Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 8
Type: Security
Severity: Important
Release date: 2023-12-04

Summary:

The kernel packages contain the Linux kernel, the core of any Linux operating 
system.

Security Fix(es):

* kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being 
incorrectly marked as safe (CVE-2023-2163)
* kernel: tun: bugs for oversize packet when napi frags enabled in 
tun_napi_alloc_frags (CVE-2023-3812)
* kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178)
* kernel: use-after-free due to race condition occurring in 
dvb_register_device() (CVE-2022-45884)
* kernel: use-after-free due to race condition occurring in dvb_net.c 
(CVE-2022-45886)
* kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c 
(CVE-2022-45919)
* kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192)

For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.

Bug Fix(es):
* Fix max integer mmu_invalidate_seq hanging vCPU (ALBZ#445)
* Random delay receiving packets after bringing up VLAN on top of VF with 
vf-vlan-pruning enabled (BZ#2240750)
* bpf_jit_limit hit again (BZ#2243011)
* HPE Edgeline 920t resets during kdump context when ice driver is loaded and 
when system is booted with intel_iommu=on iommu=pt (BZ#2244625)

Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/8/ALSA-2023-7549.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to