Oracle Linux 6278 Published by

A kernel security, bug fix, and enhancement update has been released for Oracle Linux 9.



ELSA-2023-5069 Important: Oracle Linux 9 kernel security, bug fix, and enhancement update


Oracle Linux Security Advisory ELSA-2023-5069

http://linux.oracle.com/errata/ELSA-2023-5069.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
bpftool-7.0.0-284.30.0.1.el9_2.x86_64.rpm
kernel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-abi-stablelists-5.14.0-284.30.0.1.el9_2.noarch.rpm
kernel-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-doc-5.14.0-284.30.0.1.el9_2.noarch.rpm
kernel-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.30.0.1.el9_2.x86_64.rpm
perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm
python3-perf-5.14.0-284.30.0.1.el9_2.x86_64.rpm
rtla-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.30.0.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.x86_64.rpm

aarch64:
bpftool-7.0.0-284.30.0.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.30.0.1.el9_2.aarch64.rpm
perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm
python3-perf-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.30.0.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.30.0.1.el9_2.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//kernel-5.14.0-284.30.0.1.el9_2.src.rpm

Related CVEs:

CVE-2023-1637
CVE-2023-3390
CVE-2023-3610
CVE-2023-3776
CVE-2023-4004
CVE-2023-4147
CVE-2023-21102
CVE-2023-31248
CVE-2023-35001

Description of changes:

- [5.14.0-284.30.0.1.el9_2.OL9]
- x86/tsx: Add a feature bit for TSX control MSR support {CVE-2023-1637}
- x86/speculation: Restore speculation related MSRs {CVE-2023-1637}
- x86/pm: Save the MSR validity status at context setup {CVE-2023-1637}
- x86/pm: Fix false positive kmemleak report in msr_build_context() {CVE-2023-1637}
- x86/cpu: Restore AMD's DE_CFG MSR after resume {CVE-2023-1637}
- x86/pm: Add enumeration check before spec MSRs {CVE-2023-1637}
- arm64: efi: Execute runtime services from a dedicated {CVE-2023-21102}
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain {CVE-2023-3390}
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails {CVE-2023-3390}
- netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID {CVE-2023-4147}
- netfilter: nf_tables: do not ignore genmask when looking up chain by id {CVE-2023-31248}
- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval {CVE-2023-35001}
- netfilter: nft_set_pipapo: fix improper element removal {CVE-2023-4004}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}