ELSA-2022-9483

ELSA-2022-9483 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-06-14

Description


[4.14.35-2047.514.5]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp) [Orabug: 34275786]

[4.14.35-2047.514.4]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21127} {CVE-2022-21125} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Fix redundant MDS mitigation message (Waiman Long) [Orabug: 34202260] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}


Related CVEs


CVE-2022-21123
CVE-2022-21166
CVE-2022-21125
CVE-2022-21127

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (aarch64) kernel-uek-4.14.35-2047.514.5.el7uek.src.rpmc80bff664e1cc4a07682c53e580a4649bcb50031455ad28334c8105cc76b4441ELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-2047.514.5.el7uek.src.rpmc80bff664e1cc4a07682c53e580a4649bcb50031455ad28334c8105cc76b4441ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-4.14.35-2047.514.5.el7uek.aarch64.rpmee34b108bf9538bab0e26ca9eff84ae96ff6ffdcb1346ec9ffbbc082eb3a3e3cELSA-2025-20190ol7_aarch64_latest
kernel-uek-4.14.35-2047.514.5.el7uek.aarch64.rpmee34b108bf9538bab0e26ca9eff84ae96ff6ffdcb1346ec9ffbbc082eb3a3e3cELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-debug-4.14.35-2047.514.5.el7uek.aarch64.rpm55098ce30346aca19a138078d4adab89c0428bb04b773796045778797232ad62ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-4.14.35-2047.514.5.el7uek.aarch64.rpm55098ce30346aca19a138078d4adab89c0428bb04b773796045778797232ad62ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-debug-devel-4.14.35-2047.514.5.el7uek.aarch64.rpmf07e428a90ac49bd888586530343c4aec6d7400209d6bb80091586f80a51dd98ELSA-2025-20190ol7_aarch64_latest
kernel-uek-debug-devel-4.14.35-2047.514.5.el7uek.aarch64.rpmf07e428a90ac49bd888586530343c4aec6d7400209d6bb80091586f80a51dd98ELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm3de897dada34aeec1cd377beb2b9a6e3cf794cd749b3abafbaed1b88e915371eELSA-2025-20190ol7_aarch64_latest
kernel-uek-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm3de897dada34aeec1cd377beb2b9a6e3cf794cd749b3abafbaed1b88e915371eELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-headers-4.14.35-2047.514.5.el7uek.aarch64.rpme47741cb8220d59430ba7aa5a8067189abb75f318808b8522b7e20a60f4d0523ELBA-2025-20014ol7_aarch64_latest
kernel-uek-headers-4.14.35-2047.514.5.el7uek.aarch64.rpme47741cb8220d59430ba7aa5a8067189abb75f318808b8522b7e20a60f4d0523ELBA-2025-20014ol7_aarch64_u9_patch
kernel-uek-tools-4.14.35-2047.514.5.el7uek.aarch64.rpmc304feb5d8555b1dd0f2bc92a7ad869207d92deab6fa5bdced20ce51896c70ccELSA-2025-20190ol7_aarch64_latest
kernel-uek-tools-4.14.35-2047.514.5.el7uek.aarch64.rpmc304feb5d8555b1dd0f2bc92a7ad869207d92deab6fa5bdced20ce51896c70ccELSA-2025-20190ol7_aarch64_u9_patch
kernel-uek-tools-libs-4.14.35-2047.514.5.el7uek.aarch64.rpm526770935a71db0feed3e43f7033911166d65d91567b7540d4e447ba3b249504ELSA-2025-20019ol7_aarch64_latest
kernel-uek-tools-libs-4.14.35-2047.514.5.el7uek.aarch64.rpm526770935a71db0feed3e43f7033911166d65d91567b7540d4e447ba3b249504ELSA-2025-20019ol7_aarch64_u9_patch
kernel-uek-tools-libs-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm7812d6ee561d5a506acb73601ee6aa240c1f571b60f16994418e35ee027e65a7ELBA-2025-20014ol7_aarch64_latest
kernel-uek-tools-libs-devel-4.14.35-2047.514.5.el7uek.aarch64.rpm7812d6ee561d5a506acb73601ee6aa240c1f571b60f16994418e35ee027e65a7ELBA-2025-20014ol7_aarch64_u9_patch
perf-4.14.35-2047.514.5.el7uek.aarch64.rpmb61d60f4dd50eb1ceb0d8c5e1bbddfcb877c3ec1588d9242ff95e20674ccd4b7ELSA-2025-20019ol7_aarch64_latest
perf-4.14.35-2047.514.5.el7uek.aarch64.rpmb61d60f4dd50eb1ceb0d8c5e1bbddfcb877c3ec1588d9242ff95e20674ccd4b7ELSA-2025-20019ol7_aarch64_u9_patch
python-perf-4.14.35-2047.514.5.el7uek.aarch64.rpm8039d36ed873d93f0fc5a7f72ae1637ce98c522729ce4ec07ad8fedf7cbe8561ELSA-2025-20019ol7_aarch64_latest
python-perf-4.14.35-2047.514.5.el7uek.aarch64.rpm8039d36ed873d93f0fc5a7f72ae1637ce98c522729ce4ec07ad8fedf7cbe8561ELSA-2025-20019ol7_aarch64_u9_patch
Oracle Linux 7 (x86_64) kernel-uek-4.14.35-2047.514.5.el7uek.src.rpmc80bff664e1cc4a07682c53e580a4649bcb50031455ad28334c8105cc76b4441ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-4.14.35-2047.514.5.el7uek.x86_64.rpm2f7850a6c5ae0c71c237e88f7858793a976fa4ed4099b05cdcdb40ab37f4142eELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-4.14.35-2047.514.5.el7uek.x86_64.rpmcbe7847a222f62f0d58c374150ba215edb5345316a56cd7047beba42d464b292ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-debug-devel-4.14.35-2047.514.5.el7uek.x86_64.rpmdc2efcdb812f5d74828f560b825a2a2246bb6fea1e1df9ae04d4a86477971216ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-devel-4.14.35-2047.514.5.el7uek.x86_64.rpmefb0cd9a23fadf782a8f859d09015cabfc7ec3d2c2d178efd68ff1f88b92b8d3ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-doc-4.14.35-2047.514.5.el7uek.noarch.rpm90a9223b2ea8ca15f6388cd51f6451585cf2507f1063d790ece07da0cf079996ELSA-2025-20190ol7_x86_64_UEKR5
kernel-uek-tools-4.14.35-2047.514.5.el7uek.x86_64.rpm94565f8fa4c9bec1af1d02f08a6ed7ac013224c73cdc4354a92b2e8f8b0ff528ELSA-2025-20190ol7_x86_64_UEKR5



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete