OVMSA-2020-0018

OVMSA-2020-0018 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2020-04-28

Description


[4.4.4-222.0.18.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=8e468e57b8bc1a7f84b4a7a6abf9e420b97313fa
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/tsx: Mask out ARCH_CAPS_TSX_CTRL (Patrick Colp)
- x86/tsx: When the CPU has MSR_TSX_CTRL, ebx is accidentally being cleared (Patrick Colp)
- redtape: IOMMU: default to always quarantining PCI devices (Boris Ostrovsky) [Orabug: 31158489] {CVE-2019-19579}


Related CVEs


CVE-2019-11135

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.4 (x86_64) xen-4.4.4-222.0.18.el6.src.rpmef8e5ca1d982e3163f9c78889dc13a2e0ec512eb22bbed4eadef7970bcbd85adOVMBA-2024-0012ovm34_x86_64_latest
xen-4.4.4-222.0.18.el6.x86_64.rpm72860e37473192d92071c55ea5b1797929f77daa1ff7984601ae7440505da6f2OVMBA-2024-0012ovm34_x86_64_latest
xen-tools-4.4.4-222.0.18.el6.x86_64.rpm11ac53eeb3ebd2e26b0a687e07e515889db46144c76fb29c07b0808d2a526f88OVMBA-2024-0012ovm34_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete