+ + + + + + + + + + + + +CVE-2023-23583: microcode_ctl: Intel CPUs: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior¶ +Summary¶ +As described by Intel: +Under certain microarchitectural conditions, Intel has identified cases where execution of an instruction (REP MOVSB) encoded with a redundant REX prefix may result in unpredictable system behavior resulting in a system crash/hang, or, in some limited scenarios, may allow escalation of privilege from CPL3 to CPL0. +and by Red Hat: +A security vulnerability was found in some Intel processors. Execution of REP MOVSB instructions with a redundant REX prefix may result in execution continuing at an incorrect EIP address after a micro-architectural event occurs, potentially allowing privilege escalation, information disclosure and/or a denial of service via local access. +as well as in CVE-2023-23583. +More detail is available via these links to Intel's website and in the public disclosure by Tavis Ormandy from Google. +Public disclosure date: November 14, 2023 +EL9¶ +Fixed in version: 4:20231114-1.el9_2.security available November 15, 2023 +EL8¶ +Not fixed yet, will fix. + + + + + + Last update: + November 15, 2023 + + + + + + + + + + +
+ + + + + + + + + + + + +CVE-2023-4911: glibc: Looney Tunables: buffer overflow in ld.so leading to privilege escalation¶ +Summary¶ +As described by Red Hat and in CVE-2023-4911: +A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. +More detail is available in the public disclosure by Qualys, the team who discovered the issue. +Public disclosure date: October 3, 2023 +EL9¶ +Mitigated in version: 2.34-60.el9_2.security.0.2 available October 3, 2023 +Fixed in version: glibc-2.34-60.el9_2.7 available October 5, 2023 +Besides the upstream fix, we also retained the mitigation in the Security SIG package of glibc. +EL8¶ +Fixed in version: glibc-0:2.28-225.el8_8.6 available October 5, 2023 +Errata: RLSA-2023:5455 issued October 7, 2023 + + + + + + Last update: + November 15, 2023 + + + + + + + + + + +
+ + + + + + + + + + + + +Override package: microcode_ctl¶ +EL9¶ + +Version 4:20231114-1.el9_2.security +Based on 4:20230808-2 + +Changes summary¶ + +Update Intel CPU microcode to microcode-20231114 (fixes CVE-2023-23583), temporarily dropping most documentation patches + +Change log¶ +* Tue Nov 14 2023 Solar Designer <solar@openwall.com> - 4:20231114-1 +- Update Intel CPU microcode to microcode-20231114 (fixes CVE-2023-23583), + temporarily dropping most documentation patches + + + + + + + Last update: + November 15, 2023 + + + + + + + + + + +