OVMSA-2018-0246 - xen security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2018-08-14 |
Description
[4.4.4-196.0.2.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=02cec92b3eb1612e37616b10400d82f1e3d8de85
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- l1tf: Utility to offline/online SMT siblings. (Ross Philipson) [Orabug: 28487050] {CVE-2018-3646}
- x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86/msr: Virtualise MSR_FLUSH_CMD for guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86: command line option to avoid use of secondary hyper-threads (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}
- cpupools: fix state when downing a CPU failed (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.4 (x86_64) | xen-4.4.4-196.0.2.el6.src.rpm | a7dba840d1788e2f348fb432838ee479 | OVMSA-2021-0014 |
| xen-4.4.4-196.0.2.el6.x86_64.rpm | 3e44d0d2d6f1e45c51ddf7842a76e070 | OVMSA-2021-0014 |
| xen-tools-4.4.4-196.0.2.el6.x86_64.rpm | b5cc0cdf1a95b1af321179bef4a1fbc2 | OVMSA-2021-0014 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team