Lucene search

K
oraclelinuxOracleLinuxELSA-2023-7749
HistoryDec 22, 2023 - 12:00 a.m.

kernel security update

2023-12-2200:00:00
linux.oracle.com
20
kernel
security
update
cpu
vulnerability
fix
enhancement
amd
retpoline
objecttool
mitigation

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.2%

[5.14.0-362.13.1.el9_3.OL9]

  • x86/retpoline: Document some thunk handling aspects (Borislav Petkov) {CVE-2023-20569}
  • objtool: Fix return thunk patching in retpolines (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Remove unnecessary semicolon (Yang Li) {CVE-2023-20569}
  • x86/calldepth: Rename __x86_return_skl() to call_depth_return_thunk() (Josh Poimboeuf) {CVE-2023-20569}
  • x86/nospec: Refactor UNTRAIN_RET[_*] (Josh Poimboeuf) {CVE-2023-20569}
  • x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Disentangle rethunk-dependent options (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Move retbleed IBPB check into existing ‘has_microcode’ code block (Josh Poimboeuf) {CVE-2023-20569}
  • x86/bugs: Remove default case for fully switched enums (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Remove ‘pred_cmd’ label (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Unexport untraining functions (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Improve i-cache locality for alias mitigation (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Fix unret validation dependencies (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Fix vulnerability reporting for missing microcode (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Print mitigation for retbleed IBPB case (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Print actual mitigation if requested mitigation isn’t possible (Josh Poimboeuf) [RHEL-8594] {CVE-2023-20569}
  • x86/srso: Fix SBPB enablement for (possible) future fixed HW (Josh Poimboeuf) {CVE-2023-20569}
  • x86,static_call: Fix static-call vs return-thunk (Peter Zijlstra) {CVE-2023-20569}
  • x86/alternatives: Remove faulty optimization (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Don’t probe microcode in a guest (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Set CPUID feature bits independently of bug or mitigation status (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Fix srso_show_state() side effect (Josh Poimboeuf) {CVE-2023-20569}
  • x86/cpu: Fix amd_check_microcode() declaration (Arnd Bergmann) {CVE-2023-20569}
  • x86/srso: Correct the mitigation status when SMT is disabled (Borislav Petkov) {CVE-2023-20569}
  • x86/static_call: Fix __static_call_fixup() (Peter Zijlstra) {CVE-2023-20569}
  • objtool/x86: Fixup frame-pointer vs rethunk (Peter Zijlstra) {CVE-2023-20569}
  • x86/srso: Explain the untraining sequences a bit more (Borislav Petkov) {CVE-2023-20569}
  • x86/cpu/kvm: Provide UNTRAIN_RET_VM (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Cleanup the untrain mess (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Rename srso_(.*)alias to srso_alias\1 (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Rename original retbleed methods (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Clean up SRSO return thunk mess (Peter Zijlstra) {CVE-2023-20569}
  • x86/alternative: Make custom return thunk unconditional (Peter Zijlstra) {CVE-2023-20569}
  • objtool/x86: Fix SRSO mess (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk() (Peter Zijlstra) {CVE-2023-20569}
  • x86/cpu: Fix __x86_return_thunk symbol type (Peter Zijlstra) {CVE-2023-20569}
  • x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT (Petr Pavlu) {CVE-2023-20569}
  • x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG (Petr Pavlu) {CVE-2023-20569}
  • x86/srso: Disable the mitigation on unaffected configurations (Borislav Petkov) {CVE-2023-20569}
  • x86/CPU/AMD: Fix the DIV(0) initial fix attempt (Borislav Petkov) {CVE-2023-20588}
  • x86/retpoline: Don’t clobber RFLAGS during srso_safe_ret() (Sean Christopherson) {CVE-2023-20569}
  • x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (Cristian Ciocaltea) {CVE-2023-20593}
  • driver core: cpu: Fix the fallback cpu_show_gds() name (Borislav Petkov) {CVE-2023-20569}
  • x86: Move gds_ucode_mitigated() declaration to header (Arnd Bergmann) {CVE-2023-20569}
  • x86/speculation: Add cpu_show_gds() prototype (Arnd Bergmann) {CVE-2023-20569}
  • driver core: cpu: Make cpu_show_not_affected() static (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Fix build breakage with the LLVM linker (Nick Desaulniers) {CVE-2023-20569}
  • Documentation/srso: Document IBPB aspect and fix formatting (Borislav Petkov) {CVE-2023-20569}
  • driver core: cpu: Unify redundant silly stubs (Borislav Petkov) {CVE-2023-20569}
  • Documentation/hw-vuln: Unify filename specification in index (Borislav Petkov) {CVE-2023-20569}
  • x86/CPU/AMD: Do not leak quotient data after a division by 0 (Borislav Petkov) {CVE-2023-20588}
  • x86/srso: Tie SBPB bit setting to microcode patch detection (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Add a forgotten NOENDBR annotation (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Fix return thunks in generated code (Josh Poimboeuf) {CVE-2023-20569}
  • x86/srso: Add IBPB on VMEXIT (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Add IBPB (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Add SRSO_NO support (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Add IBPB_BRTYPE support (Borislav Petkov) {CVE-2023-20569}
  • redhat/configs/x86: Enable CONFIG_CPU_SRSO (Borislav Petkov) {CVE-2023-20569}
  • x86/srso: Add a Speculative RAS Overflow mitigation (Borislav Petkov) {CVE-2023-20569}
  • x86/retbleed: Add __x86_return_thunk alignment checks (Borislav Petkov) {CVE-2023-20569}
  • x86/retbleed: Fix return thunk alignment (Borislav Petkov) {CVE-2023-20569}
  • x86/alternative: Optimize returns patching (Borislav Petkov) {CVE-2023-20569}
  • x86,objtool: Separate unret validation from unwind hints (Josh Poimboeuf) {CVE-2023-20569}
  • objtool: Add objtool_types.h (Josh Poimboeuf) {CVE-2023-20569}
  • objtool: Union instruction::{call_dest,jump_table} (Peter Zijlstra) {CVE-2023-20569}
  • x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (Peter Zijlstra) {CVE-2023-20569}
  • objtool: Fix SEGFAULT (Christophe Leroy) {CVE-2023-20569}
  • vmlinux.lds.h: add BOUNDED_SECTION* macros (Jim Cromie) {CVE-2023-20569}

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.2%