Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2022-06-14 |
[5.4.17-2136.308.9]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp) [Orabug:
34276099]
[5.4.17-2136.308.8]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
CVE-2022-21166 |
CVE-2022-21123 |
CVE-2022-21125 |
CVE-2022-21127 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | kernel-uek-container-5.4.17-2136.308.9.el7.src.rpm | d4a29b4ca01b5ab7ce9131b8e33ec7b3a8ae8fbe9448147db0a561c23ebfc36b | ELSA-2025-20190 | ol7_x86_64_UEKR6 |
kernel-uek-container-5.4.17-2136.308.9.el7.x86_64.rpm | 4d0a6e455d85cecac6106f25c180c24d906eec2014bad0695d8903bb52e67cf1 | ELSA-2025-20190 | ol7_x86_64_UEKR6 | |
kernel-uek-container-debug-5.4.17-2136.308.9.el7.x86_64.rpm | 2facd5ab6e69f55dd5acc195f6811879e8cfa3bc7721a75f3655a72742a4fa2c | ELSA-2025-20190 | ol7_x86_64_UEKR6 | |
Oracle Linux 8 (x86_64) | kernel-uek-container-5.4.17-2136.308.9.el8.src.rpm | a803cea5bf6d2c53bd3bf6e6e43539f3bf2c4a4f075a85f3663c07377ab4188d | - | ol8_x86_64_UEKR6 |
kernel-uek-container-5.4.17-2136.308.9.el8.x86_64.rpm | 02b1c57eca1f3b176f48489ecbf60fc1cb266c5c0355dbeb9f18586bdf2a6fbb | - | ol8_x86_64_UEKR6 | |
kernel-uek-container-debug-5.4.17-2136.308.9.el8.x86_64.rpm | 1930b732e7802960dcd4931e69eaa3bc32699a63535d606e0a3b6a2fe0f96dcd | - | ol8_x86_64_UEKR6 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team