Oracle Linux 6315 Published by

Oracle Linux has received multiple security enhancements, bug fixes, and improvements across various operating system versions. The updates come with bug fixes for webkit2gtk3, grub2, microcode_ctl, go-toolset:ol8, delve, and golang, as well as oVirt 4.5 ovirt-ansible-collection.

ELBA-2025-3742 Oracle Linux 9 .NET 9.0 bug fix and enhancement update
ELSA-2025-3713 Important: Oracle Linux 9 webkit2gtk3 security update
ELBA-2025-3712 Oracle Linux 9 .NET 8.0 bug fix and enhancement update
ELSA-2025-3367 Important: Oracle Linux 8 grub2 security update
ELEA-2025-3114 Oracle Linux 8 microcode_ctl bug fix and enhancement update
ELBA-2025-3741 Oracle Linux 8 .NET 9.0 bug fix and enhancement update
ELBA-2025-3711 Oracle Linux 8 .NET 8.0 bug fix and enhancement update
ELBA-2025-2991 Oracle Linux 9 microcode_ctl bug fix and enhancement update
ELSA-2025-3772 Moderate: Oracle Linux 8 go-toolset:ol8 security update
ELSA-2025-3773 Important: Oracle Linux 9 delve and golang security update
ELBA-2025-20206 Oracle Linux 8 oVirt 4.5 ovirt-ansible-collection bug fix update




ELBA-2025-3742 Oracle Linux 9 .NET 9.0 bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2025-3742

http://linux.oracle.com/errata/ELBA-2025-3742.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-host-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el9_5.x86_64.rpm

aarch64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-host-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el9_5.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//dotnet9.0-9.0.105-1.0.1.el9_5.src.rpm

Description of changes:

[9.0.105-1.0.1]
- Add support for Oracle Linux

[9.0.105-1]
- Update to .NET SDK 9.0.105 and Runtime 9.0.4
- Resolves: RHEL-85288



ELSA-2025-3713 Important: Oracle Linux 9 webkit2gtk3 security update


Oracle Linux Security Advisory ELSA-2025-3713

http://linux.oracle.com/errata/ELSA-2025-3713.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
webkit2gtk3-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm

aarch64:
webkit2gtk3-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//webkit2gtk3-2.48.1-1.el9_5.src.rpm

Related CVEs:

CVE-2024-44192
CVE-2024-54467
CVE-2024-54551
CVE-2025-24208
CVE-2025-24209
CVE-2025-24216
CVE-2025-30427

Description of changes:

[2.48.1-1]
- Update to 2.48.1

[2.48.0-1]
- Update to 2.48.0



ELBA-2025-3712 Oracle Linux 9 .NET 8.0 bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2025-3712

http://linux.oracle.com/errata/ELBA-2025-3712.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el9_5.x86_64.rpm

aarch64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el9_5.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//dotnet8.0-8.0.115-1.0.1.el9_5.src.rpm

Description of changes:

[8.0.115-1.0.1]
- Add support for Oracle Linux

[8.0.115-1]
- Update to .NET SDK 8.0.115 and Runtime 8.0.15
- Resolves: RHEL-85287



ELSA-2025-3367 Important: Oracle Linux 8 grub2 security update


Oracle Linux Security Advisory ELSA-2025-3367

http://linux.oracle.com/errata/ELSA-2025-3367.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
grub2-common-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-aa64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-ia32-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-ia32-cdboot-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-ia32-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-x64-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-x64-cdboot-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-x64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-pc-2.02-162.0.2.el8_10.x86_64.rpm
grub2-pc-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-tools-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-efi-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-extra-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-minimal-2.02-162.0.2.el8_10.x86_64.rpm

aarch64:
grub2-common-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-aa64-2.02-162.0.2.el8_10.aarch64.rpm
grub2-efi-aa64-cdboot-2.02-162.0.2.el8_10.aarch64.rpm
grub2-efi-aa64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-ia32-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-x64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-pc-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-tools-2.02-162.0.2.el8_10.aarch64.rpm
grub2-tools-extra-2.02-162.0.2.el8_10.aarch64.rpm
grub2-tools-minimal-2.02-162.0.2.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//grub2-2.02-162.0.2.el8_10.src.rpm

Related CVEs:

CVE-2025-0624

Description of changes:

[2.02-162.0.2]
- Update grub2 dependencies to match new Secure Boot certificate chain of trust [Orabug: 37766761]
- Fix typo in SBAT metadata [Orabug: 37693946]
- Allow installation of grub2 only with shim-aa64 that allows booting it [Orabug: 37693946]

[2.02-162.0.1]
- net/dns: Fix removal of DNS server [Orabug: 37539625]
- net/dns: Simplify error handling of recv_hook() function [Orabug: 37539625]
- net/dns: Add debugging messages in recv_hook() function [Orabug: 37539625]
- net/dns: Fix lookup error when no IPv6 is returned [Orabug: 37539625]
- Use correct os_name on OL
- Backport the support for setting custom kernels as default kernels [Orabug: 36690061]
- Restore correct SBAT entries
- Replaced bugzilla.oracle.com references [Orabug: 35475894]
- efinet: Close and reopen card on failure [Orabug: 35126950]
- Fix CVE-2022-3775 [Orabug: 34867710]
- Bump SBAT metadata for grub to 3 [Orabug: 34871758]
- Enable signing on aarch64
- Don't try to switch to a BLS config if GRUB_ENABLE_BLSCFG is already set (Javier Martinez Canillas) [Orabug: 34375996]
- Enable back btrfs module by default [Orabug: 34377188]
- Backport upstream SNP protocol fixes [Orabug: 34195100]
- Rebase Fix EFI loader kernel image allocation patch, adapt it to new NX code [Orabug: 34352232]
- enable multiboot2 [Orabug: 34285558]
- backport arm64: Fix EFI loader kernel image allocation [Orabug: 33702462]
- backport Arm: check for the PE magic for the compiled arch [Orabug: 33702462]
- Backport some better script logic for BTRFS support [Orabug: 32448171]
- Do not add shim and grub certificate deps for aarch64 packages [Orabug: 32670033]
- Update Oracle SBAT data [Orabug: 32670033]
- Use new signing certificate [Orabug: 32670033]
- Fix various coverity issues [Orabug: 32530657]
- Set proper blsdir if /boot is on btrfs rootfs [Orabug: 32063327]
- Add CVE-2020-15706, CVE-2020-15707 to the list [Orabug: 31225072]
- honor /etc/sysconfig/kernel DEFAULTKERNEL setting for BLS [Orabug: 30643497]
- set EFIDIR as redhat for additional grub2 tools [Orabug: 29875597]
- Update upstream references [Orabug: 26388226]
- Insert Unbreakable Enterprise Kernel text into BLS config file [Orabug: 29417955]
- fix symlink removal scriptlet, to be executed only on removal [Orabug: 19231481]
- Fix comparison in patch for 18504756
- Remove symlink to grub environment file during uninstall on EFI platforms [Orabug: 19231481]
- Put "with" in menuentry instead of "using" [Orabug: 18504756]
- Use different titles for UEK and RHCK kernels [Orabug: 18504756]

[2.02-162]
- ieee1275/ofnet: Fix grub_malloc() removed after added safe
- Remove 'fs/ntfs: Implement attribute verification' patch
- Related: #RHEL-79837

[2.02-161]
- Add Several CVE fixes
- Resolves CVE-2024-45775 CVE-2025-0624
- Resolves: #RHEL-75735
- Resolves: #RHEL-79837



ELEA-2025-3114 Oracle Linux 8 microcode_ctl bug fix and enhancement update


Oracle Linux Enhancement Advisory ELEA-2025-3114

http://linux.oracle.com/errata/ELEA-2025-3114.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
microcode_ctl-20250211-1.0.1.el8_10.x86_64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//microcode_ctl-20250211-1.0.1.el8_10.src.rpm

Description of changes:

[4:20250211-1.0.1]
- enable use with ueknext and UEK8 kernels
- don't bother calling dracut if virtualized [Orabug: 35710077]
- ensure UEK also rebuilds initramfs [Orabug: 34280058]
- add support for UEK7 kernels
- enable early update for 06-4f-01
- remove no longer appropriate caveats for 06-2d-07 and 06-55-04
- enable early and late load on RHCK

[4:20250211-1]
- Update Intel CPU microcode to microcode-20250211 release, addresses
CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047,
CVE-2024-28127, CVE-2024-29214, CVE-2024-31068, CVE-2024-31157,
CVE-2024-37020, CVE-2024-39279, CVE-2024-39355, CVE-2024-36293 (RHEL-79195,
RHEL-79197, RHEL-79198, RHEL-79213, RHEL-79216):
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-af-03/0x01 (SRF-SP C0) microcode at revision 0x3000330;
- Addition of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) at
revision 0x12c;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf8 up
to 0xfa;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0x100 up
to 0x102;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003e7
up to 0xd0003f5;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002b0
up to 0x10002c0;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-05) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode from revision 0x2c000390 up to
0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x37
up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x435 up to 0x436;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x435 up to 0x436;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x435 up to 0x436;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x7 up
to 0x9;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x435
up to 0x436;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x62 up
to 0x63;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12b up
to 0x12c;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4123
up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode from revision 0x4123 up to 0x4124;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1a up
to 0x1c;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000283
up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000283
up to 0x21000291.

[4:20241112-1]
- Update Intel CPU microcode to microcode-20241112 release, addresses
CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984 (RHEL-67344):
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36
up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434
up to 0x435;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f
up to 0x20;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up
to 0x12b;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122
up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230
up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230
up to 0x21000283.



ELBA-2025-3741 Oracle Linux 8 .NET 9.0 bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2025-3741

http://linux.oracle.com/errata/ELBA-2025-3741.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-host-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el8_10.x86_64.rpm

aarch64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-host-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//dotnet9.0-9.0.105-1.0.1.el8_10.src.rpm

Description of changes:

[9.0.105-1.0.1]
- Add support for Oracle Linux

[9.0.105-1]
- Update to .NET SDK 9.0.105 and Runtime 9.0.4
- Resolves: RHEL-85279



ELBA-2025-3711 Oracle Linux 8 .NET 8.0 bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2025-3711

http://linux.oracle.com/errata/ELBA-2025-3711.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el8_10.x86_64.rpm

aarch64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el8_10.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//dotnet8.0-8.0.115-1.0.1.el8_10.src.rpm

Description of changes:

[8.0.115-1.0.1]
- Add support for Oracle Linux

[8.0.115-1]
- Update to .NET SDK 8.0.115 and Runtime 8.0.15
- Resolves: RHEL-85273



ELBA-2025-2991 Oracle Linux 9 microcode_ctl bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2025-2991

http://linux.oracle.com/errata/ELBA-2025-2991.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
microcode_ctl-20240910-1.20250211.1.0.1.el9_5.noarch.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//microcode_ctl-20240910-1.20250211.1.0.1.el9_5.src.rpm

Description of changes:

[20240910-1.20250211.1.0.1]
- enable use with ueknext and UEK8 kernels
- don't bother calling dracut if virtualized [Orabug: 35710094]
- ensure UEK also rebuilds initramfs [Orabug: 34280058]
- add support for UEK7 kernels
- enable early update for 06-4f-01
- remove no longer appropriate caveats for 06-2d-07 and 06-55-04
- enable early and late load on RHCK

[4:20240910-1.20250211.1]
- Update Intel CPU microcode to microcode-20250211 release, addresses
CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047,
CVE-2024-28127, CVE-2024-29214, CVE-2024-31068, CVE-2024-31157,
CVE-2024-37020, CVE-2024-39279, CVE-2024-39355, CVE-2024-36293 (RHEL-79223,
RHEL-79224, RHEL-79225, RHEL-79237, RHEL-79241):
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-af-03/0x01 (SRF-SP C0) microcode at revision 0x3000330;
- Addition of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) at
revision 0x12c;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf8 up
to 0xfa;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0x100 up
to 0x102;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003e7
up to 0xd0003f5;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002b0
up to 0x10002c0;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-05) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode from revision 0x2c000390 up to
0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x37
up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x435 up to 0x436;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x435 up to 0x436;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x435 up to 0x436;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x7 up
to 0x9;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x435
up to 0x436;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x62 up
to 0x63;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12b up
to 0x12c;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4123
up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode from revision 0x4123 up to 0x4124;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1a up
to 0x1c;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000283
up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000283
up to 0x21000291.

[4:20240910-1.20241112.1]
- Update Intel CPU microcode to microcode-20241112 release, addresses
CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984 (RHEL-76084):
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36
up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434
up to 0x435;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f
up to 0x20;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up
to 0x12b;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122
up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230
up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230
up to 0x21000283.



ELSA-2025-3772 Moderate: Oracle Linux 8 go-toolset:ol8 security update


Oracle Linux Security Advisory ELSA-2025-3772

http://linux.oracle.com/errata/ELSA-2025-3772.html

The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

x86_64:
delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-bin-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-docs-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-misc-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-src-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-tests-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm

aarch64:
delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-bin-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-docs-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-misc-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-src-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-tests-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates//golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates//go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.src.rpm

Related CVEs:

CVE-2024-45336
CVE-2024-45341

Description of changes:

delve
[1.24.1-1.0.1]
- Disable DWARF compression which has issues (Alex Burmashev)

[1.24.1-1]
- Rebase to 1.24.1
- Skip unsupported tests
- Resolves: RHEL-83451

golang
[1.23.6-1]
- Update to Go 1.23.6
- Resolves: RHEL-83824

[1.22.11-1]
- Rebase to Go1.22.11 to pick up fixes for CVE 2024-45341 and 2024-45336
- Fix test failures with expired certificates
- Resolves: RHEL-73752

[1.22.9-2]
- Remove bundled boringcrypto blob
- Resolves: RHEL-54338

go-toolset
[1.23.6-1]
- Update to Go 1.23.6
- Resolves: RHEL-83824

[1.22.11-1]
- Rebase to Go1.22.11 to pick up fixes for CVEs 2024-45341 and 2024-45336
- Go rebase addresses test failures with expired certificates
- Resolves: RHEL-73752



ELSA-2025-3773 Important: Oracle Linux 9 delve and golang security update


Oracle Linux Security Advisory ELSA-2025-3773

http://linux.oracle.com/errata/ELSA-2025-3773.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
delve-1.24.1-2.0.1.el9_5.x86_64.rpm
go-toolset-1.23.6-2.el9_5.x86_64.rpm
golang-1.23.6-2.el9_5.x86_64.rpm
golang-bin-1.23.6-2.el9_5.x86_64.rpm
golang-docs-1.23.6-2.el9_5.noarch.rpm
golang-misc-1.23.6-2.el9_5.noarch.rpm
golang-race-1.23.6-2.el9_5.x86_64.rpm
golang-src-1.23.6-2.el9_5.noarch.rpm
golang-tests-1.23.6-2.el9_5.noarch.rpm

aarch64:
delve-1.24.1-2.0.1.el9_5.aarch64.rpm
go-toolset-1.23.6-2.el9_5.aarch64.rpm
golang-1.23.6-2.el9_5.aarch64.rpm
golang-bin-1.23.6-2.el9_5.aarch64.rpm
golang-docs-1.23.6-2.el9_5.noarch.rpm
golang-misc-1.23.6-2.el9_5.noarch.rpm
golang-race-1.23.6-2.el9_5.aarch64.rpm
golang-src-1.23.6-2.el9_5.noarch.rpm
golang-tests-1.23.6-2.el9_5.noarch.rpm

SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//delve-1.24.1-2.0.1.el9_5.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates//golang-1.23.6-2.el9_5.src.rpm

Related CVEs:

CVE-2024-34156

Description of changes:

delve
[1.24.1-2.0.1]
- Disable DWARF compression which has issues (Alex Burmashev)

[1.24.1-2]
- Fix 3 test failures
- Resolves: RHEL-83939
- Resolves: RHEL-83958
- Resolves: RHEL-7373

[1.24.1-1]
- Rebase to Delve 1.24.1
- Resolves: RHEL-64445

golang
[1.23.6-2]
- Fix runtime usleep issue on s390x (runtime-usleep-s390x.patch)
- Resolves: RHEL-81242

[1.23.6-1]
- Update to Go 1.23.6 (fips-1)
- Resolves: RHEL-80344

[1.23.4-1]
- Update to Go 1.23.4 (fips-1)
- Resolves: RHEL-61048
- Resolves: RHEL-61223

[1.23.2-1]
- Rebase to Go1.23.2
- Remove fix standard crypto panic patch as the source already has changes
- Resolves: RHEL-62392



ELBA-2025-20206 Oracle Linux 8 oVirt 4.5 ovirt-ansible-collection bug fix update


Oracle Linux Bug Fix Advisory ELBA-2025-20206

http://linux.oracle.com/errata/ELBA-2025-20206.html

The following updated rpms for Oracle Linux 8 oVirt 4.5 have been uploaded to the Unbreakable Linux Network:

x86_64:
ovirt-ansible-collection-3.2.0-1.21.el8.noarch.rpm

SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//ovirt-ansible-collection-3.2.0-1.21.el8.src.rpm

Description of changes:

[3.2.0-1.21]
- Fix SHE termination failures