[El-errata] ELSA-2023-7423 Important: Oracle Linux 7 kernel security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Thu Nov 23 20:42:50 UTC 2023
Oracle Linux Security Advisory ELSA-2023-7423
http://linux.oracle.com/errata/ELSA-2023-7423.html
The following updated rpms for Oracle Linux 7 have been uploaded to the Unbreakable Linux Network:
x86_64:
bpftool-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-abi-whitelists-3.10.0-1160.105.1.0.1.el7.noarch.rpm
kernel-debug-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-doc-3.10.0-1160.105.1.0.1.el7.noarch.rpm
kernel-headers-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
python-perf-3.10.0-1160.105.1.0.1.el7.x86_64.rpm
SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates//kernel-3.10.0-1160.105.1.0.1.el7.src.rpm
Related CVEs:
CVE-2022-40982
CVE-2023-3611
CVE-2023-3776
CVE-2023-4128
CVE-2023-4206
CVE-2023-4207
CVE-2023-4208
Description of changes:
[3.10.0-1160.105.1.0.1.el7.OL7]
- debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}
[3.10.0-1160.105.1.el7.OL7]
- Update Oracle Linux certificates (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko at oracle.com)
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15-2.0.9]
- Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
[3.10.0-1160.105.1.el7]
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
[3.10.0-1160.104.1.el7]
- CI: Remove unused kpet_tree_family (Nikolai Kondrashov)
- xen/x86: don't lose event interrupts (Vitaly Kuznetsov) [RHEL-1534]
- Documentation/x86: Fix backwards on/off logic about YMM support (Waiman Long) [2229893] {CVE-2022-40982}
- KVM: Add GDS_NO support to KVM (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add Kconfig option for GDS (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add force option to GDS mitigation (Waiman Long) [2229893] {CVE-2022-40982}
- x86/speculation: Add Gather Data Sampling mitigation (Waiman Long) [2229893] {CVE-2022-40982}
- Documentation/ABI: Mention retbleed vulnerability info file for sysfs (Waiman Long) [2229893]
- docs/kernel-parameters: Update descriptions for "mitigations=" param with retbleed (Waiman Long) [2229893]
- x86/speculation: Add missing srbds=off to the mitigations= help text (Waiman Long) [2229893]
- x86: Sync Intel family names & cpu_vuln_blacklist[] with upstream (Waiman Long) [2229893]
[3.10.0-1160.103.1.el7]
- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (Davide Caratti) [2225555] {CVE-2023-3611}
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Davide Caratti) [2225555]
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (Davide Caratti) [2225639] {CVE-2023-3776}
- redhat: fix to be able to build with rpm 4.19.0 (Denys Vlasenko)
More information about the El-errata
mailing list