[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2023-7749 -- Oracle kernel_bpftool_perf_python3-perf_rtla

ID: oval:org.secpod.oval:def:1507227Date: (C)2024-01-05   (M)2024-04-25
Class: PATCHFamily: unix




[5.14.0-362.13.1.el9_3.OL9] - x86/retpoline: Document some thunk handling aspects {CVE-2023-20569} - objtool: Fix return thunk patching in retpolines {CVE-2023-20569} - x86/srso: Remove unnecessary semicolon {CVE-2023-20569} - x86/calldepth: Rename __x86_return_skl to call_depth_return_thunk {CVE-2023-20569} - x86/nospec: Refactor UNTRAIN_RET[_*] {CVE-2023-20569} - x86/rethunk: Use SYM_CODE_START[_LOCAL]_NOALIGN macros {CVE-2023-20569} - x86/srso: Disentangle rethunk-dependent options {CVE-2023-20569} - x86/srso: Move retbleed IBPB check into existing "has_microcode" code block {CVE-2023-20569} - x86/bugs: Remove default case for fully switched enums {CVE-2023-20569} - x86/srso: Remove "pred_cmd" label {CVE-2023-20569} - x86/srso: Unexport untraining functions {CVE-2023-20569} - x86/srso: Improve i-cache locality for alias mitigation {CVE-2023-20569} - x86/srso: Fix unret validation dependencies {CVE-2023-20569} - x86/srso: Fix vulnerability reporting for missing microcode {CVE-2023-20569} - x86/srso: Print mitigation for retbleed IBPB case {CVE-2023-20569} - x86/srso: Print actual mitigation if requested mitigation isn"t possible [RHEL-8594] {CVE-2023-20569} - x86/srso: Fix SBPB enablement for future fixed HW {CVE-2023-20569} - x86,static_call: Fix static-call vs return-thunk {CVE-2023-20569} - x86/alternatives: Remove faulty optimization {CVE-2023-20569} - x86/srso: Fix SBPB enablement for spec_rstack_overflow=off {CVE-2023-20569} - x86/srso: Don"t probe microcode in a guest {CVE-2023-20569} - x86/srso: Set CPUID feature bits independently of bug or mitigation status {CVE-2023-20569} - x86/srso: Fix srso_show_state side effect {CVE-2023-20569} - x86/cpu: Fix amd_check_microcode declaration {CVE-2023-20569} - x86/srso: Correct the mitigation status when SMT is disabled {CVE-2023-20569} - x86/static_call: Fix __static_call_fixup {CVE-2023-20569} - objtool/x86: Fixup frame-pointer vs rethunk {CVE-2023-20569} - x86/srso: Explain the untraining sequences a bit more {CVE-2023-20569} - x86/cpu/kvm: Provide UNTRAIN_RET_VM {CVE-2023-20569} - x86/cpu: Cleanup the untrain mess {CVE-2023-20569} - x86/cpu: Rename srso__alias to srso_alias_\1 {CVE-2023-20569} - x86/cpu: Rename original retbleed methods {CVE-2023-20569} - x86/cpu: Clean up SRSO return thunk mess {CVE-2023-20569} - x86/alternative: Make custom return thunk unconditional {CVE-2023-20569} - objtool/x86: Fix SRSO mess {CVE-2023-20569} - x86/cpu: Fix up srso_safe_ret and __x86_return_thunk {CVE-2023-20569} - x86/cpu: Fix __x86_return_thunk symbol type {CVE-2023-20569} - x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT {CVE-2023-20569} - x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG {CVE-2023-20569} - x86/srso: Disable the mitigation on unaffected configurations {CVE-2023-20569} - x86/CPU/AMD: Fix the DIV initial fix attempt {CVE-2023-20588} - x86/retpoline: Don"t clobber RFLAGS during srso_safe_ret {CVE-2023-20569} - x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 {CVE-2023-20593} - driver core: cpu: Fix the fallback cpu_show_gds name {CVE-2023-20569} - x86: Move gds_ucode_mitigated declaration to header {CVE-2023-20569} - x86/speculation: Add cpu_show_gds prototype {CVE-2023-20569} - driver core: cpu: Make cpu_show_not_affected static {CVE-2023-20569} - x86/srso: Fix build breakage with the LLVM linker {CVE-2023-20569} - Documentation/srso: Document IBPB aspect and fix formatting {CVE-2023-20569} - driver core: cpu: Unify redundant silly stubs {CVE-2023-20569} - Documentation/hw-vuln: Unify filename specification in index {CVE-2023-20569} - x86/CPU/AMD: Do not leak quotient data after a division by 0 {CVE-2023-20588} - x86/srso: Tie SBPB bit setting to microcode patch detection {CVE-2023-20569} - x86/srso: Add a forgotten NOENDBR annotation {CVE-2023-20569} - x86/srso: Fix return thunks in generated code {CVE-2023-20569} - x86/srso: Add IBPB on VMEXIT {CVE-2023-20569} - x86/srso: Add IBPB {CVE-2023-20569} - x86/srso: Add SRSO_NO support {CVE-2023-20569} - x86/srso: Add IBPB_BRTYPE support {CVE-2023-20569} - redhat/configs/x86: Enable CONFIG_CPU_SRSO {CVE-2023-20569} - x86/srso: Add a Speculative RAS Overflow mitigation {CVE-2023-20569} - x86/retbleed: Add __x86_return_thunk alignment checks {CVE-2023-20569} - x86/retbleed: Fix return thunk alignment {CVE-2023-20569} - x86/alternative: Optimize returns patching {CVE-2023-20569} - x86,objtool: Separate unret validation from unwind hints {CVE-2023-20569} - objtool: Add objtool_types.h {CVE-2023-20569} - objtool: Union instruction::{call_dest,jump_table} {CVE-2023-20569} - x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK {CVE-2023-20569} - objtool: Fix SEGFAULT {CVE-2023-20569} - vmlinux.lds.h: add BOUNDED_SECTION* macros {CVE-2023-20569}

Platform:
Oracle Linux 9
Product:
kernel
bpftool
perf
python3-perf
rtla
Reference:
ELSA-2023-7749
CVE-2023-1192
CVE-2023-5345
CVE-2023-20569
CVE-2023-45871
CVE-2023-20588
CVE-2023-20593
CVE    6
CVE-2023-20593
CVE-2023-20569
CVE-2023-20588
CVE-2023-1192
...
CPE    5
cpe:/a:bpf:bpftool
cpe:/a:python-perf:python3-perf
cpe:/o:linux:linux_kernel
cpe:/a:perf:perf
...

© SecPod Technologies