[ELSA-2023-12839] kernel security update

Severity Important
Affected Packages 20
CVEs 2

[4.18.0-477.27.1.el8_8.OL8]
- x86/microcode/intel: Expose collect_cpu_info_early() for IFS
- x86/cpu: Load microcode during restore_processor_state()
- x86/microcode: Deprecate MICROCODE_OLD_INTERFACE
- x86/microcode: Rip out the OLD_INTERFACE
- x86/microcode: Default-disable late loading
- x86/microcode: Taint and warn on late loading
- x86/microcode: Remove unnecessary perf callback
- x86/microcode: Print previous version of microcode after reload
- x86/microcode: Rip out the subsys interface gunk
- x86/microcode: Simplify init path even more
- x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593}
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593}
- x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}
- x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}
- x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}
- x86/microcode: Remove ->request_microcode_user()
- x86/microcode: Kill refresh_fw
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}
- x86/microcode: Drop struct ucode_cpu_info.valid
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}
- x86/microcode/AMD: Track patch allocation size explicitly
- x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}
- x86/microcode/core: Return an error only when necessary {CVE-2023-20593}
- x86/apic: Don't disable x2APIC if locked
- x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}
- x86/cpu: Remove redundant extern x86_read_arch_cap_msr()
- x86/cpu, kvm: Add support for CPUID_80000021_EAX
- KVM: x86: Advertise that the SMM_CTL MSR is not supported
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
- x86/cpu: Support AMD Automatic IBRS
- x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}

Package Affected Version
pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/kernel-abi-stablelists?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.8 < 4.18.0-477.27.1.el8_8
ID
ELSA-2023-12839
Severity
important
URL
https://linux.oracle.com/errata/ELSA-2023-12839.html
Published
2023-09-29T00:00:00
(11 months ago)
Modified
2023-09-29T00:00:00
(11 months ago)
Rights
Copyright 2023 Oracle, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.8 oraclelinux python3-perf < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.8 oraclelinux perf < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.8 oraclelinux kernel < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.8 oraclelinux kernel-tools < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.8 oraclelinux kernel-tools-libs < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.8 oraclelinux kernel-tools-libs-devel < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.8 oraclelinux kernel-modules < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.8 oraclelinux kernel-modules-extra < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.8 oraclelinux kernel-headers < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.8 oraclelinux kernel-doc < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.8 oraclelinux kernel-devel < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.8 oraclelinux kernel-debug < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.8 oraclelinux kernel-debug-modules < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.8 oraclelinux kernel-debug-modules-extra < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.8 oraclelinux kernel-debug-devel < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.8 oraclelinux kernel-debug-core < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.8 oraclelinux kernel-cross-headers < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.8 oraclelinux kernel-core < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/kernel-abi-stablelists?distro=oraclelinux-8.8 oraclelinux kernel-abi-stablelists < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
Affected pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.8 oraclelinux bpftool < 4.18.0-477.27.1.el8_8 oraclelinux-8.8
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...