ELSA-2022-9198 -- Oracle kernel-uekID: oval:org.secpod.oval:def:1505471 | Date: (C)2022-03-15 (M)2024-04-17 |
Class: PATCH | Family: unix |
[4.14.35-2047.511.5.4.el7uek] - x86/speculation: Add knob for eibrs_retpoline_enabled [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Extend our code to properly support eibrs+lfence and eibrs+retpoline [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Update link to AMD speculation whitepaper [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Use generic retpoline by default on AMD [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting [Orabug: 33922122] {CVE-2021-26341} - Documentation/hw-vuln: Update spectre doc [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Add eIBRS + Retpoline options [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Merge one test in spectre_v2_user_select_mitigation [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Update ALTERNATIVEs to match upstream [Orabug: 33922122] {CVE-2021-26341} - x86/speculation: Fix bug in retpoline mode on AMD with `spectre_v2=none` [Orabug: 33922122] {CVE-2021-26341} - bpf: Add kconfig knob for disabling unpriv bpf by default [Orabug: 33926438]