Lucene search

K
oraclelinuxOracleLinuxELSA-2023-7423
HistoryNov 22, 2023 - 12:00 a.m.

kernel security update

2023-11-2200:00:00
linux.oracle.com
28
kernel
security update
kgdb lockdown
module signing key
x509.genkey
cve-2022-21499
cve-2023-4128
conflict
shim-ia32
shim-x64
rpm 4.19.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.0%

[3.10.0-1160.105.1.0.1.OL7]

  • debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499}
    [3.10.0-1160.105.1.OL7]
  • Update Oracle Linux certificates (Ilya Okomin)
  • Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)([email protected])
  • Update x509.genkey [Orabug: 24817676]
  • Conflict with shim-ia32 and shim-x64 <= 15-2.0.9
  • Update oracle(kernel-sig-key) value to match new certificate (Ilya Okomin)
    [3.10.0-1160.105.1]
  • net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
  • net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
  • net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2228703] {CVE-2023-4128}
    [3.10.0-1160.104.1]
  • CI: Remove unused kpet_tree_family (Nikolai Kondrashov)
  • xen/x86: don’t lose event interrupts (Vitaly Kuznetsov) [RHEL-1534]
  • Documentation/x86: Fix backwards on/off logic about YMM support (Waiman Long) [2229893] {CVE-2022-40982}
  • KVM: Add GDS_NO support to KVM (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add Kconfig option for GDS (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add force option to GDS mitigation (Waiman Long) [2229893] {CVE-2022-40982}
  • x86/speculation: Add Gather Data Sampling mitigation (Waiman Long) [2229893] {CVE-2022-40982}
  • Documentation/ABI: Mention retbleed vulnerability info file for sysfs (Waiman Long) [2229893]
  • docs/kernel-parameters: Update descriptions for ‘mitigations=’ param with retbleed (Waiman Long) [2229893]
  • x86/speculation: Add missing srbds=off to the mitigations= help text (Waiman Long) [2229893]
  • x86: Sync Intel family names & cpu_vuln_blacklist[] with upstream (Waiman Long) [2229893]
    [3.10.0-1160.103.1]
  • net/sched: sch_qfq: account for stab overhead in qfq_enqueue (Davide Caratti) [2225555] {CVE-2023-3611}
  • net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (Davide Caratti) [2225555]
  • net/sched: cls_fw: Fix improper refcount update leads to use-after-free (Davide Caratti) [2225639] {CVE-2023-3776}
  • redhat: fix to be able to build with rpm 4.19.0 (Denys Vlasenko)

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.0%