[Oraclevm-errata] OVMSA-2014-0025 Important: Oracle VM 3.3 xen security update
Errata Announcements for Oracle VM
oraclevm-errata at oss.oracle.com
Wed Oct 1 09:00:41 PDT 2014
Oracle VM Security Advisory OVMSA-2014-0025
The following updated rpms for Oracle VM 3.3 have been uploaded to the
Unbreakable Linux Network:
x86_64:
xen-4.3.0-55.el6.0.0.4.x86_64.rpm
xen-tools-4.3.0-55.el6.0.0.4.x86_64.rpm
SRPMS:
http://oss.oracle.com/oraclevm/server/3.3/SRPMS-updates/xen-4.3.0-55.el6.0.0.4.src.rpm
Description of changes:
[4.3.0-55.el6.0.0.4]
- x86/HVM: properly bound x2APIC MSR range
This is XSA-108.
Additional changelog comments added to 4.3.0-55.el6.0.0.3
Signed-off-by: Chuck Anderson <chuck.anderson at oracle.com> [bug
19698535] {CVE-2014-7188}
[4.3.0-55.el6.0.0.3]
- Fix for bug 19698535
Signed-off-by: Chuck Anderson <chuck.anderson at oracle.com> [bug 19698535]
[4.3.0-55.el6.0.0.2]
- x86emul: only emulate software interrupt injection for real mode
Protected mode emulation currently lacks proper privilege checking of
the referenced IDT entry, and there's currently no legitimate way for
any of the respective instructions to reach the emulator when the guest
is in protected mode.
This is XSA-106.
Reported-by: Andrei LUTAS <vlutas at bitdefender.com>
Signed-off-by: Jan Beulich <jbeulich at suse.com>
Acked-by: Keir Fraser <keir at xen.org>
Signed-off-by: Chuck Anderson <chuck.anderson at oracle.com> [bug
19699782] {CVE-2014-7156}
[4.3.0-55.0.0.1]
- x86/emulate: check cpl for all privileged instructions
Without this, it is possible for userspace to load its own IDT or GDT.
This is XSA-105.
Reported-by: Andrei LUTAS <vlutas at bitdefender.com>
Signed-off-by: Andrew Cooper <andrew.cooper3 at citrix.com>
Reviewed-by: Jan Beulich <jbeulich at suse.com>
Tested-by: Andrei LUTAS <vlutas at bitdefender.com>
Signed-off-by: Chuck Anderson <chuck.anderson at oracle.com> [bug
19699773] {CVE-2014-7155}
More information about the Oraclevm-errata
mailing list