Oracle Linux Security Advisory ELSA-2023-12839

https://linux.oracle.com/errata/ELSA-2023-12839.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-core-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-cross-headers-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-debug-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-debug-core-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-debug-devel-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-debug-modules-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-debug-modules-extra-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-devel-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-doc-4.18.0-477.27.1.el8_8.noarch.rpm
kernel-headers-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-modules-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-tools-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64.rpm
perf-4.18.0-477.27.1.el8_8.x86_64.rpm
python3-perf-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-tools-libs-devel-4.18.0-477.27.1.el8_8.x86_64.rpm
kernel-abi-stablelists-4.18.0-477.27.1.el8_8.noarch.rpm

aarch64:
bpftool-4.18.0-477.27.1.el8_8.aarch64.rpm
kernel-cross-headers-4.18.0-477.27.1.el8_8.aarch64.rpm
kernel-headers-4.18.0-477.27.1.el8_8.aarch64.rpm
kernel-tools-4.18.0-477.27.1.el8_8.aarch64.rpm
kernel-tools-libs-4.18.0-477.27.1.el8_8.aarch64.rpm
perf-4.18.0-477.27.1.el8_8.aarch64.rpm
python3-perf-4.18.0-477.27.1.el8_8.aarch64.rpm
kernel-tools-libs-devel-4.18.0-477.27.1.el8_8.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol8/SRPMS-updates//kernel-4.18.0-477.27.1.el8_8.src.rpm

Related CVEs:

CVE-2023-3390
CVE-2023-20593




Description of changes:

[4.18.0-477.27.1.el8_8.OL8]
- x86/microcode/intel: Expose collect_cpu_info_early() for IFS
- x86/cpu: Load microcode during restore_processor_state()
- x86/microcode: Deprecate MICROCODE_OLD_INTERFACE
- x86/microcode: Rip out the OLD_INTERFACE
- x86/microcode: Default-disable late loading
- x86/microcode: Taint and warn on late loading
- x86/microcode: Remove unnecessary perf callback
- x86/microcode: Print previous version of microcode after reload
- x86/microcode: Rip out the subsys interface gunk
- x86/microcode: Simplify init path even more
- x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593}
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593}
- x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}
- x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}
- x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}
- x86/microcode: Remove ->request_microcode_user()
- x86/microcode: Kill refresh_fw
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}
- x86/microcode: Drop struct ucode_cpu_info.valid
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}
- x86/microcode/AMD: Track patch allocation size explicitly
- x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}
- x86/microcode/core: Return an error only when necessary {CVE-2023-20593}
- x86/apic: Don't disable x2APIC if locked
- x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}
- x86/cpu: Remove redundant extern x86_read_arch_cap_msr()
- x86/cpu, kvm: Add support for CPUID_80000021_EAX
- KVM: x86: Advertise that the SMM_CTL MSR is not supported
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
- x86/cpu: Support AMD Automatic IBRS
- x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}

_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle8: ELSA-2023-12839: kernel security Important Security Update

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

Summary

[4.18.0-477.27.1.el8_8.OL8] - x86/microcode/intel: Expose collect_cpu_info_early() for IFS - x86/cpu: Load microcode during restore_processor_state() - x86/microcode: Deprecate MICROCODE_OLD_INTERFACE - x86/microcode: Rip out the OLD_INTERFACE - x86/microcode: Default-disable late loading - x86/microcode: Taint and warn on late loading - x86/microcode: Remove unnecessary perf callback - x86/microcode: Print previous version of microcode after reload - x86/microcode: Rip out the subsys interface gunk - x86/microcode: Simplify init path even more - x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593} - x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593} - x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593} - x86/microcode: Adjust late loading result reporting message {CVE-2023-20593} - x86/amd: Cache debug register values in percpu variables {CVE-2023-20593} - x86/microcode: Remove ->request_microcode_user() - x86/microcode: Kill refresh_fw - x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593} - x86/microcode: Drop struct ucode_cpu_info.valid - x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593} - x86/microcode/AMD: Track patch allocation size explicitly - x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593} - x86/microcode/core: Return an error only when necessary {CVE-2023-20593} - x86/apic: Don't disable x2APIC if locked - x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593} - x86/cpu: Remove redundant extern x86_read_arch_cap_msr() - x86/cpu, kvm: Add support for CPUID_80000021_EAX - KVM: x86: Advertise that the SMM_CTL MSR is not supported - KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code - x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature - x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3 - x86/cpu: Support AMD Automatic IBRS - x86/CPU/AMD: Make sure EFER[AIBRSE] is set - x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593} - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}

SRPMs

https://oss.oracle.com:443/ol8/SRPMS-updates//kernel-4.18.0-477.27.1.el8_8.src.rpm

x86_64

bpftool-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-core-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-cross-headers-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-debug-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-debug-core-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-debug-devel-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-debug-modules-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-debug-modules-extra-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-devel-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-doc-4.18.0-477.27.1.el8_8.noarch.rpm kernel-headers-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-modules-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-modules-extra-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-tools-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-tools-libs-4.18.0-477.27.1.el8_8.x86_64.rpm perf-4.18.0-477.27.1.el8_8.x86_64.rpm python3-perf-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-tools-libs-devel-4.18.0-477.27.1.el8_8.x86_64.rpm kernel-abi-stablelists-4.18.0-477.27.1.el8_8.noarch.rpm

aarch64

bpftool-4.18.0-477.27.1.el8_8.aarch64.rpm kernel-cross-headers-4.18.0-477.27.1.el8_8.aarch64.rpm kernel-headers-4.18.0-477.27.1.el8_8.aarch64.rpm kernel-tools-4.18.0-477.27.1.el8_8.aarch64.rpm kernel-tools-libs-4.18.0-477.27.1.el8_8.aarch64.rpm perf-4.18.0-477.27.1.el8_8.aarch64.rpm python3-perf-4.18.0-477.27.1.el8_8.aarch64.rpm kernel-tools-libs-devel-4.18.0-477.27.1.el8_8.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-3390 CVE-2023-20593

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo