Hi,

You are receiving an AlmaLinux Security update email because you subscribed to 
receive errata notifications from AlmaLinux.

AlmaLinux: 9
Type: Security
Severity: Moderate
Release date: 2024-11-03

Summary:

The kernel packages contain the Linux kernel, the core of any Linux operating 
system.  

Security Fix(es):  

  * kernel: block: null pointer dereference in ioctl.c when length and logical 
block size are misaligned (CVE-2023-52458)
  * kernel: ext4: avoid allocating blocks from corrupted group in 
ext4_mb_try_best_found() (CVE-2024-26773)
  * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and 
bpf_timer_cancel (CVE-2024-26737)
  * kernel: dm: call the resume method on internal suspend (CVE-2024-26880)
  * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() 
(CVE-2024-26852)
  * kernel: Squashfs: check the inode number is not the invalid value of zero 
(CVE-2024-26982)
  * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)
  * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)
  * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() 
(CVE-2024-35857)
  * kernel: mlxbf_gige: call request_irq() after NAPI initialized 
(CVE-2024-35907)
  * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)
  * kernel: scsi: libfc: Fix potential NULL pointer dereference in 
fc_lport_ptp_setup() (CVE-2023-52809)
  * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv 
(CVE-2021-47459)
  * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() 
(CVE-2024-36924)
  * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource 
clean up (CVE-2024-36952)
  * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)
  * kernel: epoll: be better about file lifetimes (CVE-2024-38580)


For more details about the security issue(s), including the impact, a CVSS 
score, acknowledgments, and other related information, refer to the CVE page(s) 
listed in the References section.


Full details, updated packages, references, and other related information: 
https://errata.almalinux.org/9/ALSA-2024-4928.html

This message is automatically generated, please don’t reply. For further 
questions, please, contact us via the AlmaLinux community chat: 
https://chat.almalinux.org/.
Want to change your notification settings? Sign in and manage mailing lists on 
https://lists.almalinux.org.

Kind regards,
AlmaLinux Team

Reply via email to