| Type: | SECURITY |
| Impact: | IMPORTANT |
| Release Date: | 2017-10-25 |
- x86/cpu: fix IST handling during PCPU bringup (Andrew Cooper) [Orabug: 26901421] {CVE-2017-15594}
- x86/shadow: Don't create self-linear shadow mappings for 4-level translated guests (Andrew Cooper) [Orabug: 26901413] {CVE-2017-15592}
- x86: Disable the use of auto-translated PV guests (Andrew Cooper) [Orabug: 26901413] {CVE-2017-15592}
- x86: don't allow page_unlock() to drop the last type reference (Jan Beulich) [Orabug: 26901401] {CVE-2017-15593}
- x86: don't store possibly stale TLB flush time stamp (Jan Beulich) [Orabug: 26901391] {CVE-2017-15588}
- x86/mm: Disable PV linear pagetables by default (George Dunlap) [Orabug: 26901363] {CVE-2017-15595}
- x86: limit linear page table use to a single level (Jan Beulich) [Orabug: 26901363] {CVE-2017-15595}
- x86/HVM: prefill partially used variable on emulation paths (Jan Beulich) [Orabug: 26901338] {CVE-2017-15589}
- x86/FLASK: fix unmap-domain-IRQ XSM hook (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86/IRQ: conditionally preserve irq <-> pirq mapping on map error paths (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86/MSI: disallow redundant enabling (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86: enforce proper privilege when (un)mapping pIRQ-s (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86: don't allow MSI pIRQ mapping on unowned device (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- gnttab: fix pin count / page reference race (Jan Beulich) [Orabug: 26901277] {CVE-2017-15597}
| CVE-2017-15589 |
| CVE-2017-15595 |
| CVE-2017-15594 |
| CVE-2017-15588 |
| CVE-2017-15592 |
| CVE-2017-15590 |
| CVE-2017-15593 |
| Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
| Oracle VM 3.2 (x86_64) | xen-4.1.3-25.el5.223.96.src.rpm | b76fec0bd71d99e56ec5e424cdf3f1b3dd8ee40dd7ce8c1a9586f633307d7450 | OVMBA-2024-0012 | ovm3_3.2.1_x86_64_patch |
| xen-4.1.3-25.el5.223.96.x86_64.rpm | 0738953324151e77fdd7b6cf714c52b8350e96be5613693554df86f3870e9470 | OVMBA-2024-0012 | ovm3_3.2.1_x86_64_patch | |
| xen-devel-4.1.3-25.el5.223.96.x86_64.rpm | 625108bbcf95ca40299862d538fb4387e0f9253e15f918b87a3b47a6a1f97c68 | OVMSA-2019-0048 | ovm3_3.2.1_x86_64_patch | |
| xen-tools-4.1.3-25.el5.223.96.x86_64.rpm | 5eca2f97083712daf9d3597e520dd6531ecadb6b73b17d3a645cbbde36656ba0 | OVMBA-2024-0012 | ovm3_3.2.1_x86_64_patch | |
| Oracle VM 3.3 (x86_64) | xen-4.3.0-55.el6.186.60.src.rpm | 2e3b5499f210b541c2be95993402842ed4741d529db2296c66bb174c246eb97b | OVMBA-2024-0012 | ovm3_x86_64_3.3_patch |
| xen-4.3.0-55.el6.186.60.x86_64.rpm | 9d61a664067161750fea8b610ac7ea0d202793f8feaa3bc6e432eba15cc903b7 | OVMBA-2024-0012 | ovm3_x86_64_3.3_patch | |
| xen-tools-4.3.0-55.el6.186.60.x86_64.rpm | 6d0bf90bbf63965cc1e5856705344bd97b2c5f7170eace9a1fef5ca55504f796 | OVMBA-2024-0012 | ovm3_x86_64_3.3_patch | |
| Oracle VM 3.4 (x86_64) | xen-4.4.4-155.0.2.el6.src.rpm | 9e661c1703d41f7fa0adaf92371d37494af23cb323a570bdc8fcfb458f5b9236 | OVMBA-2024-0012 | ovm34_x86_64_latest |
| xen-4.4.4-155.0.2.el6.x86_64.rpm | 9c4bb7c2313e585e60408d8996abd8026d1ca162d59612126b78cdab3758bd07 | OVMBA-2024-0012 | ovm34_x86_64_latest | |
| xen-tools-4.4.4-155.0.2.el6.x86_64.rpm | 1558e84726f3c2011411652a8b63d31949b5228af57ee9e8072faaf5ae026698 | OVMBA-2024-0012 | ovm34_x86_64_latest | |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team