Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2023-12836

Опубликовано: 25 сент. 2023
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2023-12836: kernel security update (IMPORTANT)

[5.14.0-284.30.1.el9_2]

  • x86/microcode/intel: Expose collect_cpu_info_early() for IFS
  • x86/cpu: Load microcode during restore_processor_state()
  • x86/microcode: Rip out the OLD_INTERFACE
  • x86/microcode: Default-disable late loading
  • x86/microcode: Taint and warn on late loading
  • x86/microcode: Remove unnecessary perf callback
  • x86/microcode: Print previous version of microcode after reload
  • x86/microcode: Rip out the subsys interface gunk
  • x86/microcode: Simplify init path even more
  • x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593}
  • x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593}
  • x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}
  • x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}
  • x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}
  • x86/microcode: Remove ->request_microcode_user()
  • x86/microcode: Kill refresh_fw
  • x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}
  • x86/microcode: Drop struct ucode_cpu_info.valid
  • x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}
  • x86/microcode/AMD: Track patch allocation size explicitly
  • x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}
  • x86/microcode/core: Return an error only when necessary {CVE-2023-20593}
  • x86/apic: Don't disable x2APIC if locked
  • x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}
  • x86/cpu: Remove redundant extern x86_read_arch_cap_msr()
  • x86/cpu, kvm: Add support for CPUID_80000021_EAX
  • KVM: x86: Advertise that the SMM_CTL MSR is not supported
  • KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
  • x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
  • x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
  • x86/cpu: Support AMD Automatic IBRS
  • x86/CPU/AMD: Make sure EFER[AIBRSE] is set
  • x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

bpftool

7.0.0-284.30.1.el9_2

kernel-cross-headers

5.14.0-284.30.1.el9_2

kernel-headers

5.14.0-284.30.1.el9_2

kernel-tools

5.14.0-284.30.1.el9_2

kernel-tools-libs

5.14.0-284.30.1.el9_2

kernel-tools-libs-devel

5.14.0-284.30.1.el9_2

perf

5.14.0-284.30.1.el9_2

python3-perf

5.14.0-284.30.1.el9_2

Oracle Linux x86_64

bpftool

7.0.0-284.30.1.el9_2

kernel

5.14.0-284.30.1.el9_2

kernel-abi-stablelists

5.14.0-284.30.1.el9_2

kernel-core

5.14.0-284.30.1.el9_2

kernel-cross-headers

5.14.0-284.30.1.el9_2

kernel-debug

5.14.0-284.30.1.el9_2

kernel-debug-core

5.14.0-284.30.1.el9_2

kernel-debug-devel

5.14.0-284.30.1.el9_2

kernel-debug-devel-matched

5.14.0-284.30.1.el9_2

kernel-debug-modules

5.14.0-284.30.1.el9_2

kernel-debug-modules-core

5.14.0-284.30.1.el9_2

kernel-debug-modules-extra

5.14.0-284.30.1.el9_2

kernel-debug-uki-virt

5.14.0-284.30.1.el9_2

kernel-devel

5.14.0-284.30.1.el9_2

kernel-devel-matched

5.14.0-284.30.1.el9_2

kernel-doc

5.14.0-284.30.1.el9_2

kernel-headers

5.14.0-284.30.1.el9_2

kernel-modules

5.14.0-284.30.1.el9_2

kernel-modules-core

5.14.0-284.30.1.el9_2

kernel-modules-extra

5.14.0-284.30.1.el9_2

kernel-tools

5.14.0-284.30.1.el9_2

kernel-tools-libs

5.14.0-284.30.1.el9_2

kernel-tools-libs-devel

5.14.0-284.30.1.el9_2

kernel-uki-virt

5.14.0-284.30.1.el9_2

perf

5.14.0-284.30.1.el9_2

python3-perf

5.14.0-284.30.1.el9_2

rtla

5.14.0-284.30.1.el9_2

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.

CVSS3: 7.8
redhat
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.

CVSS3: 7.8
nvd
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 2 года назад

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tab ...