Oracle Linux Security Advisory ELSA-2023-7423

https://linux.oracle.com/errata/ELSA-2023-7423.html

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.105.1.0.1.el7.noarch.rpm
kernel-debug-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-doc-3.10.0-1160.105.1.0.1.el7.noarch.rpm
kernel-headers-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
python-perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm


SRPMS:
https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-3.10.0-1160.105.1.0.1.el7.src.rpm

Related CVEs:

CVE-2022-40982
CVE-2023-3611
CVE-2023-3776
CVE-2023-4128
CVE-2023-4206
CVE-2023-4207
CVE-2023-4208




Description of changes:

[3.10.0-1160.105.1.0.1.el7.OL7]
- debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}

[3.10.0-1160.105.1.el7.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9]
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)

[3.10.0-1160.105.1.el7]
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}

[3.10.0-1160.104.1.el7]
- CI: Remove unused kpet_tree_family (Nikolai Kondrashov)
- xen/x86: don't lose event interrupts (Vitaly Kuznetsov) [RHEL-1534]
- Documentation/x86: Fix backwards on/off logic about YMM support (Waiman Long) [2229893] {CVE-2022-40982}
- KVM: Add GDS_NO support to KVM (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add Kconfig option for GDS (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add force option to GDS mitigation (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add Gather Data Sampling mitigation (Waiman Long) [2229893] {CVE-2022-40982}
- Documentation/ABI: Mention retbleed vulnerability info file for sysfs (Waiman Long) [2229893]
- docs/kernel-parameters: Update descriptions for "mitigations=" param with retbleed (Waiman Long) [2229893]
- x86/speculation: Add missing srbds=off to the mitigations= help text (Waiman Long) [2229893]
- x86: Sync Intel family names & cpu_vuln_blacklist[] with upstream (Waiman Long) [2229893]

[3.10.0-1160.103.1.el7]
- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (Davide Caratti) [2225555] {CVE-2023-3611}
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Davide Caratti) [2225555]
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (Davide Caratti) [2225639] {CVE-2023-3776}
- redhat: fix to be able to build with rpm 4.19.0 (Denys Vlasenko)


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle7: ELSA-2023-7423: kernel security Important Security Update

The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:

Summary

[3.10.0-1160.105.1.0.1.el7.OL7] - debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.105.1.el7.OL7] - Update Oracle Linux certificates (Ilya Okomin) - Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com) - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 <= 15-2.0.9] - Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin) [3.10.0-1160.105.1.el7] - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128} - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128} [3.10.0-1160.104.1.el7] - CI: Remove unused kpet_tree_family (Nikolai Kondrashov) - xen/x86: don't lose event interrupts (Vitaly Kuznetsov) [RHEL-1534] - Documentation/x86: Fix backwards on/off logic about YMM support (Waiman Long) [2229893] {CVE-2022-40982} - KVM: Add GDS_NO support to KVM (Waiman Long) [2229893] {CVE-2022-40982} - x86/speculation: Add Kconfig option for GDS (Waiman Long) [2229893] {CVE-2022-40982} - x86/speculation: Add force option to GDS mitigation (Waiman Long) [2229893] {CVE-2022-40982} - x86/speculation: Add Gather Data Sampling mitigation (Waiman Long) [2229893] {CVE-2022-40982} - Documentation/ABI: Mention retbleed vulnerability info file for sysfs (Waiman Long) [2229893] - docs/kernel-parameters: Update descriptions for "mitigations=" param with retbleed (Waiman Long) [2229893] - x86/speculation: Add missing srbds=off to the mitigations= help text (Waiman Long) [2229893] - x86: Sync Intel family names & cpu_vuln_blacklist[] with upstream (Waiman Long) [2229893] [3.10.0-1160.103.1.el7] - net/sched: sch_qfq: account for stab overhead in qfq_enqueue (Davide Caratti) [2225555] {CVE-2023-3611} - net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Davide Caratti) [2225555] - net/sched: cls_fw: Fix improper refcount update leads to use-after-free (Davide Caratti) [2225639] {CVE-2023-3776} - redhat: fix to be able to build with rpm 4.19.0 (Denys Vlasenko)

SRPMs

https://oss.oracle.com:443/ol7/SRPMS-updates//kernel-3.10.0-1160.105.1.0.1.el7.src.rpm

x86_64

bpftool-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.105.1.0.1.el7.noarch.rpm kernel-debug-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.105.1.0.1.el7.noarch.rpm kernel-headers-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.105.1.0.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm python-perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm

aarch64

i386

Severity
Related CVEs: CVE-2022-40982 CVE-2023-3611 CVE-2023-3776 CVE-2023-4128 CVE-2023-4206 CVE-2023-4207 CVE-2023-4208

Related News