X

News, tips, partners, and perspectives for Oracle’s virtualization offerings

Oracle VM Ksplice patches available

John Priest
Director of Product Management

Oracle VM Server virtualization software is engineered for open cloud infrastructure and delivers leading performance, scalability, and reliability for enterprise SaaS and PaaS workloads as well as traditional enterprise applications.

Oracle VM and Ksplice

Oracle VM was enhanced last year to offer additional support for Ksplice technology.  In addition to the base Ksplice kernel patching support, Ksplice on Oracle VM was extended to add patching for the Xen hypervisor, glibc, openssl and QEMU packages.  All of these components can now be patched in Oracle VM without rebooting your server.  This an important feature for many data center managers that need a high level of security and up-time for all of their Virtual Machines.

Latest Ksplice packages released for Oracle VM

The Oracle VM team continues to deliver security patches to the Oracle Yum site and the Unbreakable Linux Network as soon as possible depending on the complexity and embargo period for the vulnerability.  Ksplice aware versions of the security patches are delivered to ULN for customers that have Oracle VM Premier Support.  As few recent examples of these OVM Ksplice aware packages include:

Xen (OVMSA-2019- 0016) - security patch for XSA-297, XSA-284, CVE-2019-11091, CVE-2018-12126, CVE-2018-12130, CVE-2018-12127 (Micro-architectural Data Sampling fix for Intel x86 processors)

Openssl (OVMSA-2019-0040) - security patch for CVE-2019-1559

UEKR4 (ELSA-2019-4739) - UEK version 4.1.12-124.30.1 for CVE-2019-13631.

Additional Oracle VM and Ksplice Information

For the latest Oracle VM product information, best practices white papers and webinars, please visit http://oracle.com/virtualization.

For the latest Oracle Ksplice product information, please visit https://www.ksplice.com/

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.