OVMSA-2017-0094

OVMSA-2017-0094 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2017-05-02

Description


[4.4.4-105.0.12.el6]
- BUILDINFO: xen commit=8ee9cbea8e71c968e602d5b4974601d283d61d28
- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86: correct create_bounce_frame (Boris Ostrovsky) [Orabug: 25927745]
- x86: discard type information when stealing pages (Boris Ostrovsky) [Orabug: 25927683]
- multicall: deal with early exit conditions (Boris Ostrovsky) [Orabug: 25927612]

[4.4.4-105.0.11.el6]
- BUILDINFO: xen commit=66e33522666436a4b6c13fbaa77b4942876bb5f7
- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- kexec: Add spinlock for the whole hypercall. (Konrad Rzeszutek Wilk) [Orabug: 25861731]
- kexec: clear kexec_image slot when unloading kexec image (Bhavesh Davda) [Orabug: 25861731]

[4.4.4-105.0.10.el6]
- BUILDINFO: xen commit=337c8edcc582f8bfb1bcfcb5a475c5fc18ff2def
- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- memory: properly check guest memory ranges in XENMEM_exchange handling (Jan Beulich) [Orabug: 25760559] {CVE-2017-7228}
- xenstored: Log when the write transaction rate limit bites (Ian Jackson) [Orabug: 25745225]
- xenstored: apply a write transaction rate limit (Ian Jackson) [Orabug: 25745225]

[4.4.4-105.0.9.el6]
- BUILDINFO: xen commit=17b0cd2109c42553e9c8c34d3a2b8252abead104
- BUILDINFO: QEMU upstream commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- xm: Fix the error message displayed by 'xm create ...' (Venu Busireddy) [Orabug: 25721696]
- xm: expand pci hidden devices tools (Venu Busireddy) [Orabug: 25721624]

[4.4.4-105.0.8.el6]
- BUILDINFO: xen commit=81f33e7316b476c319f42eb56ac58fc450804ded
- BUILDINFO: QEMU upstream commit=2e4e0a805aeb448242b43399e0853b851bccde4e
- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- xend: fix vif device ID allocation (Zhigang Wang) [Orabug: 25692157] [Orabug: 25704938]

[4.4.4-105.0.7.el6]
- BUILDINFO: xen commit=68930e8bbd9311ebd12fdb251362a2e1f9987fba
- BUILDINFO: QEMU upstream commit=f663d3dd4e968756d33e29cb2c2c956cabbdd4ca
- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- xend: fix waitForSuspend (Zhigang Wang) [Orabug: 25638583] [Orabug: 25653480]
- IOMMU: always call teardown callback (Oleksandr Tyshchenko) [Orabug: 25485193]

[4.4.4-105.0.6.el6]
- BUILDINFO: xen commit=9f3030e391274b89deb80c86a6343dac473916b3
- BUILDINFO: QEMU upstream commit=f663d3dd4e968756d33e29cb2c2c956cabbdd4ca
- BUILDINFO: QEMU traditional commit=d9ba4c53b14ebf9a0613b5638f90d95489622f0c
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- one-off build


Related CVEs


CVE-2017-2615
CVE-2017-2620
CVE-2016-9603
CVE-2017-7228
CVE-2017-8903
CVE-2017-8904
CVE-2017-8905

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-105.0.12.el6.src.rpm6b894b4ac8377160d857ca3b9ebc2b71OVMSA-2021-0014
xen-4.4.4-105.0.12.el6.x86_64.rpma0278644e0cb85580ca29fa806df8639OVMSA-2021-0014
xen-tools-4.4.4-105.0.12.el6.x86_64.rpme58502846b9cdb0dc577b58e35b20077OVMSA-2021-0014



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete