OVMSA-2022-0023

OVMSA-2022-0023 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-08-30

Description


[4.4.4-222.0.49.el6]
- BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8
- BUILDINFO: xen commit=d5e5675d40d20e5a2a65c331baa50e0a5c7ae3b3
- BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff
- BUILDINFO: QEMU traditional commit=4a8ded640f04b41cdb15ce7c4c0a2c812c1b9e4d
- BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e
- BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee
- x86/spec-ctrl: Set unpriv-mmio to true by default (Boris Ostrovsky) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Add spec-ctrl=unpriv-mmio (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Enumeration for MMIO Stale Data controls (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/spec-ctrl: Make VERW flushing runtime conditional (Andrew Cooper) [Orabug: 34371337] {CVE-2022-21166} {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}


Related CVEs


CVE-2022-21125
CVE-2022-21166
CVE-2022-21123
CVE-2022-21127

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3 (x86_64) xen-4.4.4-222.0.49.el6.src.rpm2e0265c89fe851124697d2e2c9a82ad97561701b9e9fae30943ae831de1b5fdbOVMBA-2024-0012ovm3_x86_64_ELS
xen-4.4.4-222.0.49.el6.x86_64.rpm651fda2d1195cd255c6bf2f3ce55950b807dc852881f17a018a298804a5a7549OVMBA-2024-0012ovm3_x86_64_ELS
xen-tools-4.4.4-222.0.49.el6.x86_64.rpmad2234caadd54efda2ee98a10ddeb97fa6898da38b3d4a9630d85dfc25344009OVMBA-2024-0012ovm3_x86_64_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete