OVMSA-2020-0027

OVMSA-2020-0027 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2020-07-10

Description


[4.4.4-222.0.23.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=077233184260bd831e7c4afdd4aebb0bced6ee32
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=6e676a4ba6bbd437a2a8dbfc3c6e591d920b013b
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/vtd: Hide superpage support for SandyBridge IOMMUs (Andrew Cooper) [Orabug: 31366846] {CVE-2018-12207} {CVE-2018-12207}

[4.4.4-222.0.22.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=4cfb88a0f248605ca655e0609f0650c4563be653
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=6e676a4ba6bbd437a2a8dbfc3c6e591d920b013b
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/spec-ctrl: Allow the RDRAND/RDSEED features to be hidden (Andrew Cooper) [Orabug: 31470704] {CVE-2020-0543} {CVE-2020-0543}
- cirrus: handle negative pitch in cirrus_invalidate_region() (Wolfgang Bumiller) [Orabug: 31476272] {CVE-2017-18030}
- cirrus: fix oob access in mode4and5 write functions (Gerd Hoffmann) [Orabug: 31476272] {CVE-2017-15289}

[4.4.4-222.0.21.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=3206f3109cfd432d6e5bbffbcc9839f5b8ed1e44
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/spec-ctrl: Mitigate the Special Register Buffer Data Sampling sidechannel (Andrew Cooper) [Orabug: 31470704] {CVE-2020-0543} {CVE-2020-0543}
- x86/spec-ctrl: CPUID/MSR definitions for Special Register Buffer Data Sampling (Andrew Cooper) [Orabug: 31470704] {CVE-2020-0543} {CVE-2020-0543}

[4.4.4-222.0.20.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=0bef1944b340a7ec3e93a20b472effa654f5ee16
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/crash: force unlock console before printing on kexec crash (Igor Druzhinin) [Orabug: 31255931]

[4.4.4-222.0.19.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=69a58ac753bd61961615f9208f8e1ee5ce946538
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- redtape: x86/tsx: TAA regressions (Patrick Colp) [Orabug: 31240359]


Related CVEs


CVE-2017-15289
CVE-2017-18030
CVE-2020-0543

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.4 (x86_64) xen-4.4.4-222.0.23.el6.src.rpmd145b3177e8479873e306b80eba21544OVMSA-2021-0014
xen-4.4.4-222.0.23.el6.x86_64.rpme37a4b9faade5af1eb94303d1bb060e2OVMSA-2021-0014
xen-tools-4.4.4-222.0.23.el6.x86_64.rpme4c15333cbfb94a6aa5100089fd35d05OVMSA-2021-0014



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete