[RLSA-2023:7549] kernel security and bug fix update
An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163)
kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812)
kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884)
kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886)
kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919)
kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750)
bpf_jit_limit hit again (BZ#2243011)
HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625)
- ID
- RLSA-2023:7549
- Severity
- important
- URL
- https://errata.rockylinux.org/RLSA-2023:7549
- Published
-
2023-12-06T23:16:24
(9 months ago) - Modified
-
2023-12-06T23:18:00
(9 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALSA-2023:7549
- DSA-5594-1
- ELSA-2023-12199
- ELSA-2023-12200
- ELSA-2023-12206
- ELSA-2023-12207
- ELSA-2023-13043
- ELSA-2023-13044
- ELSA-2023-13047
- ELSA-2023-13048
- ELSA-2023-13049
- ELSA-2023-7549
- ELSA-2023-7749
- ELSA-2024-0461
- ELSA-2024-12094
- MS:CVE-2023-1192
- MS:CVE-2023-3812
- MS:CVE-2023-5178
- RHSA-2023:7548
- RHSA-2023:7549
- RHSA-2023:7554
- RHSA-2024:0340
- SSA:2023-325-01
- SUSE-SU-2023:2500-1
- SUSE-SU-2023:2501-1
- SUSE-SU-2023:2502-1
- SUSE-SU-2023:2507-1
- SUSE-SU-2023:2534-1
- SUSE-SU-2023:2537-1
- SUSE-SU-2023:2538-1
- SUSE-SU-2023:2611-1
- SUSE-SU-2023:2646-1
- SUSE-SU-2023:2651-1
- SUSE-SU-2023:2653-1
- SUSE-SU-2023:2782-1
- SUSE-SU-2023:2805-1
- SUSE-SU-2023:2809-1
- SUSE-SU-2023:2871-1
- SUSE-SU-2023:3171-1
- SUSE-SU-2023:3172-1
- SUSE-SU-2023:3180-1
- SUSE-SU-2023:3182-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3601-1
- SUSE-SU-2023:3680-1
- SUSE-SU-2023:3681-1
- SUSE-SU-2023:3705-1
- SUSE-SU-2023:3748-1
- SUSE-SU-2023:3749-1
- SUSE-SU-2023:3768-1
- SUSE-SU-2023:3772-1
- SUSE-SU-2023:3783-1
- SUSE-SU-2023:3786-1
- SUSE-SU-2023:3788-1
- SUSE-SU-2023:3809-1
- SUSE-SU-2023:3811-1
- SUSE-SU-2023:3812-1
- SUSE-SU-2023:3838-1
- SUSE-SU-2023:3844-1
- SUSE-SU-2023:3846-1
- SUSE-SU-2023:3889-1
- SUSE-SU-2023:3892-1
- SUSE-SU-2023:3893-1
- SUSE-SU-2023:3928-1
- SUSE-SU-2023:3988-1
- SUSE-SU-2023:4028-1
- SUSE-SU-2023:4030-1
- SUSE-SU-2023:4031-1
- SUSE-SU-2023:4032-1
- SUSE-SU-2023:4033-1
- SUSE-SU-2023:4057-1
- SUSE-SU-2023:4058-1
- SUSE-SU-2023:4071-1
- SUSE-SU-2023:4072-1
- SUSE-SU-2023:4072-2
- SUSE-SU-2023:4093-1
- SUSE-SU-2023:4095-1
- SUSE-SU-2023:4142-1
- SUSE-SU-2023:4343-1
- SUSE-SU-2023:4345-1
- SUSE-SU-2023:4347-1
- SUSE-SU-2023:4348-1
- SUSE-SU-2023:4351-1
- SUSE-SU-2023:4358-1
- SUSE-SU-2023:4375-1
- SUSE-SU-2023:4377-1
- SUSE-SU-2023:4378-1
- SUSE-SU-2023:4414-1
- SUSE-SU-2023:4766-1
- SUSE-SU-2023:4775-1
- SUSE-SU-2023:4776-1
- SUSE-SU-2023:4796-1
- SUSE-SU-2023:4801-1
- SUSE-SU-2023:4802-1
- SUSE-SU-2023:4805-1
- SUSE-SU-2023:4817-1
- SUSE-SU-2023:4820-1
- SUSE-SU-2023:4822-1
- SUSE-SU-2023:4833-1
- SUSE-SU-2023:4835-1
- SUSE-SU-2023:4836-1
- SUSE-SU-2023:4839-1
- SUSE-SU-2023:4841-1
- SUSE-SU-2023:4848-1
- SUSE-SU-2023:4849-1
- SUSE-SU-2023:4862-1
- SUSE-SU-2023:4863-1
- SUSE-SU-2023:4866-1
- SUSE-SU-2023:4867-1
- SUSE-SU-2023:4871-1
- SUSE-SU-2023:4872-1
- SUSE-SU-2024:0331-1
- SUSE-SU-2024:0348-1
- SUSE-SU-2024:0352-1
- SUSE-SU-2024:0378-1
- SUSE-SU-2024:0395-1
- SUSE-SU-2024:0414-1
- SUSE-SU-2024:0421-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1489-1
- USN-6300-1
- USN-6311-1
- USN-6332-1
- USN-6340-1
- USN-6340-2
- USN-6347-1
- USN-6349-1
- USN-6357-1
- USN-6385-1
- USN-6397-1
- USN-6412-1
- USN-6466-1
- USN-6497-1
- USN-6534-1
- USN-6534-2
- USN-6534-3
- USN-6536-1
- USN-6537-1
- USN-6548-1
- USN-6548-2
- USN-6548-3
- USN-6548-4
- USN-6548-5
- USN-6549-1
- USN-6549-2
- USN-6549-3
- USN-6549-4
- USN-6549-5
- USN-6573-1
- USN-6635-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/python3-perf?arch=aarch64&distro=rockylinux-8.9 | rockylinux | python3-perf | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/perf?arch=aarch64&distro=rockylinux-8.9 | rockylinux | perf | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-tools?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-tools | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-tools-libs?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-tools-libs | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-tools-libs-devel?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-tools-libs-devel | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-modules?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-modules | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-modules-extra?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-modules-extra | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-headers?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-headers | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-doc?arch=noarch&distro=rockylinux-8.9 | rockylinux | kernel-doc | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | noarch | |
Affected | pkg:rpm/rockylinux/kernel-devel?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-devel | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debuginfo-common-aarch64?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debuginfo-common-aarch64 | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debug?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debug | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debug-modules?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debug-modules | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debug-modules-extra?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debug-modules-extra | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debug-devel?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debug-devel | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-debug-core?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-debug-core | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-cross-headers?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-cross-headers | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-core?arch=aarch64&distro=rockylinux-8.9 | rockylinux | kernel-core | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 | |
Affected | pkg:rpm/rockylinux/kernel-abi-stablelists?arch=noarch&distro=rockylinux-8.9 | rockylinux | kernel-abi-stablelists | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | noarch | |
Affected | pkg:rpm/rockylinux/bpftool?arch=aarch64&distro=rockylinux-8.9 | rockylinux | bpftool | < 4.18.0-513.9.1.el8_9 | rockylinux-8.9 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |