ELSA-2022-9481

ELSA-2022-9481 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-06-14

Description


[5.4.17-2136.308.9]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp) [Orabug: 34276099]

[5.4.17-2136.308.8]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}


Related CVEs


CVE-2022-21123
CVE-2022-21127
CVE-2022-21166
CVE-2022-21125

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2136.308.9.el7uek.src.rpm9393314b3f106bdbfcc37e1511e02ca93a89d3fdc52517e7da8f4079cd9b91c9ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-5.4.17-2136.308.9.el7uek.aarch64.rpm438cfb1a69fbf8efcb961c3706695a0a4974744a4feaa7f9924fe1492c694b62ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-debug-5.4.17-2136.308.9.el7uek.aarch64.rpmadeb5aae0ccfc717c872c7b0740676860bf0f44f92e2c3ba2c819f12dc2a660cELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-debug-devel-5.4.17-2136.308.9.el7uek.aarch64.rpm2f5618f99514fae77458ccb20221ac3166db90f2524ad80ba6d619181b38e82dELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-devel-5.4.17-2136.308.9.el7uek.aarch64.rpm5a2e3956e4d41679e00ee46d25ba026d9c51118a53725123871e53ba7a442bdcELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-doc-5.4.17-2136.308.9.el7uek.noarch.rpmf4452d3c0ed8b9a15448dab3ae2f637330e06a4300c42ae33bebe045c022c4b8ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-tools-5.4.17-2136.308.9.el7uek.aarch64.rpmaf2dea9ae633caec051410c61029a0c3af7f299a42db835ec343763031f86b98ELSA-2025-20190ol7_aarch64_UEKR6
kernel-uek-tools-libs-5.4.17-2136.308.9.el7uek.aarch64.rpmd02125abeb78ab72b6b7a03034a59fc8b52dcb69210adc60d575d13df48fae76ELSA-2025-20019ol7_aarch64_UEKR6
perf-5.4.17-2136.308.9.el7uek.aarch64.rpma7084bc87914431fea5eddab9cdb04a70830a6cfb98bc8b0eb4770007fbb8173ELSA-2025-20019ol7_aarch64_UEKR6
python-perf-5.4.17-2136.308.9.el7uek.aarch64.rpm35e7f59d9a94d6d626614334bdfa2bb5ec9c40b2a96c33a1c2b7f9c23456123aELSA-2025-20019ol7_aarch64_UEKR6
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2136.308.9.el7uek.src.rpm9393314b3f106bdbfcc37e1511e02ca93a89d3fdc52517e7da8f4079cd9b91c9ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-5.4.17-2136.308.9.el7uek.x86_64.rpmc23ab6e823b2d1c81804e90fad4aa370c24061215d4c712c9517c4a8b7ad4026ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-debug-5.4.17-2136.308.9.el7uek.x86_64.rpm13608663de0ab708184e590d610e40c95e2af0a272d834b9af3f3aebefcfba55ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-debug-devel-5.4.17-2136.308.9.el7uek.x86_64.rpm9588eb968db18061731866edcac6f1138e82c1c57b968a66043225f114baf487ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-devel-5.4.17-2136.308.9.el7uek.x86_64.rpm5b8e4bb1d69386009a280d35f2c63fe7e87c2db5a6414c441bd2f04c11239076ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-doc-5.4.17-2136.308.9.el7uek.noarch.rpmf4452d3c0ed8b9a15448dab3ae2f637330e06a4300c42ae33bebe045c022c4b8ELSA-2025-20190ol7_x86_64_UEKR6
kernel-uek-tools-5.4.17-2136.308.9.el7uek.x86_64.rpmdc02882214ded138ea87086fb38addd867e70ad741a53d30da39195a85fe2eebELSA-2025-20190ol7_x86_64_UEKR6
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2136.308.9.el8uek.src.rpm12ea59a067408a0e97e14dec05f0cdad343294149999fcbd800a95fbbf685383-ol8_aarch64_baseos_latest
kernel-uek-5.4.17-2136.308.9.el8uek.src.rpm12ea59a067408a0e97e14dec05f0cdad343294149999fcbd800a95fbbf685383-ol8_aarch64_u6_baseos_patch
kernel-uek-5.4.17-2136.308.9.el8uek.aarch64.rpmfe9d47682dbb4a3ee01fc09f0dcf9deda12b2d058b264b5d781be10b98409285-ol8_aarch64_baseos_latest
kernel-uek-5.4.17-2136.308.9.el8uek.aarch64.rpmfe9d47682dbb4a3ee01fc09f0dcf9deda12b2d058b264b5d781be10b98409285-ol8_aarch64_u6_baseos_patch
kernel-uek-debug-5.4.17-2136.308.9.el8uek.aarch64.rpm663f20cf7573f5d53a75e6f906cb2a88dbe1b526867d705d2d2479f8d29eecff-ol8_aarch64_baseos_latest
kernel-uek-debug-5.4.17-2136.308.9.el8uek.aarch64.rpm663f20cf7573f5d53a75e6f906cb2a88dbe1b526867d705d2d2479f8d29eecff-ol8_aarch64_u6_baseos_patch
kernel-uek-debug-devel-5.4.17-2136.308.9.el8uek.aarch64.rpmde96219e649fccaef5a1026fca68eca3c372a485b77bc22c55f69179475b8faf-ol8_aarch64_baseos_latest
kernel-uek-debug-devel-5.4.17-2136.308.9.el8uek.aarch64.rpmde96219e649fccaef5a1026fca68eca3c372a485b77bc22c55f69179475b8faf-ol8_aarch64_u6_baseos_patch
kernel-uek-devel-5.4.17-2136.308.9.el8uek.aarch64.rpmd702e14e1c5b8824ed5d115a45b38aff9178813d04eeb38adfaa8a6fb7c0a40a-ol8_aarch64_baseos_latest
kernel-uek-devel-5.4.17-2136.308.9.el8uek.aarch64.rpmd702e14e1c5b8824ed5d115a45b38aff9178813d04eeb38adfaa8a6fb7c0a40a-ol8_aarch64_u6_baseos_patch
kernel-uek-doc-5.4.17-2136.308.9.el8uek.noarch.rpm8ad1ad897542cc82054eb051b886045e48099b3e152ce5e7650a69b014ab006b-ol8_aarch64_baseos_latest
kernel-uek-doc-5.4.17-2136.308.9.el8uek.noarch.rpm8ad1ad897542cc82054eb051b886045e48099b3e152ce5e7650a69b014ab006b-ol8_aarch64_u6_baseos_patch
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2136.308.9.el8uek.src.rpm12ea59a067408a0e97e14dec05f0cdad343294149999fcbd800a95fbbf685383-ol8_x86_64_UEKR6
kernel-uek-5.4.17-2136.308.9.el8uek.x86_64.rpm7e63aacf93daddc513c091999ca433d95c3a1c2e7be31b71fe5f46dcef6c2f75-ol8_x86_64_UEKR6
kernel-uek-debug-5.4.17-2136.308.9.el8uek.x86_64.rpmf3252aa4fb813082f42d7bccdac9c6f9152770c27dace9a031754488b3c74381-ol8_x86_64_UEKR6
kernel-uek-debug-devel-5.4.17-2136.308.9.el8uek.x86_64.rpmd2f9656df11e98ffe990753f9d909efb9276959917ce03787c9abcd3336caed4-ol8_x86_64_UEKR6
kernel-uek-devel-5.4.17-2136.308.9.el8uek.x86_64.rpmaf1621c6e3abbfe9ce656191b7bb53dd2e940fd44b1cc3603678351f7d2d4491-ol8_x86_64_UEKR6
kernel-uek-doc-5.4.17-2136.308.9.el8uek.noarch.rpm8ad1ad897542cc82054eb051b886045e48099b3e152ce5e7650a69b014ab006b-ol8_x86_64_UEKR6



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete