Release date:
2026-02-16 10:56:28 UTC
Description:
- net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit {CVE-2025-39766}
- NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL {CVE-2023-53680}
- scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() {CVE-2023-53676}
- KVM: x86: use array_index_nospec with indices that come from guest {CVE-2025-39823}
- ftrace: Also allocate and copy hash for reading of filter files {CVE-2025-39689}
- ext4: improve error handling from ext4_dirhash() {CVE-2023-53473}
- rcu: Protect ->defer_qs_iw_pending from data race {CVE-2025-39749}
- ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}
- fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271}
- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer {CVE-2025-40269}
- Bluetooth: ISO: Fix possible UAF on iso_conn_free {CVE-2025-40141}
- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}
- lib: cpu_rmap: Avoid use after free on rmap->obj array entries {CVE-2023-53484}
- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911}
- libceph: fix invalid accesses to ceph_connection_v1_info {CVE-2025-39880}
- bus: mhi: host: Detect events pointing to unexpected TREs {CVE-2025-39790}
- nvmet: fix out-of-bounds access in nvmet_enable_port {CVE-2025-37825}
- net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail() {CVE-2023-54155}
- wifi: mwifiex: Initialize the chan_stats array to zero {CVE-2025-39891}
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device {CVE-2023-54015}
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages {CVE-2023-53996}
- page_pool: Fix use-after-free in page_pool_recycle_in_ring {CVE-2025-38129}
- page_pool: fix inconsistency for page_pool_ring_[un]lock()
- net: page_pool: use in_softirq() instead {CVE-2025-38129}
- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}
- vsock: avoid to close connected socket after the timeout {CVE-2025-40248}
- sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240}
- smb: client: let recv_done verify data_offset, data_length and remaining_data_length {CVE-2025-39933}
- net: phylink: add lock for serializing concurrent pl->phydev writes with resolver {CVE-2025-39905}
- i40e: validate ring_len parameter against hardware-specific values
- i40e: add validation for ring_len param {CVE-2025-39973}
- i40e: increase max descriptors for XL710
- i40e: remove read access to debugfs files {CVE-2025-39901}
- mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- i2c: tegra: check msg length in SMBUS block read {CVE-2025-38425}
- regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods {CVE-2025-38395}
- virtio-net: ensure the received length does not exceed allocated size {CVE-2025-38375}
- VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow {CVE-2023-54102}
- tcp: fix a signed-integer-overflow bug in tcp_add_backlog() {CVE-2022-50865}
- tcp: minor optimization in tcp_add_backlog() {CVE-2022-50865}
- block, bfq: fix uaf for bfqq in bic_set_bfqq() {CVE-2023-52983}
- block, bfq: replace 0/1 with false/true in bic apis
- block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq {CVE-2022-50329}
- block, bfq: fix possible uaf for 'bfqq->bic' {CVE-2022-50488}
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}
- arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() {CVE-2025-38320}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- net/mdiobus: Fix potential out-of-bounds read/write access {CVE-2025-38111}
- net: mdio: C22 is now optional, EOPNOTSUPP if not provided
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- net: atm: add lec_mutex {CVE-2025-38323}
- Bluetooth: hci_sync: always check if connection is alive before deleting
- Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync {CVE-2023-53762}
- Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync
- Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete {CVE-2025-38118}
- Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync {CVE-2024-58013}
- net_sched: remove qdisc_tree_flush_backlog()
- net_sched: ets: fix a race in ets_qdisc_change() {CVE-2025-38107}
- net_sched: tbf: fix a race in tbf_change()
- net_sched: prio: fix a race in prio_tune() {CVE-2025-38083}
- net_sched: red: fix a race in __red_change() {CVE-2025-38108}
- HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request {CVE-2025-38013}
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}
- VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF {CVE-2023-53259}
- mptcp: fix race condition in mptcp_schedule_work() {CVE-2025-40258}
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154}
- wifi: ath10k: Delay the unmapping of the buffer {CVE-2022-50700}
- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind {CVE-2025-68305}
- ALSA: pcm: Fix potential data race at PCM memory allocation helpers {CVE-2023-54072}
- drm/amd/display: fix FCLK pstate change underflow {CVE-2023-53780}
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
Updated packages:
-
bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:9d0dec11305496885ebfe98245d87a806e44fd2b918acc2928fe63155fb31961
-
kernel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:b929e93d68449142e5cd2b7ae0056cd3d13d9f50e795a20550c78cdcc3e32117
-
kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els28.noarch.rpm
sha:c43afd3b7c4c5624120d2c0f13cfd083b0bf51d1e104bde4869c5c5abb508c8c
-
kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:ab00bed954a28a91a629098a6ff862a9015fb34767b04378218e82c989ed3059
-
kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:9c54361cf1478262c441e0f3bf36cccf213598160021bc104808910fd402cb93
-
kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:8d431e7241c7d00b8466aa31690e94e1fab43be93fab22451910b325a5cc8457
-
kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:5f5326dc5682c5ca89b67df6727b83cdaff30e8326696ef7bf563d2e392367b7
-
kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:b586595de3caf978118c743735c08d51b07c96eaaf46c0e6faae927ea151b6ae
-
kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:88e4084e9521708d61a5c687eb7d34760e684a39a54e5dafc7e819d345297f47
-
kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:5c7067a3bf037de53bac3be8441186db178869904658c74a1f9a7ea9cd2fb54a
-
kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:2d19b5be4bae379c5e500d3e95bdb06ddbc842fe4e65e0929127c42c1ea47dac
-
kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:008f5fc9ebc938d2d100e54108ec7c4af1055a764433c5957acdb99fa5a494ce
-
kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:8e71690aa484b63eb9a82c253f7e03070ee54154cc8f72a0d0f0595cbfd56eae
-
kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:6d84efe1aebcc636825874b382cd73a9de9398a5de03d12c4ae67de5ab0b79e6
-
kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:87ebfee2036c1b7517f1df5c115e46f5dbd010eedac27d30c9f7182563ecc427
-
kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:0a1a9089ecb76617b50c9e40793bcbf0b161a5c458fd544376284657f60147e4
-
kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:c4c4f576db809e514e90a81ff435f815c79ba2bdb166d610d99de5364e91eac0
-
kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els28.noarch.rpm
sha:e4662fb7c6b13aaa8e09c261b0fbfc0766166711e2810bb611c535c086084210
-
kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:0beebf253eb36a59869203433396cdd429f2af6c06e6b54c7f26d030c3468177
-
kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:00c8846c7ca6aa14bdf122b164fb82d50d2caf52facd5fb70e923cfcfe6928e2
-
kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:1652cfa0f3b07ce661dbefe8f9db02a9e2b3ba6ec1299be3ef26942193419c50
-
kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:388f2f3829f874c159cbe028062b4cdbf94d21c89748477847b9681af42e7b47
-
kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:60ba3d4194e25ea3ebe36d42f94749447810ba20ee8b9c8e75da6f8cd8f2b0c9
-
kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:efa1acc2745e708c8477ff25b1e0ae30d70feb76eaf266d36946aae030f5d590
-
kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:2ae2b55bc6d0047df13f5da9df69fec8963afdf6e369ab04f0d9fe3933c37eed
-
kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:da1c51bc0441408b3b4a8c100bcba11281290b66131a647fe67a45ff26274495
-
kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:8c56f466d482d358bb85b50952122bb6dc18b3d005b890fba82fce77adda2523
-
kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:988a0c8a85a95e9eb23fc9b8b058821a20e20093abcba839e9a608c199ce991f
-
kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:7cd650acc6fbf347a0bfc95519093d4d6a0ec85b662df698993942cfe2fd3351
-
kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:3af5ef8b11abf6ac87c6ebdc95f056b23ab9097efff41a3588ae0ce3b1352d64
-
libbpf-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
sha:fd953dc8ba41e89f4891f7bfc4b8d82bbcd1f6bcd0e00cfed5bc5cd2f87005cb
-
libbpf-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
sha:d79f7bad5468a3757fbce48c8799cb39e3e9f6370c29e51c1ebd57d8a2bd5634
-
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
sha:a19267b6c9aa1a92cc31ffae6c20eebc66fa4db618bd47252212068997ba723f
-
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
sha:a0f50d4cf424992f5a396cf67427a2a5b7f1836dcdcb598ffb800003aa12f924
-
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
sha:fa490cf0483cd0b8f2c6624b9f0805dc4b62ba258c22d75cf509cf829edd41c3
-
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
sha:22c3f3d3602e095ec7e525d1bec0c0f0362ede51b1a1026dac8cbb46deec015d
-
perf-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:82d5dfa84d67ba1864ad9a2519d77410981b1cb0499da2f4b5e0f17c63bd8060
-
python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:9ae771097ea9d895e16e96e6b34c0cff476287382d74ae1c94388134a61ae874
-
rtla-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
sha:8e975968b04e7d18fdb58e6aa4d310afe914cfc23bee3a08507cd430ef2cb99a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.