[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2022-9198 -- Oracle kernel-uek

ID: oval:org.secpod.oval:def:1505471Date: (C)2022-03-15   (M)2024-04-17
Class: PATCHFamily: unix




[4.14.35-2047.511.5.4.el7uek] - x86/speculation: Add knob for eibrs_retpoline_enabled [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Extend our code to properly support eibrs+lfence and eibrs+retpoline [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Update link to AMD speculation whitepaper [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Use generic retpoline by default on AMD [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting [Orabug: 33922122] {CVE-2021-26341} - Documentation/hw-vuln: Update spectre doc [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Add eIBRS + Retpoline options [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Merge one test in spectre_v2_user_select_mitigation [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Update ALTERNATIVEs to match upstream [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Fix bug in retpoline mode on AMD with `spectre_v2=none` [Orabug: 33922122] {CVE-2021-26341} - bpf: Add kconfig knob for disabling unpriv bpf by default [Orabug: 33926438]

Platform:
Oracle Linux 7
Product:
kernel-uek
Reference:
ELSA-2022-9198
CVE-2021-26341
CVE    1
CVE-2021-26341

© SecPod Technologies