libxl__devices_destroy (Ian Jackson) {CVE-2016-4962}
- libxl: Provide libxl__backendpath_parse_domid (Ian Jackson) {CVE-2016-4962}
- libxl: Record backend/frontend paths in /libxl/ (Ian Jackson) {CVE-2016-4962}
- x86: limit GFNs to 32 bits for shadowed superpages. (Tim Deegan) {CVE-2016-3960}
- x86: fix information leak on AMD CPUs (Jan Beulich) {CVE-2016-3158} {CVE-2016-3159} {CVE-2016-3158} {CVE-2016-3159} {CVE-2016-3158} {CVE-2016-3159}
- x86: enforce consistent cachability of MMIO mappings (Jan Beulich) {CVE-2016-2270} {CVE-2016-2270}
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | xen-4.4.4-75.0.1.el6.src.rpm | d08bb437e4170d90583e430ab40bc6e3 | OVMSA-2021-0014 |
| xen-4.4.4-75.0.1.el6.x86_64.rpm | db03c58b85cc53a90d9e82a01e18dd10 | OVMSA-2021-0014 |
| xen-tools-4.4.4-75.0.1.el6.x86_64.rpm | 0211d0bf056f12f8874e7eab8a15173d | OVMSA-2021-0014 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team