[El-errata] New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2022-9483)
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Tue Jun 21 09:40:31 UTC 2022
Synopsis: ELSA-2022-9483 can now be patched using Ksplice
CVEs: CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166
Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9483.
More information about this errata can be found at
https://linux.oracle.com/errata/ELSA-2022-9483.html
INSTALLING THE UPDATES
We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.
On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.
Alternatively, you can install these updates by running:
# /usr/sbin/uptrack-upgrade -y
DESCRIPTION
* CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166: Information leak using processor MMIO stale data.
A side-channel information leak on some generations of Intel
processors could allow the leaking of internal microarchitectural
buffers when MMIO is in used.
Updated microcode is required for this vulnerability to be mitigated.
The status of the mitigation can be found using the following command:
$ cat /sys/devices/system/cpu/vulnerabilities/mmio_stale_data
And the mitigation can be disabled with following command:
$ echo 0 > /sys/kernel/debug/x86/mmio_stale_data_clear
Orabug: 34202260
SUPPORT
Ksplice support is available at ksplice-support_ww at oracle.com.
More information about the El-errata
mailing list