TILLBEHÖR

Oracle7: ELSA-2022-9486: kärnan viktig säkerhetsuppdatering

Oracle7: ELSA-2022-9486: kärnan viktig säkerhetsuppdatering

Vad letar du efter?

Oracle Linux Security Advisory ELSA-2022-9486

https://linux.oracle.com/errata/ELSA-2022-9486.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
kernel-uek-container-5.4.17-2136.308.9.el7.x86_64.rpm
kernel-uek-container-debug-5.4.17-2136.308.9.el7.x86_64.rpm



SRPMS:
https://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-container-5.4.17-2136.308.9.el7.src.rpm

Related CVEs:

CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166




Description of changes:

[5.4.17-2136.308.9.el7]
- x86/speculation/mmio: Fix late microcode loading (Patrick Colp)  [Orabug:
  34276099]

[5.4.17-2136.308.8.el7]
- Add debugfs for controlling MMIO state data (Kanth Ghatraju)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- KVM: x86/speculation: Disable Fill buffer clear within guests (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Reuse SRBDS mitigation for SBDS (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/srbds: Update SRBDS mitigation selection (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enable CPU Fill buffer clearing on idle (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation: Add a common function for MD_CLEAR mitigation update (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}
- Documentation: Add documentation for Processor MMIO Stale Data (Pawan Gupta)  [Orabug: 34202259]  {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}

_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Sammanfattning

Beskrivning av ändringar:
[5.4.17-2136.308.9.el7] – x86/spekulation/mmio: Fixa sen mikrokodladdning (Patrick Colp) [Orabug:
34276099] [5.4.17-2136.308.8.el7]

– Lägg till debugfs för att kontrollera MMIO-tillståndsdata (Kanth Ghatraju) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – KVM: x86/spekulation: Inaktivera Rensa fyllningsbuffert inom gäster (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation/mmio: Återanvänd SRBDS-reducering för SBDS (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/speculation/srbds: Uppdatera SRBDS-reduceringsval (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation/mmio: Lägg till sysfs-rapportering för processor MMIO inaktuella data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation/mmio: Aktivera CPU Fyll buffertrensning på inaktiv (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/bugs: Group MDS, TAA & Processor MMIO Stale Data-reducering (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation/mmio: Lägg till begränsning för processor MMIO inaktuella data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation: Lägg till en vanlig funktion för MD_CLEAR-reduceringsuppdatering (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – x86/spekulation/mmio: Räkna upp Processor MMIO Stale Data bug (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166} – Dokumentation: Lägg till dokumentation för processor MMIO Stale Data (Pawan Gupta) [Orabug: 34202259] {CVE-2022-21123} {CVE-2022-21125} {CVE-2022-21127} {CVE-2022-21166}

x86_64

kernel-uek-container-5.4.17-2136.308.9.el7.x86_64.rpm kernel-uek-container-debug-5.4.17-2136.308.9.el7.x86_64.rpm

SRPMS

https://oss.oracle.com/ol7/SRPMS-updates/kernel-uek-container-5.4.17-2136.308.9.el7.src.rpm

Relaterade CVE: CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166

Drivs av

Sidfotslogotyp

.sp-column > .sp-module .sp-module-title”,”delay”:0,”scroll_depth”:”procent”,”scroll_depth_value”:80,”firing_frequency”:1,”reverse_scroll_close”:false,” threshold”:0,”close_out_viewport”:false,”exit_timer”:1000,”idle_time”:10000,”animation_open”:”transition.slideUpIn”,”animation_close”:”transition.fadeOut”,”animation_duration”:300,” prevent_default”:true,”backdrop”:true,”backdrop_color”:”rgba(0, 0, 0, 0.5)”,”backdrop_click”:true,”disable_page_scroll”:false,”test_mode”:false,”debug”: false,”ga_tracking”:false,”ga_tracking_id”:0,”ga_tracking_event_category”:”EngageBox”,”ga_tracking_event_label”:”Box #4 – Advisories”,”auto_focus”:false}” data-type=”popup”>

För att hålla dig uppdaterad om de senaste säkerhetsnyheterna med öppen källkod, funktionsartiklar och säkerhetsråd för Linuxdistribution Prenumerera på våra nyhetsbrev!

Vi använder cookies för att tillhandahålla och förbättra våra tjänster. Genom att använda vår sida samtycker du till vår cookiepolicy.

Du loggas nu in med dina Facebook-uppgifter

Botón volver arriba

Ad blocker detected

You must remove the AD BLOCKER to continue using our website THANK YOU