OVMSA-2022-0023

OVMSA-2022-0023 - xen security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-08-30

Description


[4.4.4-222.0.49.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=d5e5675d40d20e5a2a65c331baa50e0a5c7ae3b3
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=4a8ded640f04b41cdb15ce7c4c0a2c812c1b9e4d
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/spec-ctrl: Set unpriv-mmio to true by default (Boris Ostrovsky) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Add spec-ctrl=unpriv-mmio (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Enumeration for MMIO Stale Data controls (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Make VERW flushing runtime conditional (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21166} {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}


Related CVEs


CVE-2022-21123
CVE-2022-21125
CVE-2022-21166
CVE-2022-21127

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3 (x86_64) xen-4.4.4-222.0.49.el6.src.rpm54f35efb3cd3e459268677266a2f7f93-
xen-4.4.4-222.0.49.el6.x86_64.rpmf95b22fe7687c8ec599838613ebe367a-
xen-tools-4.4.4-222.0.49.el6.x86_64.rpm65c6f42c8443dd94153fe592ed813442-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete