[Oraclevm-errata] New xen updates available via Ksplice (OVMSA-2022-0023)
Errata Announcements for Oracle VM
oraclevm-errata at oss.oracle.com
Fri Sep 2 07:41:51 UTC 2022
Synopsis: OVMSA-2022-0023 can now be patched using Ksplice
CVEs: CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166
Users with Oracle VM Premier Support can now use Ksplice to patch
against the latest Oracle VM Security Fix Advisory, OVMSA-2022-0023.
INSTALLING THE UPDATES
We recommend that all users of Ksplice on OVM 3.4 install these
updates.
You can install these updates by running:
# ksplice -y xen upgrade
Ksplice Xen patching requires installation of Ksplice-aware packages and the
system must be rebooted after the first installation of these packages. Refer
to the installation instructions for the Enhanced Ksplice Client in the Ksplice
User's Guide for more details. Systems may be prepared for Ksplice patching by
installing the Ksplice aware packages in advance, prior to installing the
enhanced Ksplice client.
DESCRIPTION
* CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166, XSA-404: Information leak using processor MMIO stale data.
A side-channel information leak on some generations of Intel
processors could allow the leaking of internal microarchitectural
buffers when MMIO is in used.
Updated microcode is required for this vulnerability to be mitigated.
Orabug: 34371343
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the Oraclevm-errata
mailing list