OVMSA-2018-0246 - xen security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-08-14 |
Description
[4.4.4-196.0.2.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=02cec92b3eb1612e37616b10400d82f1e3d8de85
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- l1tf: Utility to offline/online SMT siblings. (Ross Philipson) [Orabug: 28487050] {CVE-2018-3646}
- x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86/msr: Virtualise MSR_FLUSH_CMD for guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86: command line option to avoid use of secondary hyper-threads (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}
- cpupools: fix state when downing a CPU failed (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.4 (x86_64) | xen-4.4.4-196.0.2.el6.src.rpm | 0d16a1e23f2a88d5017bb8d01f8751a2d5fd180b2043e4e7431579b098012afa | OVMBA-2024-0012 | ovm34_x86_64_latest |
| xen-4.4.4-196.0.2.el6.x86_64.rpm | 31b7c841786d9b6d980885ffc6e0341bfaefc44f1a2db46f5c087901fea8f816 | OVMBA-2024-0012 | ovm34_x86_64_latest |
| xen-tools-4.4.4-196.0.2.el6.x86_64.rpm | 05a13d69ee2fd1320cc81ce7a6e168c2f600cbdf684cc63cff6ba7c18d47bd7a | OVMBA-2024-0012 | ovm34_x86_64_latest |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team