Release date:
2026-02-14 14:22:29 UTC
Description:
- net/ieee802154: don't warn zero-sized raw_sendmsg() {CVE-2022-50706}
- scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() {CVE-2023-53676}
- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer {CVE-2025-40269}
- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- HID: intel-ish-hid: ipc: Fix potential use-after-free in work function {CVE-2023-53039}
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed {CVE-2022-50103}
- nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724}
- xfrm: Duplicate SPI Handling {CVE-2025-39797}
- scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input {CVE-2022-50030}
- net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent {CVE-2022-48883}
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx {CVE-2023-54148}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() {CVE-2022-50050}
- nfs: fix UAF in direct writes {CVE-2024-26958}
- iomap: iomap: fix memory corruption when recording errors during writeback {CVE-2022-50406}
- drm/amdkfd: Fix an illegal memory access {CVE-2023-53090}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- ALSA: pcm: Fix potential data race at PCM memory allocation helpers {CVE-2023-54072}
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes {CVE-2023-53077}
- net: bridge: use DEV_STATS_INC() {CVE-2023-52578}
- loop: Fix use-after-free issues {CVE-2023-53111}
- media: rc: fix races with imon_disconnect() {CVE-2025-39993}
- fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}
- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}
- Bluetooth: hci_event: call disconnect callback before deleting conn {CVE-2023-53673}
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too {CVE-2025-38729}
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- tracing: Fix wild-memory-access in register_synth_event() {CVE-2022-49799}
- iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE) {CVE-2022-50093}
- drm/shmem-helper: Remove another errant put in error path {CVE-2023-53084}
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() {CVE-2022-49934}
- drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers() {CVE-2022-50185}
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values {CVE-2022-50403}
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() {CVE-2022-50279}
- nbd: fix incomplete validation of ioctl arg {CVE-2023-53513}
- r8169: Fix possible ring buffer corruption on fragmented Tx packets. {CVE-2024-38586}
- sctp: handle the error returned from sctp_auth_asoc_init_active_key {CVE-2022-50243}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-39493}
- i40e: fix idx validation in config queues msg {CVE-2025-39971}
- netfilter: nf_tables: prefer nft_chain_validate {CVE-2024-41042}
- platform/x86: wmi: Fix opening of char device {CVE-2023-52864}
- netfilter: validate user input for expected length {CVE-2024-35962}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- wifi: iwlwifi: fix a memory corruption {CVE-2024-26610}
- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}
- wifi: cfg80211: check A-MSDU format more carefully {CVE-2024-35937}
- net_sched: hfsc: Fix a UAF vulnerability in class handling {CVE-2025-37797}
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921}
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}
- nvmet: avoid potential UAF in nvmet_req_complete() {CVE-2023-53116}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network {CVE-2022-49865}
- ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}
- binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497}
- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349}
- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}
- lib: cpu_rmap: Avoid use after free on rmap->obj array entries {CVE-2023-53484}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue {CVE-2022-50366}
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue {CVE-2022-50164}
- sched/fair: Don't balance task to its current running CPU {CVE-2023-53215}
- rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails {CVE-2023-53307}
- mptcp: fix race condition in mptcp_schedule_work() {CVE-2025-40258}
- fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}
- mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961}
- ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}
- net: atm: add lec_mutex {CVE-2025-38323}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix {CVE-2022-49503}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- bpf: Don't redirect packets with invalid pkt_len {CVE-2022-49975}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989,CVE-2023-53145}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- be2net: Fix buffer overflow in be_get_module_eeprom {CVE-2022-49581}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] {CVE-2024-46815}
- selinux: Add boundary check in put_entry() {CVE-2022-50200}
- usbnet: Fix linkwatch use-after-free on disconnect {CVE-2022-50220}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). {CVE-2025-39955}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug {CVE-2025-38024}
- VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF {CVE-2023-53259}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- ftrace: Fix invalid address access in lookup_rec() when index is 0 {CVE-2023-53075}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- vt: Clear selection before changing the font {CVE-2022-49948}
- dm raid: fix accesses beyond end of raid member array {CVE-2022-49674}
- drm/amd/display: Check pipe offset before setting vblank {CVE-2024-42120}
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154}
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow {CVE-2023-54102}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- ata: libata-transport: fix double ata_host_put() in ata_tport_add() {CVE-2022-49826}
- iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid {CVE-2025-37927}
- tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923}
- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
- net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749}
- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}
- mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update {CVE-2024-35855}
- net: openvswitch: Fix Use-After-Free in ovs_ct_exit {CVE-2024-27395}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- net/mlx5: Discard command completions in internal error {CVE-2024-38555}
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device {CVE-2023-54015}
- kobject_uevent: Fix OOB access within zap_modalias_env() {CVE-2024-42292}
- stm class: Fix a double free in stm_register_device() {CVE-2024-38627}
- leds: trigger: Unregister sysfs attributes before calling deactivate() {CVE-2024-43830}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978}
Updated packages:
-
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:dcc82c1559cb929a11e65aaa3c988d34adb13cb1db0257c31f651b5e154e8bdc
-
kernel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:a22fbcdf9c4e84683e9063e999bd9f21ac07a81b7af3f5a91b5fd6d6b728b161
-
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:4015ba2bf2d24331db1ff7ccaf3502777af1d589eecfb3f827be19fd2ec28280
-
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:d220e7ee3dacb1b50ec5e1595c2881283baa6f6572ea5769ba2329821aab032a
-
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:51c929705ce9ea66b7266511652b6d9a32d9e325ce9678cf2c19c1656a46e859
-
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:3c0aa7c37081775af49d98fca66fcdb506a8542b15e357367c64401baa3a831a
-
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:a2724e7755aa3555839142fed757fa295364d38a4cb9abc1e12f9b572669230d
-
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:e3ffefac19f61568e591da1c7118b9a211a13e717bbece5ae1d9c953475643c0
-
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:4017a366cc66a295d526434b6a0d5dc72f17d8367ac0edd369fcb84a9673ffd2
-
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:16bc87ae13a5ca0b279244609da090259b6722a9f3d3b437cdbee75054a89c3c
-
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:267cbc1bc16dc767301d52bca99741a0902fd525c86f12244aaf9b9a5af39bc2
-
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:5da3f9e2462833481347da9cc88aebf79190e12bb1279c63205b1fdafe774e89
-
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:d87ebd951527c1b8810d55ee85ef2dde45b23c42af712cf6ae881efb1cd76e6a
-
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:cf119890796dbefab8533aef7800610e1a03254ad223f255fcbbae1d609108d1
-
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:353074ab1f6b2614d21e87c4f301e8ca3c7a963c5cbd49b617bc6e9b10232471
-
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:79f53b23917662b606de306c1cf177b29a32ba8b0d0ec0f4b44b7b03a35564e8
-
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:17affc32302c3ea49b7d228d96d86e4fd731b667318a1df7d34a4394fa65ae53
-
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:256f97442cd44c89eaa1aad13082e9fa41cc120b74884ea9cde88d6272fbd4c6
-
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:9cedca90de172e818fcde410ced99f1801a629019e5dbfc51745fe0c3cfc5598
-
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:3e7dcf9617432b6551551980811abf07fab30708587c17e488e3515d08d9288f
-
perf-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:f18002e131e277e344a2faab1b404fe533d943be73b0192c7b6b0b6b65955751
-
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
sha:2536ea18f87a69ab88b9b80b506c766223f7fb4fa38c58b18ca9bb39f16af0fd
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.