{"schema_version": "1.7.0", "id": "RXSA-2023:7549", "modified": "2023-12-06T23:18:34.375713Z", "published": "2023-12-06T23:18:20.925904Z", "upstream": ["CVE-2022-45884", "CVE-2022-45886", "CVE-2022-45919", "CVE-2023-1192", "CVE-2023-2163", "CVE-2023-3812", "CVE-2023-5178"], "summary": "Important: kernel security and bug fix update", "details": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)\n\n* kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)\n\n* kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)\n\n* kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884)\n\n* kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886)\n\n* kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919)\n\n* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750)\n\n* bpf_jit_limit hit again (BZ#2243011)\n\n* HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625)", "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "kernel", "purl": "pkg:rpm/rocky-linux/kernel?distro=rocky-linux-8-sig-cloud&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:4.18.0-513.9.1.el8_9.cloud"}], "database_specific": {"yum_repository": "cloud-common"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RXSA-2023:7549"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148510"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148517"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151956"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154178"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224048"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240249"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241924"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}