OVMSA-2018-0246

OVMSA-2018-0246 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2018-08-14

Description


[4.4.4-196.0.2.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=02cec92b3eb1612e37616b10400d82f1e3d8de85
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- l1tf: Utility to offline/online SMT siblings. (Ross Philipson) [Orabug: 28487050] {CVE-2018-3646}
- x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86/msr: Virtualise MSR_FLUSH_CMD for guests (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3646} {CVE-2018-3646}
- x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations (Andrew Cooper) [Orabug: 28487050] {CVE-2018-3620} {CVE-2018-3646}
- x86: command line option to avoid use of secondary hyper-threads (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}
- cpupools: fix state when downing a CPU failed (Jan Beulich) [Orabug: 28487050] {CVE-2018-3646}


Related CVEs


CVE-2018-3646

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-196.0.2.el6.src.rpma7dba840d1788e2f348fb432838ee479OVMSA-2020-0038
xen-4.4.4-196.0.2.el6.x86_64.rpm3e44d0d2d6f1e45c51ddf7842a76e070OVMSA-2020-0038
xen-tools-4.4.4-196.0.2.el6.x86_64.rpmb5cc0cdf1a95b1af321179bef4a1fbc2OVMSA-2020-0038



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete