ELSA-2023-12836

ELSA-2023-12836 - kernel security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2023-09-25

Description


[5.14.0-284.30.1.el9_2]
- x86/microcode/intel: Expose collect_cpu_info_early() for IFS
- x86/cpu: Load microcode during restore_processor_state()
- x86/microcode: Rip out the OLD_INTERFACE
- x86/microcode: Default-disable late loading
- x86/microcode: Taint and warn on late loading
- x86/microcode: Remove unnecessary perf callback
- x86/microcode: Print previous version of microcode after reload
- x86/microcode: Rip out the subsys interface gunk
- x86/microcode: Simplify init path even more
- x86/microcode/AMD: Rename a couple of functions {CVE-2023-20593}
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities {CVE-2023-20593}
- x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}
- x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}
- x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}
- x86/microcode: Remove ->request_microcode_user()
- x86/microcode: Kill refresh_fw
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}
- x86/microcode: Drop struct ucode_cpu_info.valid
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}
- x86/microcode/AMD: Track patch allocation size explicitly
- x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}
- x86/microcode/core: Return an error only when necessary {CVE-2023-20593}
- x86/apic: Don't disable x2APIC if locked
- x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}
- x86/cpu: Remove redundant extern x86_read_arch_cap_msr()
- x86/cpu, kvm: Add support for CPUID_80000021_EAX
- KVM: x86: Advertise that the SMM_CTL MSR is not supported
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
- x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
- x86/cpu: Support AMD Automatic IBRS
- x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}


Related CVEs


CVE-2023-20593
CVE-2023-3610

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_aarch64_appstream
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_aarch64_baseos_latest
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_aarch64_codeready_builder
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_aarch64_u2_baseos_patch
bpftool-7.0.0-284.30.1.el9_2.aarch64.rpm155386ff632f6dc20150fdbd0c1a5a4c-ol9_aarch64_baseos_latest
bpftool-7.0.0-284.30.1.el9_2.aarch64.rpm155386ff632f6dc20150fdbd0c1a5a4c-ol9_aarch64_u2_baseos_patch
kernel-cross-headers-5.14.0-284.30.1.el9_2.aarch64.rpm48b08b7d3dcefa37b3e30a15a0403558-ol9_aarch64_codeready_builder
kernel-headers-5.14.0-284.30.1.el9_2.aarch64.rpm6e038a6b58db4b8c99cb54e1e5037616-ol9_aarch64_appstream
kernel-tools-5.14.0-284.30.1.el9_2.aarch64.rpm96819a18eb806b9914de32de8450c9c7-ol9_aarch64_baseos_latest
kernel-tools-5.14.0-284.30.1.el9_2.aarch64.rpm96819a18eb806b9914de32de8450c9c7-ol9_aarch64_u2_baseos_patch
kernel-tools-libs-5.14.0-284.30.1.el9_2.aarch64.rpm6802caa6a233f41f483c772ebf39c3fe-ol9_aarch64_baseos_latest
kernel-tools-libs-5.14.0-284.30.1.el9_2.aarch64.rpm6802caa6a233f41f483c772ebf39c3fe-ol9_aarch64_u2_baseos_patch
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.aarch64.rpm7ef7dfdc7fd019eb131721b5adc1b022-ol9_aarch64_codeready_builder
perf-5.14.0-284.30.1.el9_2.aarch64.rpm3a46b367a6717eb3cd35aafebbdad208-ol9_aarch64_appstream
python3-perf-5.14.0-284.30.1.el9_2.aarch64.rpmc5ea6b326150a15dfd840d0b703cc4bf-ol9_aarch64_baseos_latest
python3-perf-5.14.0-284.30.1.el9_2.aarch64.rpmc5ea6b326150a15dfd840d0b703cc4bf-ol9_aarch64_u2_baseos_patch
Oracle Linux 9 (x86_64) kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_x86_64_appstream
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_x86_64_baseos_latest
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_x86_64_codeready_builder
kernel-5.14.0-284.30.1.el9_2.src.rpmbdada48d335330631d524c8abe512f01-ol9_x86_64_u2_baseos_patch
bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm8e6c70500bc8aa964aa97cf56cb7ba0f-ol9_x86_64_baseos_latest
bpftool-7.0.0-284.30.1.el9_2.x86_64.rpm8e6c70500bc8aa964aa97cf56cb7ba0f-ol9_x86_64_u2_baseos_patch
kernel-5.14.0-284.30.1.el9_2.x86_64.rpmff0e6bbfdf903badcbedd7727f7d7a37-ol9_x86_64_baseos_latest
kernel-5.14.0-284.30.1.el9_2.x86_64.rpmff0e6bbfdf903badcbedd7727f7d7a37-ol9_x86_64_u2_baseos_patch
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmb7ca51b03648f6efb54d53b717832b60-ol9_x86_64_baseos_latest
kernel-abi-stablelists-5.14.0-284.30.1.el9_2.noarch.rpmb7ca51b03648f6efb54d53b717832b60-ol9_x86_64_u2_baseos_patch
kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm83d71927fc836381908d3266307ac8b6-ol9_x86_64_baseos_latest
kernel-core-5.14.0-284.30.1.el9_2.x86_64.rpm83d71927fc836381908d3266307ac8b6-ol9_x86_64_u2_baseos_patch
kernel-cross-headers-5.14.0-284.30.1.el9_2.x86_64.rpmb194db905be9c1ec714161453473a888-ol9_x86_64_codeready_builder
kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm3671230e2943323633537758f57e549a-ol9_x86_64_baseos_latest
kernel-debug-5.14.0-284.30.1.el9_2.x86_64.rpm3671230e2943323633537758f57e549a-ol9_x86_64_u2_baseos_patch
kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpmc787aec6ba6441b6254e14b9039891b0-ol9_x86_64_baseos_latest
kernel-debug-core-5.14.0-284.30.1.el9_2.x86_64.rpmc787aec6ba6441b6254e14b9039891b0-ol9_x86_64_u2_baseos_patch
kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm5aff554eddda07ca17570e436d9735f4-ol9_x86_64_appstream
kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm9b06446368b6a468c57e1e817f49d55b-ol9_x86_64_appstream
kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpmfc02078a4b3561354daa437e92ecd12b-ol9_x86_64_baseos_latest
kernel-debug-modules-5.14.0-284.30.1.el9_2.x86_64.rpmfc02078a4b3561354daa437e92ecd12b-ol9_x86_64_u2_baseos_patch
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmddb0fc114092d7a74d07d1f2cc1a717c-ol9_x86_64_baseos_latest
kernel-debug-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmddb0fc114092d7a74d07d1f2cc1a717c-ol9_x86_64_u2_baseos_patch
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm28f74be0a253caca85f90ad50d1b61c4-ol9_x86_64_baseos_latest
kernel-debug-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm28f74be0a253caca85f90ad50d1b61c4-ol9_x86_64_u2_baseos_patch
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmd2b9920caf6519e4fbab773e423c7a1e-ol9_x86_64_baseos_latest
kernel-debug-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpmd2b9920caf6519e4fbab773e423c7a1e-ol9_x86_64_u2_baseos_patch
kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm1f7e2df7f1f2056290d573370f77e2e5-ol9_x86_64_appstream
kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm8e885e2cfe6b2a87adfc6e04e0ecb7ce-ol9_x86_64_appstream
kernel-doc-5.14.0-284.30.1.el9_2.noarch.rpm89630219bd5cd77a67630329b1e52282-ol9_x86_64_appstream
kernel-headers-5.14.0-284.30.1.el9_2.x86_64.rpmfc6f5d90dbde4947bc1182cbb8e5e76b-ol9_x86_64_appstream
kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmf5a260d0e1a755dedb5a08e798045d4a-ol9_x86_64_baseos_latest
kernel-modules-5.14.0-284.30.1.el9_2.x86_64.rpmf5a260d0e1a755dedb5a08e798045d4a-ol9_x86_64_u2_baseos_patch
kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmaaab0a4da9dcb8824f8199baa5b0e715-ol9_x86_64_baseos_latest
kernel-modules-core-5.14.0-284.30.1.el9_2.x86_64.rpmaaab0a4da9dcb8824f8199baa5b0e715-ol9_x86_64_u2_baseos_patch
kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm303c56e9ab848cf08a9ea78d9fae795c-ol9_x86_64_baseos_latest
kernel-modules-extra-5.14.0-284.30.1.el9_2.x86_64.rpm303c56e9ab848cf08a9ea78d9fae795c-ol9_x86_64_u2_baseos_patch
kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm121537e7e49199590a422b50ff82596e-ol9_x86_64_baseos_latest
kernel-tools-5.14.0-284.30.1.el9_2.x86_64.rpm121537e7e49199590a422b50ff82596e-ol9_x86_64_u2_baseos_patch
kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm4248409d9f9aab71d2f5b8b806f8a811-ol9_x86_64_baseos_latest
kernel-tools-libs-5.14.0-284.30.1.el9_2.x86_64.rpm4248409d9f9aab71d2f5b8b806f8a811-ol9_x86_64_u2_baseos_patch
kernel-tools-libs-devel-5.14.0-284.30.1.el9_2.x86_64.rpm61d63cabdd09d9c59f56f5990fab6600-ol9_x86_64_codeready_builder
kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm0364462e09dc50ef7e31039a6ae63382-ol9_x86_64_baseos_latest
kernel-uki-virt-5.14.0-284.30.1.el9_2.x86_64.rpm0364462e09dc50ef7e31039a6ae63382-ol9_x86_64_u2_baseos_patch
perf-5.14.0-284.30.1.el9_2.x86_64.rpmb15735201e4127c0efbdbf9d4efcfb2a-ol9_x86_64_appstream
python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm989dcbd86d8008dc0b7be43d6bb94205-ol9_x86_64_baseos_latest
python3-perf-5.14.0-284.30.1.el9_2.x86_64.rpm989dcbd86d8008dc0b7be43d6bb94205-ol9_x86_64_u2_baseos_patch
rtla-5.14.0-284.30.1.el9_2.x86_64.rpme0fa6903f873501f9fe1e3aff8021ada-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete