OVMSA-2020-0007

OVMSA-2020-0007 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-03-09

Description


[4.4.4-222.0.14.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=5bfb515a1e27a8f6db11f65fe5fcd87daec80722
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- y86/vmx: dump PIR and vIRR before ASSERT() (Chao Gao) [Orabug: 30784806]
- x86/apicv: fix RTC periodic timer and apicv issue (Quan Xu) [Orabug: 30784806]

[4.4.4-222.0.13.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=943b94ec6cf6c235e86a0d6d08c112d78290892a
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- vNUMA: misc fixs (Elena Ufimtseva) [Orabug: 30820841]
- vNUMA: make best effort to dont use dom0 cpus (Elena Ufimtseva) [Orabug: 30820841]
- xend: add use_dom0_cpus to control pinning to dom0 pcpus. (Elena Ufimtseva) [Orabug: 30820841]
- dom0: select smt threads for dom0 numa pinning (Elena Ufimtseva) [Orabug: 30820841]

[4.4.4-222.0.12.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=2666868c3dadd779363f9cabd58b21e53c1a0830
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- xen: adopt AER handling code to quarantined devices (Elena Ufimtseva) [Orabug: 30439902]
- IOMMU: default to always quarantining PCI devices (Jan Beulich) [Orabug: 30439902]
- passthrough: quarantine PCI devices (Paul Durrant) [Orabug: 30439902] {CVE-2019-18424}
- IOMMU: add missing HVM check (Jan Beulich) [Orabug: 30439902]
- x86/mm: Clean up trailing whitespace (George Dunlap) [Orabug: 30439902]

[4.4.4-222.0.11.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=7d81202d304e1408461e29b801446216bbd0cf7c
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/spec-ctrl: Mitigate the TSX Asynchronous Abort sidechannel (Andrew Cooper) [Orabug: 30604160] {CVE-2019-11135} {CVE-2019-11135}
- x86/tsx: Introduce tsx= to use MSR_TSX_CTRL when available (Andrew Cooper) [Orabug: 30604160] {CVE-2019-11135} {CVE-2019-11135}

[4.4.4-222.0.10.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=a2c9a6fd65171133a896defd3c2be93f9ec3a1fe
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- AMD/IOMMU: Cease using a dynamic height for the IOMMU pagetables (Andrew Cooper) [Orabug: 30604059] {CVE-2019-19577}
- AMD/IOMMU: dont needlessly trigger errors/crashes when unmapping a page (Jan Beulich) [Orabug: 30604059]
- x86/vtx: Work around SingleStep + STI/MovSS VMEntry failures (Andrew Cooper) [Orabug: 30604094] {CVE-2019-19583}
- x86/hvm/emulate: block speculative out-of-bound accesses (Norbert Manthey) [Orabug: 29185971] {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- grant_table: harden version dependent accesses (Norbert Manthey) [Orabug: 29185971] {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- grant_table: harden bound accesses (Norbert Manthey) [Orabug: 29185971] {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- common/grant_table: harden helpers (Norbert Manthey) [Orabug: 29185971] {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- common/domain: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- x86/hvm: add nospec to hvmop param (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- common/memory: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- is_hvm/pv_domain: block speculation (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- is_control_domain: block speculation (Norbert Manthey) [Orabug: 29185971] {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- nospec: introduce evaluate_nospec (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- spec: add l1tf-barrier (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- x86/vioapic: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- evtchn: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- x86/hvm: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- x86/hvm/hpet: block speculative out-of-bound accesses (Norbert Manthey) {CVE-2017-5753} {CVE-2018-3620} {CVE-2018-3646}
- xen/sched: Introduce domain_vcpu() helper (Andrew Cooper)
- x86/mtrr: introduce mask to get VCNT from MTRRcap MSR (Roger Pau Monne)


Related CVEs


CVE-2017-5753
CVE-2018-3620
CVE-2018-3646
CVE-2019-11135
CVE-2019-18424
CVE-2019-19577
CVE-2019-19583

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-222.0.14.el6.src.rpmac05f9a5e1d4ea05a0b25d1d9ff316a3OVMSA-2021-0014
xen-4.4.4-222.0.14.el6.x86_64.rpm31f2c191cf59060355171443031667ebOVMSA-2021-0014
xen-tools-4.4.4-222.0.14.el6.x86_64.rpmc296cad2ae860ca0d6170394e646ae53OVMSA-2021-0014



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete