OVMSA-2019-0016

OVMSA-2019-0016 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2019-05-14

Description


[4.4.4-222.0.4.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=3885a020649df84b883ea20d11ca15b7d7640201
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/HVM: don't give the wrong impression of WRMSR succeeding (root) [Orabug: 29725753]

[4.4.4-222.0.3.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=71714f34026c4e0b105bf2def8d2dc4c7171d5b8
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- Red-tape: Update repo with new CVE for XSA-297 (Patrick Colp) [Orabug: 29725297] {CVE-2019-11091}
- x86/spec-ctl: Expose X86_FEATURE_MD_CLEAR to guests (Patrick Colp) [Orabug: 29677162] {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130}
- x86/spec-ctrl: Introduce options to control VERW flushing (Andrew Cooper) [Orabug: 2977162] {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130} {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130}
- x86/spec-ctrl: Infrastructure to use VERW to flush pipeline buffers (Andrew Cooper) [Orabug: 29677162] {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130} {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130}
- x86/spec-ctrl: CPUID/MSR definitions for Microarchitectural Data Sampling (Andrew Cooper) [Orabug: 29677162] {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130} {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130}

[4.4.4-222.0.2.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=0d8ecd7732e56484c10e4b584de17d360d940252
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- Config: Update git links to use linux-git.us.oracle.com (Patrick Colp) [Orabug: 29558583]
- gnttab: set page refcount for copy-on-grant-transfer (Jan Beulich) [Orabug: 29383381]


Related CVEs


CVE-2018-12126
CVE-2018-12130
CVE-2018-12127
CVE-2019-11091

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-222.0.4.el6.src.rpma17f38b4cddfb6acd7167ce1cac87636OVMSA-2021-0014
xen-4.4.4-222.0.4.el6.x86_64.rpm80306f62c77653dcbd661753d98c1815OVMSA-2021-0014
xen-tools-4.4.4-222.0.4.el6.x86_64.rpm2c575ee3c4553d118e4ad8e814403226OVMSA-2021-0014



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete