Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2022-06-14 |
[4.14.35-2047.514.5]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp) [Orabug: 34275786]
[4.14.35-2047.514.4]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Fix redundant MDS mitigation message (Waiman Long) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
CVE-2022-21123 |
CVE-2022-21125 |
CVE-2022-21166 |
CVE-2022-21127 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (aarch64) | kernel-uek-4.14.35-2047.514.5.el7uek.src.rpm | de9f640edaec2e6bc619fcf82b3c8e04 | - |
kernel-uek-4.14.35-2047.514.5.el7uek.aarch64.rpm | 7f57143deed7f829488f4e628ef3076c | - | |
kernel-uek-debug-4.14.35-2047.514.5.el7uek.aarch64.rpm | 453b04317a21b657a354518c60be3475 | - | |
kernel-uek-debug-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm | 6a1a87837327d4a80873393fbe925537 | - | |
kernel-uek-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm | 47f757e7b359483d65fa4f8963245525 | - | |
kernel-uek-headers-4.14.35-2047.514.5.el7uek.aarch64.rpm | 13e032eaee5abfd9907f30bde9e21a03 | - | |
kernel-uek-tools-4.14.35-2047.514.5.el7uek.aarch64.rpm | 8b57165153b8774cd00629d74c5e6854 | - | |
kernel-uek-tools-libs-4.14.35-2047.514.5.el7uek.aarch64.rpm | b610df8db9754d0ef95e69a1469c14b9 | - | |
kernel-uek-tools-libs-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm | 08442e1ab045d5231cfb5d3967b49e27 | - | |
perf-4.14.35-2047.514.5.el7uek.aarch64.rpm | 24f12e4c7bb0843705f556091c3e62cd | - | |
python-perf-4.14.35-2047.514.5.el7uek.aarch64.rpm | fc5e67402213316a03dab2249b1ee4ce | - | |
Oracle Linux 7 (x86_64) | kernel-uek-4.14.35-2047.514.5.el7uek.src.rpm | de9f640edaec2e6bc619fcf82b3c8e04 | - |
kernel-uek-4.14.35-2047.514.5.el7uek.x86_64.rpm | 28ffad3700834569a56a95e8d9cd9d7f | - | |
kernel-uek-debug-4.14.35-2047.514.5.el7uek.x86_64.rpm | 4e65a8e3be58dbe1f76584c353dc5efa | - | |
kernel-uek-debug-devel-4.14.35-2047.514.5.el7uek.x86_64.rpm | 9feb5f61cd6e2b060613cbf6fe4e4520 | - | |
kernel-uek-devel-4.14.35-2047.514.5.el7uek.x86_64.rpm | 6cc8f6fad9e0b249ab5597f1c0a9a848 | - | |
kernel-uek-doc-4.14.35-2047.514.5.el7uek.noarch.rpm | 16c679b228f19f1acea798c514204a1c | - | |
kernel-uek-tools-4.14.35-2047.514.5.el7uek.x86_64.rpm | 02f5ceb0ac7cf368fd42492580183515 | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team