Oracle Linux 6203 Published by

New Ksplice updates for UEKR5 4.14.35 are available for Oracle Linux 7.



El-errata: New Ksplice updates for UEKR5 4.14.35 on OL7 (ELSA-2022-9483)


Synopsis: ELSA-2022-9483 can now be patched using Ksplice
CVEs: CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166

Users with Oracle Linux Premier Support can now use Ksplice to patch
against the latest Oracle Linux Security Advisory, ELSA-2022-9483.
More information about this errata can be found at
  https://linux.oracle.com/errata/ELSA-2022-9483.html

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running UEKR5 4.14.35
on OL7 install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y

DESCRIPTION

* CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21166: Information leak using processor MMIO stale data.

A side-channel information leak on some generations of Intel
processors could allow the leaking of internal microarchitectural
buffers when MMIO is in used.

Updated microcode is required for this vulnerability to be mitigated.

The status of the mitigation can be found using the following command:
$ cat /sys/devices/system/cpu/vulnerabilities/mmio_stale_data

And the mitigation can be disabled with following command:
$ echo 0 > /sys/kernel/debug/x86/mmio_stale_data_clear

Orabug: 34202260

SUPPORT

Ksplice support is available at ksplice-support_ww@oracle.com.


_______________________________________________