ELBA-2025-3742 Oracle Linux 9 .NET 9.0 bug fix and enhancement update
ELSA-2025-3713 Important: Oracle Linux 9 webkit2gtk3 security update
ELBA-2025-3712 Oracle Linux 9 .NET 8.0 bug fix and enhancement update
ELSA-2025-3367 Important: Oracle Linux 8 grub2 security update
ELEA-2025-3114 Oracle Linux 8 microcode_ctl bug fix and enhancement update
ELBA-2025-3741 Oracle Linux 8 .NET 9.0 bug fix and enhancement update
ELBA-2025-3711 Oracle Linux 8 .NET 8.0 bug fix and enhancement update
ELBA-2025-2991 Oracle Linux 9 microcode_ctl bug fix and enhancement update
ELSA-2025-3772 Moderate: Oracle Linux 8 go-toolset:ol8 security update
ELSA-2025-3773 Important: Oracle Linux 9 delve and golang security update
ELBA-2025-20206 Oracle Linux 8 oVirt 4.5 ovirt-ansible-collection bug fix update
ELBA-2025-3742 Oracle Linux 9 .NET 9.0 bug fix and enhancement update
Oracle Linux Bug Fix Advisory ELBA-2025-3742
http://linux.oracle.com/errata/ELBA-2025-3742.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-host-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el9_5.x86_64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el9_5.x86_64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el9_5.x86_64.rpm
aarch64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-host-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el9_5.aarch64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el9_5.aarch64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el9_5.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//dotnet9.0-9.0.105-1.0.1.el9_5.src.rpm
Description of changes:
[9.0.105-1.0.1]
- Add support for Oracle Linux
[9.0.105-1]
- Update to .NET SDK 9.0.105 and Runtime 9.0.4
- Resolves: RHEL-85288
ELSA-2025-3713 Important: Oracle Linux 9 webkit2gtk3 security update
Oracle Linux Security Advisory ELSA-2025-3713
http://linux.oracle.com/errata/ELSA-2025-3713.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
webkit2gtk3-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm
aarch64:
webkit2gtk3-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-devel-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-jsc-2.48.1-1.el9_5.aarch64.rpm
webkit2gtk3-jsc-devel-2.48.1-1.el9_5.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//webkit2gtk3-2.48.1-1.el9_5.src.rpm
Related CVEs:
CVE-2024-44192
CVE-2024-54467
CVE-2024-54551
CVE-2025-24208
CVE-2025-24209
CVE-2025-24216
CVE-2025-30427
Description of changes:
[2.48.1-1]
- Update to 2.48.1
[2.48.0-1]
- Update to 2.48.0
ELBA-2025-3712 Oracle Linux 9 .NET 8.0 bug fix and enhancement update
Oracle Linux Bug Fix Advisory ELBA-2025-3712
http://linux.oracle.com/errata/ELBA-2025-3712.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el9_5.x86_64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el9_5.x86_64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el9_5.x86_64.rpm
aarch64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el9_5.aarch64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el9_5.aarch64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el9_5.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//dotnet8.0-8.0.115-1.0.1.el9_5.src.rpm
Description of changes:
[8.0.115-1.0.1]
- Add support for Oracle Linux
[8.0.115-1]
- Update to .NET SDK 8.0.115 and Runtime 8.0.15
- Resolves: RHEL-85287
ELSA-2025-3367 Important: Oracle Linux 8 grub2 security update
Oracle Linux Security Advisory ELSA-2025-3367
http://linux.oracle.com/errata/ELSA-2025-3367.html
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
x86_64:
grub2-common-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-aa64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-ia32-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-ia32-cdboot-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-ia32-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-x64-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-x64-cdboot-2.02-162.0.2.el8_10.x86_64.rpm
grub2-efi-x64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-pc-2.02-162.0.2.el8_10.x86_64.rpm
grub2-pc-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-tools-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-efi-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-extra-2.02-162.0.2.el8_10.x86_64.rpm
grub2-tools-minimal-2.02-162.0.2.el8_10.x86_64.rpm
aarch64:
grub2-common-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-aa64-2.02-162.0.2.el8_10.aarch64.rpm
grub2-efi-aa64-cdboot-2.02-162.0.2.el8_10.aarch64.rpm
grub2-efi-aa64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-ia32-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-efi-x64-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-pc-modules-2.02-162.0.2.el8_10.noarch.rpm
grub2-tools-2.02-162.0.2.el8_10.aarch64.rpm
grub2-tools-extra-2.02-162.0.2.el8_10.aarch64.rpm
grub2-tools-minimal-2.02-162.0.2.el8_10.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//grub2-2.02-162.0.2.el8_10.src.rpm
Related CVEs:
CVE-2025-0624
Description of changes:
[2.02-162.0.2]
- Update grub2 dependencies to match new Secure Boot certificate chain of trust [Orabug: 37766761]
- Fix typo in SBAT metadata [Orabug: 37693946]
- Allow installation of grub2 only with shim-aa64 that allows booting it [Orabug: 37693946]
[2.02-162.0.1]
- net/dns: Fix removal of DNS server [Orabug: 37539625]
- net/dns: Simplify error handling of recv_hook() function [Orabug: 37539625]
- net/dns: Add debugging messages in recv_hook() function [Orabug: 37539625]
- net/dns: Fix lookup error when no IPv6 is returned [Orabug: 37539625]
- Use correct os_name on OL
- Backport the support for setting custom kernels as default kernels [Orabug: 36690061]
- Restore correct SBAT entries
- Replaced bugzilla.oracle.com references [Orabug: 35475894]
- efinet: Close and reopen card on failure [Orabug: 35126950]
- Fix CVE-2022-3775 [Orabug: 34867710]
- Bump SBAT metadata for grub to 3 [Orabug: 34871758]
- Enable signing on aarch64
- Don't try to switch to a BLS config if GRUB_ENABLE_BLSCFG is already set (Javier Martinez Canillas) [Orabug: 34375996]
- Enable back btrfs module by default [Orabug: 34377188]
- Backport upstream SNP protocol fixes [Orabug: 34195100]
- Rebase Fix EFI loader kernel image allocation patch, adapt it to new NX code [Orabug: 34352232]
- enable multiboot2 [Orabug: 34285558]
- backport arm64: Fix EFI loader kernel image allocation [Orabug: 33702462]
- backport Arm: check for the PE magic for the compiled arch [Orabug: 33702462]
- Backport some better script logic for BTRFS support [Orabug: 32448171]
- Do not add shim and grub certificate deps for aarch64 packages [Orabug: 32670033]
- Update Oracle SBAT data [Orabug: 32670033]
- Use new signing certificate [Orabug: 32670033]
- Fix various coverity issues [Orabug: 32530657]
- Set proper blsdir if /boot is on btrfs rootfs [Orabug: 32063327]
- Add CVE-2020-15706, CVE-2020-15707 to the list [Orabug: 31225072]
- honor /etc/sysconfig/kernel DEFAULTKERNEL setting for BLS [Orabug: 30643497]
- set EFIDIR as redhat for additional grub2 tools [Orabug: 29875597]
- Update upstream references [Orabug: 26388226]
- Insert Unbreakable Enterprise Kernel text into BLS config file [Orabug: 29417955]
- fix symlink removal scriptlet, to be executed only on removal [Orabug: 19231481]
- Fix comparison in patch for 18504756
- Remove symlink to grub environment file during uninstall on EFI platforms [Orabug: 19231481]
- Put "with" in menuentry instead of "using" [Orabug: 18504756]
- Use different titles for UEK and RHCK kernels [Orabug: 18504756]
[2.02-162]
- ieee1275/ofnet: Fix grub_malloc() removed after added safe
- Remove 'fs/ntfs: Implement attribute verification' patch
- Related: #RHEL-79837
[2.02-161]
- Add Several CVE fixes
- Resolves CVE-2024-45775 CVE-2025-0624
- Resolves: #RHEL-75735
- Resolves: #RHEL-79837
ELEA-2025-3114 Oracle Linux 8 microcode_ctl bug fix and enhancement update
Oracle Linux Enhancement Advisory ELEA-2025-3114
http://linux.oracle.com/errata/ELEA-2025-3114.html
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
x86_64:
microcode_ctl-20250211-1.0.1.el8_10.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//microcode_ctl-20250211-1.0.1.el8_10.src.rpm
Description of changes:
[4:20250211-1.0.1]
- enable use with ueknext and UEK8 kernels
- don't bother calling dracut if virtualized [Orabug: 35710077]
- ensure UEK also rebuilds initramfs [Orabug: 34280058]
- add support for UEK7 kernels
- enable early update for 06-4f-01
- remove no longer appropriate caveats for 06-2d-07 and 06-55-04
- enable early and late load on RHCK
[4:20250211-1]
- Update Intel CPU microcode to microcode-20250211 release, addresses
CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047,
CVE-2024-28127, CVE-2024-29214, CVE-2024-31068, CVE-2024-31157,
CVE-2024-37020, CVE-2024-39279, CVE-2024-39355, CVE-2024-36293 (RHEL-79195,
RHEL-79197, RHEL-79198, RHEL-79213, RHEL-79216):
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-af-03/0x01 (SRF-SP C0) microcode at revision 0x3000330;
- Addition of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) at
revision 0x12c;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf8 up
to 0xfa;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0x100 up
to 0x102;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003e7
up to 0xd0003f5;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002b0
up to 0x10002c0;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-05) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode from revision 0x2c000390 up to
0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x37
up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x435 up to 0x436;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x435 up to 0x436;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x435 up to 0x436;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x7 up
to 0x9;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x435
up to 0x436;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x62 up
to 0x63;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12b up
to 0x12c;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4123
up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode from revision 0x4123 up to 0x4124;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1a up
to 0x1c;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000283
up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000283
up to 0x21000291.
[4:20241112-1]
- Update Intel CPU microcode to microcode-20241112 release, addresses
CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984 (RHEL-67344):
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36
up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434
up to 0x435;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f
up to 0x20;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up
to 0x12b;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122
up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230
up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230
up to 0x21000283.
ELBA-2025-3741 Oracle Linux 8 .NET 9.0 bug fix and enhancement update
Oracle Linux Bug Fix Advisory ELBA-2025-3741
http://linux.oracle.com/errata/ELBA-2025-3741.html
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
x86_64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-host-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el8_10.x86_64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el8_10.x86_64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el8_10.x86_64.rpm
aarch64:
aspnetcore-runtime-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
aspnetcore-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
aspnetcore-targeting-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-apphost-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-host-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-hostfxr-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-dbg-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-aot-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-dbg-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-targeting-pack-9.0-9.0.4-1.0.1.el8_10.aarch64.rpm
dotnet-templates-9.0-9.0.105-1.0.1.el8_10.aarch64.rpm
netstandard-targeting-pack-2.1-9.0.105-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-9.0-source-built-artifacts-9.0.105-1.0.1.el8_10.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//dotnet9.0-9.0.105-1.0.1.el8_10.src.rpm
Description of changes:
[9.0.105-1.0.1]
- Add support for Oracle Linux
[9.0.105-1]
- Update to .NET SDK 9.0.105 and Runtime 9.0.4
- Resolves: RHEL-85279
ELBA-2025-3711 Oracle Linux 8 .NET 8.0 bug fix and enhancement update
Oracle Linux Bug Fix Advisory ELBA-2025-3711
http://linux.oracle.com/errata/ELBA-2025-3711.html
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
x86_64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el8_10.x86_64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el8_10.x86_64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el8_10.x86_64.rpm
aarch64:
aspnetcore-runtime-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
aspnetcore-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
aspnetcore-targeting-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-apphost-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-hostfxr-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-runtime-dbg-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-dbg-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-targeting-pack-8.0-8.0.15-1.0.1.el8_10.aarch64.rpm
dotnet-templates-8.0-8.0.115-1.0.1.el8_10.aarch64.rpm
dotnet-sdk-8.0-source-built-artifacts-8.0.115-1.0.1.el8_10.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//dotnet8.0-8.0.115-1.0.1.el8_10.src.rpm
Description of changes:
[8.0.115-1.0.1]
- Add support for Oracle Linux
[8.0.115-1]
- Update to .NET SDK 8.0.115 and Runtime 8.0.15
- Resolves: RHEL-85273
ELBA-2025-2991 Oracle Linux 9 microcode_ctl bug fix and enhancement update
Oracle Linux Bug Fix Advisory ELBA-2025-2991
http://linux.oracle.com/errata/ELBA-2025-2991.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
microcode_ctl-20240910-1.20250211.1.0.1.el9_5.noarch.rpm
SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//microcode_ctl-20240910-1.20250211.1.0.1.el9_5.src.rpm
Description of changes:
[20240910-1.20250211.1.0.1]
- enable use with ueknext and UEK8 kernels
- don't bother calling dracut if virtualized [Orabug: 35710094]
- ensure UEK also rebuilds initramfs [Orabug: 34280058]
- add support for UEK7 kernels
- enable early update for 06-4f-01
- remove no longer appropriate caveats for 06-2d-07 and 06-55-04
- enable early and late load on RHCK
[4:20240910-1.20250211.1]
- Update Intel CPU microcode to microcode-20250211 release, addresses
CVE-2023-34440, CVE-2023-43758, CVE-2024-24582, CVE-2024-28047,
CVE-2024-28127, CVE-2024-29214, CVE-2024-31068, CVE-2024-31157,
CVE-2024-37020, CVE-2024-39279, CVE-2024-39355, CVE-2024-36293 (RHEL-79223,
RHEL-79224, RHEL-79225, RHEL-79237, RHEL-79241):
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-97-05) at
revision 0x38;
- Addition of 06-af-03/0x01 (SRF-SP C0) microcode at revision 0x3000330;
- Addition of 06-b7-04/0x32 microcode (in intel-ucode/06-b7-01) at
revision 0x12c;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-02) at
revision 0x38;
- Addition of 06-bf-06/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Addition of 06-bf-07/0x07 microcode (in intel-ucode/06-bf-05) at
revision 0x38;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xf8 up
to 0xfa;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in
intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0x100 up
to 0x102;
- Update of 06-6a-06/0x87 (ICX-SP D0) microcode from revision 0xd0003e7
up to 0xd0003f5;
- Update of 06-6c-01/0x10 (ICL-D B0) microcode from revision 0x10002b0
up to 0x10002c0;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-05) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-05) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-06) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode from revision 0x2c000390 up to
0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b000603
up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode (in
intel-ucode/06-8f-06) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-04/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-05/0x10 (SPR-HBM B1) microcode (in
intel-ucode/06-8f-08) from revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-06/0x10 microcode (in intel-ucode/06-8f-08) from
revision 0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b000603 up to 0x2b000620;
- Update of 06-8f-08/0x10 (SPR-HBM B3) microcode from revision
0x2c000390 up to 0x2c0003e0;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b000603 up to 0x2b000620;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x37
up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x37 up to 0x38;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x435 up to 0x436;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x435 up to 0x436;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x435 up to 0x436;
- Update of 06-9a-04/0x40 (AZB A0) microcode from revision 0x7 up
to 0x9;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x435
up to 0x436;
- Update of 06-a7-01/0x02 (RKL-S B0) microcode from revision 0x62 up
to 0x63;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x12b up
to 0x12c;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4123
up to 0x4124;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4123 up to 0x4124;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4123 up to 0x4124;
- Update of 06-ba-08/0xe0 microcode from revision 0x4123 up to 0x4124;
- Update of 06-be-00/0x19 (ADL-N A0) microcode from revision 0x1a up
to 0x1c;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x37 up to 0x38;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x37 up to 0x38;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x37 up to 0x38;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x37 up
to 0x38;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000283
up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000283 up to 0x21000291;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000283
up to 0x21000291.
[4:20240910-1.20241112.1]
- Update Intel CPU microcode to microcode-20241112 release, addresses
CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984 (RHEL-76084):
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0
up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in
intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in
intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
- Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision
0x2b0005c0 up to 0x2b000603;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision
0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-97-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-97-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36
up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05)
from revision 0x36 up to 0x37;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision
0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in
intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
- Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in
intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
- Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434
up to 0x435;
- Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f
up to 0x20;
- Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up
to 0x12b;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision
0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122
up to 0x4123;
- Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from
revision 0x4122 up to 0x4123;
- Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in
intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
- Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02)
from revision 0x36 up to 0x37;
- Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in
intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
- Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05)
from revision 0x36 up to 0x37;
- Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up
to 0x37;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230
up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in
intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in
intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
- Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230
up to 0x21000283.
ELSA-2025-3772 Moderate: Oracle Linux 8 go-toolset:ol8 security update
Oracle Linux Security Advisory ELSA-2025-3772
http://linux.oracle.com/errata/ELSA-2025-3772.html
The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:
x86_64:
delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-bin-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
golang-docs-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-misc-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-src-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-tests-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.x86_64.rpm
aarch64:
delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-bin-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
golang-docs-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-misc-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-src-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
golang-tests-1.23.6-1.module+el8.10.0+90545+447bd9e4.noarch.rpm
go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//delve-1.24.1-1.0.1.module+el8.10.0+90545+447bd9e4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates//golang-1.23.6-1.module+el8.10.0+90545+447bd9e4.src.rpm
http://oss.oracle.com/ol8/SRPMS-updates//go-toolset-1.23.6-1.module+el8.10.0+90545+447bd9e4.src.rpm
Related CVEs:
CVE-2024-45336
CVE-2024-45341
Description of changes:
delve
[1.24.1-1.0.1]
- Disable DWARF compression which has issues (Alex Burmashev)
[1.24.1-1]
- Rebase to 1.24.1
- Skip unsupported tests
- Resolves: RHEL-83451
golang
[1.23.6-1]
- Update to Go 1.23.6
- Resolves: RHEL-83824
[1.22.11-1]
- Rebase to Go1.22.11 to pick up fixes for CVE 2024-45341 and 2024-45336
- Fix test failures with expired certificates
- Resolves: RHEL-73752
[1.22.9-2]
- Remove bundled boringcrypto blob
- Resolves: RHEL-54338
go-toolset
[1.23.6-1]
- Update to Go 1.23.6
- Resolves: RHEL-83824
[1.22.11-1]
- Rebase to Go1.22.11 to pick up fixes for CVEs 2024-45341 and 2024-45336
- Go rebase addresses test failures with expired certificates
- Resolves: RHEL-73752
ELSA-2025-3773 Important: Oracle Linux 9 delve and golang security update
Oracle Linux Security Advisory ELSA-2025-3773
http://linux.oracle.com/errata/ELSA-2025-3773.html
The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:
x86_64:
delve-1.24.1-2.0.1.el9_5.x86_64.rpm
go-toolset-1.23.6-2.el9_5.x86_64.rpm
golang-1.23.6-2.el9_5.x86_64.rpm
golang-bin-1.23.6-2.el9_5.x86_64.rpm
golang-docs-1.23.6-2.el9_5.noarch.rpm
golang-misc-1.23.6-2.el9_5.noarch.rpm
golang-race-1.23.6-2.el9_5.x86_64.rpm
golang-src-1.23.6-2.el9_5.noarch.rpm
golang-tests-1.23.6-2.el9_5.noarch.rpm
aarch64:
delve-1.24.1-2.0.1.el9_5.aarch64.rpm
go-toolset-1.23.6-2.el9_5.aarch64.rpm
golang-1.23.6-2.el9_5.aarch64.rpm
golang-bin-1.23.6-2.el9_5.aarch64.rpm
golang-docs-1.23.6-2.el9_5.noarch.rpm
golang-misc-1.23.6-2.el9_5.noarch.rpm
golang-race-1.23.6-2.el9_5.aarch64.rpm
golang-src-1.23.6-2.el9_5.noarch.rpm
golang-tests-1.23.6-2.el9_5.noarch.rpm
SRPMS:
http://oss.oracle.com/ol9/SRPMS-updates//delve-1.24.1-2.0.1.el9_5.src.rpm
http://oss.oracle.com/ol9/SRPMS-updates//golang-1.23.6-2.el9_5.src.rpm
Related CVEs:
CVE-2024-34156
Description of changes:
delve
[1.24.1-2.0.1]
- Disable DWARF compression which has issues (Alex Burmashev)
[1.24.1-2]
- Fix 3 test failures
- Resolves: RHEL-83939
- Resolves: RHEL-83958
- Resolves: RHEL-7373
[1.24.1-1]
- Rebase to Delve 1.24.1
- Resolves: RHEL-64445
golang
[1.23.6-2]
- Fix runtime usleep issue on s390x (runtime-usleep-s390x.patch)
- Resolves: RHEL-81242
[1.23.6-1]
- Update to Go 1.23.6 (fips-1)
- Resolves: RHEL-80344
[1.23.4-1]
- Update to Go 1.23.4 (fips-1)
- Resolves: RHEL-61048
- Resolves: RHEL-61223
[1.23.2-1]
- Rebase to Go1.23.2
- Remove fix standard crypto panic patch as the source already has changes
- Resolves: RHEL-62392
ELBA-2025-20206 Oracle Linux 8 oVirt 4.5 ovirt-ansible-collection bug fix update
Oracle Linux Bug Fix Advisory ELBA-2025-20206
http://linux.oracle.com/errata/ELBA-2025-20206.html
The following updated rpms for Oracle Linux 8 oVirt 4.5 have been uploaded to the Unbreakable Linux Network:
x86_64:
ovirt-ansible-collection-3.2.0-1.21.el8.noarch.rpm
SRPMS:
http://oss.oracle.com/ol8/SRPMS-updates//ovirt-ansible-collection-3.2.0-1.21.el8.src.rpm
Description of changes:
[3.2.0-1.21]
- Fix SHE termination failures