Oracle Linux Security Advisory ELSA-2023-5069

https://linux.oracle.com/errata/ELSA-2023-5069.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-7.0.0-284.30.0.1.el9_2.x86_64.rpm
kernel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-abi-stablelists-5.14.0-284.30.0.1.el9_2.noarch.rpm
kernel-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-doc-5.14.0-284.30.0.1.el9_2.noarch.rpm
kernel-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm
perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm
python3-perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm
rtla-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm

aarch64:
bpftool-7.0.0-284.30.0.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.30.0.1.el9_2.aarch64.rpm
perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm
python3-perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.aarch64.rpm


SRPMS:
https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-5.14.0-284.30.0.1.el9_2.src.rpm

Related CVEs:

CVE-2023-1637
CVE-2023-3390
CVE-2023-3610
CVE-2023-3776
CVE-2023-4004
CVE-2023-4147
CVE-2023-21102
CVE-2023-31248
CVE-2023-35001




Description of changes:

- [5.14.0-284.30.0.1.el9_2.OL9]
- x86/tsx: Add a feature bit for TSX control MSR support {CVE-2023-1637}
- x86/speculation: Restore speculation related MSRs {CVE-2023-1637}
- x86/pm: Save the MSR validity status at context setup {CVE-2023-1637}
- x86/pm: Fix false positive kmemleak report in msr_build_context() {CVE-2023-1637}
- x86/cpu: Restore AMD's DE_CFG MSR after resume {CVE-2023-1637}
- x86/pm: Add enumeration check before spec MSRs {CVE-2023-1637}
- arm64: efi: Execute runtime services from a dedicated {CVE-2023-21102}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain {CVE-2023-3390}
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails {CVE-2023-3390}
- netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID {CVE-2023-4147}
- netfilter: nf_tables: do not ignore genmask when looking up chain by id {CVE-2023-31248}
- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval {CVE-2023-35001}
- netfilter: nft_set_pipapo: fix improper element removal {CVE-2023-4004}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2023-5069: kernel security, bug fix, and enhancement Important Security Upda

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Summary

- [5.14.0-284.30.0.1.el9_2.OL9] - x86/tsx: Add a feature bit for TSX control MSR support {CVE-2023-1637} - x86/speculation: Restore speculation related MSRs {CVE-2023-1637} - x86/pm: Save the MSR validity status at context setup {CVE-2023-1637} - x86/pm: Fix false positive kmemleak report in msr_build_context() {CVE-2023-1637} - x86/cpu: Restore AMD's DE_CFG MSR after resume {CVE-2023-1637} - x86/pm: Add enumeration check before spec MSRs {CVE-2023-1637} - arm64: efi: Execute runtime services from a dedicated {CVE-2023-21102} - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390} - netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain {CVE-2023-3390} - netfilter: nf_tables: unbind non-anonymous set if rule construction fails {CVE-2023-3390} - netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID {CVE-2023-4147} - netfilter: nf_tables: do not ignore genmask when looking up chain by id {CVE-2023-31248} - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval {CVE-2023-35001} - netfilter: nft_set_pipapo: fix improper element removal {CVE-2023-4004} - net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}

SRPMs

https://oss.oracle.com:443/ol9/SRPMS-updates//kernel-5.14.0-284.30.0.1.el9_2.src.rpm

x86_64

bpftool-7.0.0-284.30.0.1.el9_2.x86_64.rpm kernel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-abi-stablelists-5.14.0-284.30.0.1.el9_2.noarch.rpm kernel-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-doc-5.14.0-284.30.0.1.el9_2.noarch.rpm kernel-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-libs-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm python3-perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm rtla-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-cross-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm

aarch64

bpftool-7.0.0-284.30.0.1.el9_2.aarch64.rpm kernel-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-libs-5.14.0-284.30.0.1.el9_2.aarch64.rpm perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm python3-perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-cross-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.aarch64.rpm

i386

Severity
Related CVEs: CVE-2023-1637 CVE-2023-3390 CVE-2023-3610 CVE-2023-3776 CVE-2023-4004 CVE-2023-4147 CVE-2023-21102 CVE-2023-31248 CVE-2023-35001

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo