Release date:
2026-02-14 15:03:03 UTC
Description:
- HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38495}
- fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271}
- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer {CVE-2025-40269}
- Bluetooth: ISO: Fix possible UAF on iso_conn_free {CVE-2025-40141}
- Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once {CVE-2025-40318}
- smb3: fix for slab out of bounds on mount to ksmbd {CVE-2025-38728}
- pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}
- ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}
- fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702}
- i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911}
- bus: mhi: host: Detect events pointing to unexpected TREs {CVE-2025-39790}
- nvmet: fix out-of-bounds access in nvmet_enable_port {CVE-2025-37825}
- drm/xe: Make dma-fences compliant with the safe access rules {CVE-2025-38703}
- libceph: fix invalid accesses to ceph_connection_v1_info {CVE-2025-39880}
- fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass {CVE-2025-38396}
- anon_inode: explicitly block ->setattr()
- anon_inode: use a proper mode internally
- dynamic_dname(): drop unused dentry argument
- anon_inode: raise SB_I_NODEV and SB_I_NOEXEC
- Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete {CVE-2025-38118}
- Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync {CVE-2024-58013}
- drm/xe: Fix vm_bind_ioctl double free bug {CVE-2025-38731}
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() {CVE-2025-38680}
- HID: core: ensure __hid_request reserves the report ID as the first byte
- wifi: mwifiex: Initialize the chan_stats array to zero {CVE-2025-39891}
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
- usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760}
- fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}
- drm/i915: Protect access to driver and timeline name
- sync_file: Protect access to driver and timeline name
- dma-fence: Add safe access helpers and document the rules
- VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
- net: phylink: add lock for serializing concurrent pl->phydev writes with resolver {CVE-2025-39905}
- HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() {CVE-2025-39806}
- vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618}
- mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883}
- md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445}
- drm/i915/gt: Fix timeline left held on VMA alloc error {CVE-2025-38389}
- ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249}
- i40e: remove read access to debugfs files {CVE-2025-39901}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- bnxt_en: Fix memory corruption when FW resources change during ifdown {CVE-2025-39810}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- nbd: fix uaf in nbd_genl_connect() error path {CVE-2025-38443}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods {CVE-2025-38395}
- virtio-net: ensure the received length does not exceed allocated size {CVE-2025-38375}
- ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}
- sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- software node: Correct a OOB check in software_node_get_reference_args() {CVE-2025-38342}
- net: atm: add lec_mutex {CVE-2025-38323}
- arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() {CVE-2025-38320}
- bpf: Avoid __bpf_prog_ret0_warn when jit fails {CVE-2025-38280}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- exfat: fix double free in delayed_free {CVE-2025-38206}
- fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- net: openvswitch: Fix the dead loop of MPLS parse {CVE-2025-38146}
- net/mdiobus: Fix potential out-of-bounds read/write access {CVE-2025-38111}
- net_sched: red: fix a race in __red_change() {CVE-2025-38108}
- HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103}
- platform/x86: dell-wmi-sysman: Avoid buffer overflow in current_password_store() {CVE-2025-38077}
- crypto: lzo - Fix compression buffer overrun {CVE-2025-38068}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug {CVE-2025-38024}
- wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request {CVE-2025-38013}
- i40e: add validation for ring_len param {CVE-2025-39973}
- libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285}
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277}
- net: atlantic: fix fragment overflow handling in RX path {CVE-2025-68301}
- ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154}
- eventpoll: don't decrement ep refcount while still holding the ep mutex {CVE-2025-38349}
- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind {CVE-2025-68305}
- Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() {CVE-2025-40294}
- mptcp: fix race condition in mptcp_schedule_work() {CVE-2025-40258}
- vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}
- dm: fix dm_blk_report_zones {CVE-2025-38141}
- devlink: rate: Unset parent pointer in devl_rate_nodes_destroy {CVE-2025-40251}
- net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing {CVE-2025-38568}
- RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem {CVE-2025-38022}
Updated packages:
-
kernel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:2c20d095947e7077e4b30b31b37815c4e67d4bbc1bde6e410eddff57238a1415
-
kernel-abi-stablelists-5.14.0-570.62.1.el9_6.tuxcare.1.els2.noarch.rpm
sha:cf353089aa436e9bce97fca98ab188b38d3a7cfe6daa5b552d5b5237c0cc40b9
-
kernel-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:270e3e8bba572d18f0d21a5ad7c5e2f2cc38607454030b70654fa476f65cf213
-
kernel-cross-headers-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:86f38664a538021a320d0c5d1579e71888fc669fec0a2df3220fdcb9bf83a6f0
-
kernel-debug-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:9a31a38d63c89951697b37536d7b390dc533b3a0a33c6abaac7b3c911edbed6d
-
kernel-debug-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:a53c00716c2d8aa21e6a14b77229d29af01a196b80246d8262d31840744bbbb5
-
kernel-debug-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:c6e40e5fd1e83e1bef3e30085ef76a86ebda02c5df1e05eaabecc81bbad6b8f2
-
kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:6e21643184439b40c67c212013a5d6cd368a34f7c7a3a0e66195286cb84862b7
-
kernel-debug-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:8b469b713123ec997d54c68767ed1476a5f940d29ee6518f226cb5b5576294bd
-
kernel-debug-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:be3ef9221e684eb507d609fd85f57578137237915179e0c654419f056f4a0825
-
kernel-debug-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:6693eb8c4c6f9c583e82492d92fede1a186595c2b297a5696269b2649d658050
-
kernel-debug-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:5c93210ae1ab62cdf0e0076222be84a95ae41753b5a609ef92a089a35cd36cfc
-
kernel-debug-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:ee1377f97a7edcf73b891a166f3e70e89526541369a5afe86e505fbc181294ed
-
kernel-debug-uki-virt-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:fb31840b09cdfd9be31bd7ec8ff8381ec4fb10018edce97a2dcee8b02bfc0a50
-
kernel-debug-uki-virt-addons-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:9db855a0df0b4a6a4dadbd31850d5b6473bc3067a890c914525adbfa8944c94a
-
kernel-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:4ea3b4a84d13a743e9af5db23e3d6f14c8191933b03ba7d6dab6e97cdc590a63
-
kernel-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:a12cb05305ec3c86267614be40345e88cb7a9074c53df122b612d2d4362683fe
-
kernel-doc-5.14.0-570.62.1.el9_6.tuxcare.1.els2.noarch.rpm
sha:18405f4686d60cac25f8956829b716f58bb894e07f8590ce1a86e558ef8db6df
-
kernel-headers-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:ffea47ac6b0d0b84bf5fa1eec219f8c1f80dea1083ec431a630c41a43483847e
-
kernel-ipaclones-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:2fdfd2158c03cf94666a70beea48e1ba89b9d73b31fc106cd000229df92a2532
-
kernel-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:96a9400e7a2b6db24f2ca8cf40c47b4486c24980a478323beb5562f32cad526f
-
kernel-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:39fc525c40637ef6dd5bf74edce7a143119e040f8496528c40162de5c402e50e
-
kernel-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:48236c37e1fad78e88041f0f40d4cb398f4bd46f08a522cb21548bd0d724b182
-
kernel-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:12eb44162cfbc3c3a643195b8273df011b559e34feacd0cd1168588bf8747ed2
-
kernel-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:023855ccd8f9897f9d94b393443043977a1160cb4e8d74a01f8bb7ae35dcbdb1
-
kernel-rt-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:4e901d3c9b0f92dcf7c0d91cf7fe102b468183ad23d5e881471f415db64c0ed9
-
kernel-rt-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:dc803560728b0d68b68b370affa9e5a545bd0dcd4cc2c5bd4965fbd6f4be63ca
-
kernel-rt-debug-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:6049a93354dc5313d1ac45ee24bbc0ed3cb3809c773c0e3ca773ed8a8fffe347
-
kernel-rt-debug-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:df6df15ea2f43c1984e89f9e1ad877ec784e3ab4fe03c3c5decada2ba5cf0e1b
-
kernel-rt-debug-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:605cc148c5b986cbacab9633db94fee7e08fd81a33e84341dcef65289b8484ec
-
kernel-rt-debug-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:fcdabcaa35f1a199db21795379b0d985917f212da1adf3ee85e1e237d801571f
-
kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:56a5cf71f1690afe04804613a559a979dc4543b20316113b413e5888f47e5f31
-
kernel-rt-debug-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:757ccfc9aa6cd22d1f234eaff432b21a54b75398e269a0fb38c971f830c24f0a
-
kernel-rt-debug-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:042aee57c6446afd5609cddca2ce362565de36f379c5b99ea11f4ad4963b8a59
-
kernel-rt-debug-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:be93308d5fa5856dc53f13cc148844307c9be593107755babdf82331e15ad0f6
-
kernel-rt-debug-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:d70fbc25c57653d2d8e8e2a8ee8e1933e45cb2145579b7e97db512b7008ce34a
-
kernel-rt-debug-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:54b755e1a761fb948e0a944d66f701d22e233713790c9f13a0ee4ffba9e598f2
-
kernel-rt-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:64287d84c754d3dbfb4f39c21a675a934f2fa8b6f3ce5cc1f458fcbf77418571
-
kernel-rt-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:5ac418bc53535eaddf1775fcc16605e10ced4a33d9a99d644ef226b26b125e8b
-
kernel-rt-kvm-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:468e84c98fcba94f704f05a004a1746b65f5c62a76b4a0ae15ddd6add948bdd6
-
kernel-rt-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:b1fdbabb502d13485654e49f7931e85d63d752548dd0ce2b63ea88c01d594c68
-
kernel-rt-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:d71ee6774f6e6524ab32f3818ecabcf7992128658f654ff55425e44ba7dabea3
-
kernel-rt-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:f804c992fc2bf3e31d6f45ecba0ab219c127542a28646c7a9a8e0afcbc4a8967
-
kernel-rt-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:ccf48c8df54cc1ba5b5673b1b4af18542f38c475a2aa45cef88ef05f953b12bb
-
kernel-rt-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:73a315dd6e8d4664d40ec7ebc423b7c0c2d6c38a89161ea356a3e567252b4776
-
kernel-selftests-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:e235ebc125dd6bba9888a74ce0df323d02031b376405052f241bfed9a2e8078c
-
kernel-tools-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:c61aa394d4e688fbca951da61b3fce65ab8b48f0989d612520dae3406b778a9e
-
kernel-tools-libs-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:490159f4a708097aa0b96f9eb62a443e006ec3bce2c49b83828336cdb4f1b1e1
-
kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:9a1ab961b74a56ec312d382f73e32c9f898ddb1246f7463a3043e244ee261fed
-
kernel-uki-virt-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:0625fd74aaf5265dae3d38b2b31b13a90f8da44b328b8be8831c25ced146efe4
-
kernel-uki-virt-addons-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:cdebe0523d8f4d403d2bf07cf66ea9ee2273e3695b10cafa111d636d13d436e1
-
libperf-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:9a2025d665754154f75af2170ddab93b941ee8bfe7d3c23b337d729f77cc2e30
-
libperf-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:72fe59737418a3d8183455fa658a8813c09408a3dcf977a7cb5a9d1418fff567
-
perf-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:31dd1d5dd5bfc44026c7b5e37e5f89423f4142adb372e4a3b58a71dc7ade3815
-
python3-perf-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:7bc0fd28a1d4577a41cf54f5c5eeeb807cd400770a277910bec89c961216f969
-
rtla-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:7f296809be2f7ed917cd32371b71e172e1703676c87398ec8abe42fa44717970
-
rv-5.14.0-570.62.1.el9_6.tuxcare.1.els2.x86_64.rpm
sha:c89e7cfd6fc05683e9070bca53482b4294d3d90bf3140dc318ca2ff6b4c55f94
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.