OVMSA-2017-0162

OVMSA-2017-0162 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2017-10-25

Description



- x86/cpu: fix IST handling during PCPU bringup (Andrew Cooper) [Orabug: 26901421] {CVE-2017-15594}
- x86/shadow: Don't create self-linear shadow mappings for 4-level translated guests (Andrew Cooper) [Orabug: 26901413] {CVE-2017-15592}
- x86: Disable the use of auto-translated PV guests (Andrew Cooper) [Orabug: 26901413] {CVE-2017-15592}
- x86: don't allow page_unlock() to drop the last type reference (Jan Beulich) [Orabug: 26901401] {CVE-2017-15593}
- x86: don't store possibly stale TLB flush time stamp (Jan Beulich) [Orabug: 26901391] {CVE-2017-15588}
- x86/mm: Disable PV linear pagetables by default (George Dunlap) [Orabug: 26901363] {CVE-2017-15595}
- x86: limit linear page table use to a single level (Jan Beulich) [Orabug: 26901363] {CVE-2017-15595}
- x86/HVM: prefill partially used variable on emulation paths (Jan Beulich) [Orabug: 26901338] {CVE-2017-15589}
- x86/FLASK: fix unmap-domain-IRQ XSM hook (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86/IRQ: conditionally preserve irq <-> pirq mapping on map error paths (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86/MSI: disallow redundant enabling (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86: enforce proper privilege when (un)mapping pIRQ-s (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- x86: don't allow MSI pIRQ mapping on unowned device (Jan Beulich) [Orabug: 26901311] {CVE-2017-15590}
- gnttab: fix pin count / page reference race (Jan Beulich) [Orabug: 26901277] {CVE-2017-15597}


Related CVEs


CVE-2017-15589
CVE-2017-15595
CVE-2017-15594
CVE-2017-15588
CVE-2017-15592
CVE-2017-15590
CVE-2017-15593

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.2 (x86_64) xen-4.1.3-25.el5.223.96.src.rpmb76fec0bd71d99e56ec5e424cdf3f1b3dd8ee40dd7ce8c1a9586f633307d7450OVMBA-2024-0012ovm3_3.2.1_x86_64_patch
xen-4.1.3-25.el5.223.96.x86_64.rpm0738953324151e77fdd7b6cf714c52b8350e96be5613693554df86f3870e9470OVMBA-2024-0012ovm3_3.2.1_x86_64_patch
xen-devel-4.1.3-25.el5.223.96.x86_64.rpm625108bbcf95ca40299862d538fb4387e0f9253e15f918b87a3b47a6a1f97c68OVMSA-2019-0048ovm3_3.2.1_x86_64_patch
xen-tools-4.1.3-25.el5.223.96.x86_64.rpm5eca2f97083712daf9d3597e520dd6531ecadb6b73b17d3a645cbbde36656ba0OVMBA-2024-0012ovm3_3.2.1_x86_64_patch
Oracle VM 3.3 (x86_64) xen-4.3.0-55.el6.186.60.src.rpm2e3b5499f210b541c2be95993402842ed4741d529db2296c66bb174c246eb97bOVMBA-2024-0012ovm3_x86_64_3.3_patch
xen-4.3.0-55.el6.186.60.x86_64.rpm9d61a664067161750fea8b610ac7ea0d202793f8feaa3bc6e432eba15cc903b7OVMBA-2024-0012ovm3_x86_64_3.3_patch
xen-tools-4.3.0-55.el6.186.60.x86_64.rpm6d0bf90bbf63965cc1e5856705344bd97b2c5f7170eace9a1fef5ca55504f796OVMBA-2024-0012ovm3_x86_64_3.3_patch
Oracle VM 3.4 (x86_64) xen-4.4.4-155.0.2.el6.src.rpm9e661c1703d41f7fa0adaf92371d37494af23cb323a570bdc8fcfb458f5b9236OVMBA-2024-0012ovm34_x86_64_latest
xen-4.4.4-155.0.2.el6.x86_64.rpm9c4bb7c2313e585e60408d8996abd8026d1ca162d59612126b78cdab3758bd07OVMBA-2024-0012ovm34_x86_64_latest
xen-tools-4.4.4-155.0.2.el6.x86_64.rpm1558e84726f3c2011411652a8b63d31949b5228af57ee9e8072faaf5ae026698OVMBA-2024-0012ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete