{"id":"RXSA-2023:7549","summary":"Important: kernel security and bug fix update","details":"The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)\n\n* kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)\n\n* kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)\n\n* kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884)\n\n* kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886)\n\n* kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919)\n\n* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750)\n\n* bpf_jit_limit hit again (BZ#2243011)\n\n* HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625)","modified":"2026-02-04T13:00:07.347748Z","published":"2023-12-06T23:18:20.925904Z","upstream":["CVE-2022-45884","CVE-2022-45886","CVE-2022-45919","CVE-2023-1192","CVE-2023-2163","CVE-2023-3812","CVE-2023-5178"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RXSA-2023:7549"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148510"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2148517"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2151956"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2154178"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2224048"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240249"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241924"}],"affected":[{"package":{"name":"kernel","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/kernel?distro=rocky-linux-8-sig-cloud&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.18.0-513.9.1.el8_9.cloud"}],"database_specific":{"yum_repository":"cloud-common"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RXSA-2023:7549.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}