[ELSA-2023-12839] kernel security update
[4.18.0-477.27.1.el8_8.OL8]
- x86/microcode/intel: Expose collect_cpu_info_early() for IFS
- x86/cpu: Load microcode during restore_processor_state()
- x86/microcode: Deprecate MICROCODE_OLD_INTERFACE
- x86/microcode: Rip out the OLD_INTERFACE
- x86/microcode: Default-disable late loading
- x86/microcode: Taint and warn on late loading
- x86/microcode: Remove unnecessary perf callback
- x86/microcode: Print previous version of microcode after reload
- x86/microcode: Rip out the subsys interface gunk
- x86/microcode: Simplify init path even more
- x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593}
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593}
- x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}
- x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}
- x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}
- x86/microcode: Remove ->request_microcode_user()
- x86/microcode: Kill refresh_fw
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}
- x86/microcode: Drop struct ucode_cpu_info.valid
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}
- x86/microcode/AMD: Track patch allocation size explicitly
- x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}
- x86/microcode/core: Return an error only when necessary {CVE-2023-20593}
- x86/apic: Don't disable x2APIC if locked
- x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}
- x86/cpu: Remove redundant extern x86_read_arch_cap_msr()
- x86/cpu, kvm: Add support for CPUID_80000021_EAX
- KVM: x86: Advertise that the SMM_CTL MSR is not supported
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
- x86/cpu: Support AMD Automatic IBRS
- x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}
- ID
- ELSA-2023-12839
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2023-12839.html
- Published
-
2023-09-29T00:00:00
(11 months ago) - Modified
-
2023-09-29T00:00:00
(11 months ago) - Rights
- Copyright 2023 Oracle, Inc.
- Other Advisories
-
- ALAS-2023-1827
- ALAS2-2023-2190
- ALAS2-2023-2268
- ALPINE:CVE-2023-20593
- ALSA-2023:5068
- ALSA-2023:5069
- ALSA-2023:5244
- ALSA-2023:5245
- DSA-5448-1
- DSA-5459-1
- DSA-5461-1
- DSA-5462-1
- ELSA-2023-12654
- ELSA-2023-12655
- ELSA-2023-12656
- ELSA-2023-12657
- ELSA-2023-12689
- ELSA-2023-12690
- ELSA-2023-12691
- ELSA-2023-12692
- ELSA-2023-12836
- ELSA-2023-4819
- ELSA-2023-5068
- ELSA-2023-5069
- FEDORA-2023-04473fc41e
- FEDORA-2023-0d6aa10621
- FEDORA-2023-7228464f28
- RHSA-2023:4819
- RHSA-2023:4821
- RHSA-2023:5068
- RHSA-2023:5069
- RHSA-2023:5091
- RHSA-2023:5093
- RHSA-2023:5221
- RHSA-2023:5244
- RHSA-2023:5245
- RHSA-2023:5255
- RHSA-2023:7513
- RLSA-2023:5244
- SSA:2023-205-01
- SSA:2023-325-01
- SUSE-SU-2023:2986-1
- SUSE-SU-2023:3001-1
- SUSE-SU-2023:3006-1
- SUSE-SU-2023:3019-1
- SUSE-SU-2023:3020-1
- SUSE-SU-2023:3022-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3206-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- SUSE-SU-2023:3903-1
- SUSE-SU-2023:4166-1
- SUSE-SU-2023:4175-1
- SUSE-SU-2023:4201-1
- SUSE-SU-2023:4219-1
- SUSE-SU-2023:4239-1
- SUSE-SU-2023:4245-1
- SUSE-SU-2023:4267-1
- SUSE-SU-2023:4279-1
- SUSE-SU-2023:4285-1
- SUSE-SU-2023:4308-1
- SUSE-SU-2023:4326-1
- SUSE-SU-2024:0884-1
- SUSE-SU-2024:0885-1
- USN-6244-1
- USN-6246-1
- USN-6250-1
- USN-6251-1
- USN-6252-1
- USN-6254-1
- USN-6255-1
- USN-6260-1
- USN-6261-1
- USN-6285-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6342-1
- USN-6342-2
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6532-1
- XSA-433
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2023-12839 | https://linux.oracle.com/errata/ELSA-2023-12839.html | |
CVE | CVE-2023-3390 | https://linux.oracle.com/cve/CVE-2023-3390.html | |
CVE | CVE-2023-20593 | https://linux.oracle.com/cve/CVE-2023-20593.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/python3-perf?distro=oraclelinux-8.8 | oraclelinux | python3-perf | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/perf?distro=oraclelinux-8.8 | oraclelinux | perf | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel?distro=oraclelinux-8.8 | oraclelinux | kernel | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools?distro=oraclelinux-8.8 | oraclelinux | kernel-tools | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs?distro=oraclelinux-8.8 | oraclelinux | kernel-tools-libs | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-tools-libs-devel?distro=oraclelinux-8.8 | oraclelinux | kernel-tools-libs-devel | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules?distro=oraclelinux-8.8 | oraclelinux | kernel-modules | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-modules-extra?distro=oraclelinux-8.8 | oraclelinux | kernel-modules-extra | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-headers?distro=oraclelinux-8.8 | oraclelinux | kernel-headers | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-doc?distro=oraclelinux-8.8 | oraclelinux | kernel-doc | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-devel?distro=oraclelinux-8.8 | oraclelinux | kernel-devel | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug?distro=oraclelinux-8.8 | oraclelinux | kernel-debug | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules?distro=oraclelinux-8.8 | oraclelinux | kernel-debug-modules | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-modules-extra?distro=oraclelinux-8.8 | oraclelinux | kernel-debug-modules-extra | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-devel?distro=oraclelinux-8.8 | oraclelinux | kernel-debug-devel | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-debug-core?distro=oraclelinux-8.8 | oraclelinux | kernel-debug-core | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-cross-headers?distro=oraclelinux-8.8 | oraclelinux | kernel-cross-headers | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-core?distro=oraclelinux-8.8 | oraclelinux | kernel-core | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/kernel-abi-stablelists?distro=oraclelinux-8.8 | oraclelinux | kernel-abi-stablelists | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 | ||
Affected | pkg:rpm/oraclelinux/bpftool?distro=oraclelinux-8.8 | oraclelinux | bpftool | < 4.18.0-477.27.1.el8_8 | oraclelinux-8.8 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |