Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 9
Type: Security
Severity: Important
Release date: 2023-09-15

Summary:

The kernel packages contain the Linux kernel, the core of any Linux operating 
system.
Security Fix(es):
* kernel: Small table perturb size in the TCP source port generation algorithm 
can lead to information leak (CVE-2022-1012)
* kernel: race condition in perf_event_open leads to privilege escalation 
(CVE-2022-1729)
* kernel: a use-after-free write in the netfilter subsystem can lead to 
privilege escalation to root (CVE-2022-1966)
* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.
Bug Fix(es):
* make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)
* SR-IOV performance > 50% degradation (BZ#2074830)
* fix data corruption caused by dm-integrity (BZ#2082187)
* SCTP client-side peeloff issues [almalinux-9] (BZ#2084044)
* TCP connection fails in a asymmetric routing situation (BZ#2085480)
* Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)
* spec: Fix separate tools build (BZ#2090852)
* call traces related to eeh_pseries observed and vmcore is not captured, when 
kdump is triggered (BZ#2092255)
* Mark ThunderX NIC driver as unmaintained (BZ#2092638)

Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/9/ALSA-2022-5249.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to