OVMSA-2020-0018

OVMSA-2020-0018 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-04-28

Description


[4.4.4-222.0.18.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=8e468e57b8bc1a7f84b4a7a6abf9e420b97313fa
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/tsx: Mask out ARCH_CAPS_TSX_CTRL (Patrick Colp)
- x86/tsx: When the CPU has MSR_TSX_CTRL, ebx is accidentally being cleared (Patrick Colp)
- redtape: IOMMU: default to always quarantining PCI devices (Boris Ostrovsky) [Orabug: 31158489] {CVE-2019-19579}


Related CVEs


CVE-2019-11135

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-222.0.18.el6.src.rpme2dbe8005ff2688f259bfd2e0f514575OVMSA-2021-0014
xen-4.4.4-222.0.18.el6.x86_64.rpm99239b396538a7233a0d80c42b77fc56OVMSA-2021-0014
xen-tools-4.4.4-222.0.18.el6.x86_64.rpm2927bc9800c2f58c5bfe071b89375aacOVMSA-2021-0014



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete