ELSA-2022-9481

ELSA-2022-9481 - Unbreakable Enterprise kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2022-06-14

Description


[5.4.17-2136.308.9]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp) [Orabug: 34276099]

[5.4.17-2136.308.8]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}


Related CVEs


CVE-2022-21123
CVE-2022-21125
CVE-2022-21166
CVE-2022-21127

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 7 (aarch64) kernel-uek-5.4.17-2136.308.9.el7uek.src.rpmed400117f5679c1cc87179cf1099cac2-
kernel-uek-5.4.17-2136.308.9.el7uek.aarch64.rpm2b860ab3feb168bebd4d2c22fc76240f-
kernel-uek-debug-5.4.17-2136.308.9.el7uek.aarch64.rpm2db2b01dbc0c6ad6cd025b1c62ed514b-
kernel-uek-debug-devel-5.4.17-2136.308.9.el7uek.aarch64.rpm9629738c0b630117003ac5e54617094b-
kernel-uek-devel-5.4.17-2136.308.9.el7uek.aarch64.rpm72a98e41f9324f6a883b6d28cc1b261f-
kernel-uek-doc-5.4.17-2136.308.9.el7uek.noarch.rpmb750a23baf47ffc58c7f8563e28b1915-
kernel-uek-tools-5.4.17-2136.308.9.el7uek.aarch64.rpm48f02e0183bc38dfa43d96565bbaf439-
kernel-uek-tools-libs-5.4.17-2136.308.9.el7uek.aarch64.rpme6c08e857d8717fc5bd28e9a08b8fb9c-
perf-5.4.17-2136.308.9.el7uek.aarch64.rpm7db73f40dd2f30202c9dc730658065df-
python-perf-5.4.17-2136.308.9.el7uek.aarch64.rpm6f93cc3531977785db9f306a9f8d35fa-
Oracle Linux 7 (x86_64) kernel-uek-5.4.17-2136.308.9.el7uek.src.rpmed400117f5679c1cc87179cf1099cac2-
kernel-uek-5.4.17-2136.308.9.el7uek.x86_64.rpm00aa6ce2e119df93e53c245213094f04-
kernel-uek-debug-5.4.17-2136.308.9.el7uek.x86_64.rpm8548af6d7642dfde2db06a5102c88cc6-
kernel-uek-debug-devel-5.4.17-2136.308.9.el7uek.x86_64.rpm0580d19ab255efda61bf3de1ec02d70f-
kernel-uek-devel-5.4.17-2136.308.9.el7uek.x86_64.rpme71b298ce1d5dcbf1ac21001722e5ddb-
kernel-uek-doc-5.4.17-2136.308.9.el7uek.noarch.rpmb750a23baf47ffc58c7f8563e28b1915-
kernel-uek-tools-5.4.17-2136.308.9.el7uek.x86_64.rpm9dacf185a3ca55d05e7735c448203958-
Oracle Linux 8 (aarch64) kernel-uek-5.4.17-2136.308.9.el8uek.src.rpme1ba54d39fecefb16ca2264d2c378f07-
kernel-uek-5.4.17-2136.308.9.el8uek.aarch64.rpm1df6b22c68c97dc316385d5929542672-
kernel-uek-debug-5.4.17-2136.308.9.el8uek.aarch64.rpmb525e06f40136078dad52d51fc15f8bc-
kernel-uek-debug-devel-5.4.17-2136.308.9.el8uek.aarch64.rpmf691296e13249b08faaa61febd1aaa50-
kernel-uek-devel-5.4.17-2136.308.9.el8uek.aarch64.rpme26f6398ec997ad5ee6fbd6ec017b90f-
kernel-uek-doc-5.4.17-2136.308.9.el8uek.noarch.rpmf0a45956b12c05cec77861f184b0df1b-
Oracle Linux 8 (x86_64) kernel-uek-5.4.17-2136.308.9.el8uek.src.rpme1ba54d39fecefb16ca2264d2c378f07-
kernel-uek-5.4.17-2136.308.9.el8uek.x86_64.rpmaf229762da4582b9a1ebbb65bf6f7548-
kernel-uek-debug-5.4.17-2136.308.9.el8uek.x86_64.rpm437cc06fc0f1caed0e6e693bc6a2ca76-
kernel-uek-debug-devel-5.4.17-2136.308.9.el8uek.x86_64.rpm0e9250f46c2b8382e7335bdd63e38d7a-
kernel-uek-devel-5.4.17-2136.308.9.el8uek.x86_64.rpmbcb58802a01ff59dc030b9bbcf5c7165-
kernel-uek-doc-5.4.17-2136.308.9.el8uek.noarch.rpmf0a45956b12c05cec77861f184b0df1b-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete