Oracle Linux Security Advisory ELSA-2023-5069 https://linux.oracle.com/errata/ELSA-2023-5069.html The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network: x86_64: bpftool-7.0.0-284.30.0.1.el9_2.x86_64.rpm kernel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.30.0.1.el9_2.noarch.rpm kernel-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-doc-5.14.0-284.30.0.1.el9_2.noarch.rpm kernel-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-libs-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm python3-perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm rtla-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-cross-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm aarch64: bpftool-7.0.0-284.30.0.1.el9_2.aarch64.rpm kernel-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-libs-5.14.0-284.30.0.1.el9_2.aarch64.rpm perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm python3-perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-cross-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.aarch64.rpm SRPMS: https://oss.oracle.com/ol9/SRPMS-updates//kernel-5.14.0-284.30.0.1.el9_2.src.rpm Related CVEs: CVE-2023-1637 CVE-2023-3390 CVE-2023-3610 CVE-2023-3776 CVE-2023-4004 CVE-2023-4147 CVE-2023-21102 CVE-2023-31248 CVE-2023-35001 Description of changes: - [5.14.0-284.30.0.1.el9_2.OL9] - x86/tsx: Add a feature bit for TSX control MSR support {CVE-2023-1637} - x86/speculation: Restore speculation related MSRs {CVE-2023-1637} - x86/pm: Save the MSR validity status at context setup {CVE-2023-1637} - x86/pm: Fix false positive kmemleak report in msr_build_context() {CVE-2023-1637} - x86/cpu: Restore AMD's DE_CFG MSR after resume {CVE-2023-1637} - x86/pm: Add enumeration check before spec MSRs {CVE-2023-1637} - arm64: efi: Execute runtime services from a dedicated {CVE-2023-21102} - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390} - netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain {CVE-2023-3390} - netfilter: nf_tables: unbind non-anonymous set if rule construction fails {CVE-2023-3390} - netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID {CVE-2023-4147} - netfilter: nf_tables: do not ignore genmask when looking up chain by id {CVE-2023-31248} - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval {CVE-2023-35001} - netfilter: nft_set_pipapo: fix improper element removal {CVE-2023-4004} - net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776} _______________________________________________ El-errata mailing list [email protected] https://oss.oracle.com/mailman/listinfo/el-errata