[CLSA-2026:1772815097] Fix of 72 CVEs
Type:
security
Severity:
Important
Release date:
2026-03-06 16:38:21 UTC
Description:
* CVE-2025-38699 - scsi: bfa: Double-free fix {CVE-2025-38699} * CVE-2025-38697 - jfs: upper bound check of tree index in dbAllocAG {CVE-2025-38697} * CVE-2025-39823 - KVM: x86: use array_index_nospec with indices that come from guest {CVE-2025-39823} * CVE-2025-39689 - ftrace: Also allocate and copy hash for reading of filter files {CVE-2025-39689} * CVE-2025-39749 - rcu: Protect ->defer_qs_iw_pending from data race {CVE-2025-39749} * CVE-2025-38728 - smb3: fix for slab out of bounds on mount to ksmbd {CVE-2025-38728} * CVE-2025-38676 - iommu/amd: Avoid stack buffer overflow from kernel cmdline {CVE-2025-38676} * CVE-2025-38574 - pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574} * CVE-2025-38572 - ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572} * CVE-2025-38685 - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685} * CVE-2025-38563 - vm_ops: rename .split() callback to .may_split() {CVE-2025-38563} - perf/core: Prevent VMA split of buffer mappings {CVE-2025-38563} * CVE-2025-38702 - fbdev: fix potential buffer overflow in do_register_framebuffer() {CVE-2025-38702} * CVE-2025-39911 - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911} * CVE-2025-39971 - i40e: fix idx validation in config queues msg {CVE-2025-39971} * CVE-2025-40154 - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154} * CVE-2025-39973 - i40e: increase max descriptors for XL710 {CVE-2025-39973} - i40e: add validation for ring_len param {CVE-2025-39973} * CVE-2022-49026 - e100: Fix possible use after free in e100_xmit_prepare {CVE-2022-49026} * CVE-2025-38724 - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724} * CVE-2025-39853 - i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853} * CVE-2025-39860 - Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() {CVE-2025-39860} * CVE-2025-39891 - wifi: mwifiex: Initialize the chan_stats array to zero {CVE-2025-39891} * CVE-2025-38530 - comedi: pcl812: Fix bit shift out of bounds {CVE-2025-38530} * CVE-2025-38529 - comedi: aio_iiro_16: Fix bit shift out of bounds {CVE-2025-38529} * CVE-2025-38497 - usb: gadget: configfs: Fix OOB read on empty string write {CVE-2025-38497} * CVE-2025-38483 - comedi: das16m1: Fix bit shift out of bounds {CVE-2025-38483} * CVE-2025-38482 - comedi: das6402: Fix bit shift out of bounds {CVE-2025-38482} * CVE-2025-39702 - ipv6: sr: Fix MAC comparison to be constant-time {CVE-2025-39702} * CVE-2025-39730 - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() {CVE-2025-39730} * CVE-2025-39841 - scsi: lpfc: Fix buffer free/clear order in deferred receive path {CVE-2025-39841} * CVE-2025-39817 - efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817} * CVE-2025-38494 - HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38494} - HID: core: ensure __hid_request reserves the report ID as the first byte {CVE-2025-38494} - HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494} * CVE-2025-39757 - ALSA: usb-audio: Validate UAC3 cluster segment descriptors {CVE-2025-39757} * CVE-2025-38527 - smb: client: fix use-after-free in cifs_oplock_break {CVE-2025-38527} * CVE-2023-52854 - padata: Fix refcnt handling in padata_free_shell() {CVE-2023-52854} * CVE-2024-35867 - smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867} * CVE-2024-50061 - i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition {CVE-2024-50061} * CVE-2025-39965 - xfrm: Duplicate SPI Handling {CVE-2025-39965} * CVE-2025-22107 - net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() {CVE-2025-22107} * CVE-2025-37928 - dm-bufio: don't schedule in atomic context {CVE-2025-37928} * CVE-2025-37927 - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid {CVE-2025-37927} * CVE-2025-37915 - net_sched: drr: Fix double list add in class with netem as child qdisc {CVE-2025-37915} * CVE-2025-37913 - net_sched: qfq: Fix double list add in class with netem as child qdisc {CVE-2025-37913} * CVE-2025-37817 - mcb: fix a double free bug in chameleon_parse_gdd() {CVE-2025-37817} * CVE-2025-38204 - jfs: fix array-index-out-of-bounds read in add_missing_indices {CVE-2025-38204} * CVE-2025-38323 - net: atm: add lec_mutex {CVE-2025-38323} * CVE-2025-38346 - ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346} * CVE-2025-38348 - wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() {CVE-2025-38348} * CVE-2025-38415 - Squashfs: check return result of sb_min_blocksize {CVE-2025-38415} * CVE-2025-38416 - NFC: nci: uart: Set tty->disc_data only in success path {CVE-2025-38416} * CVE-2025-38428 - Input: ims-pcu - check record size in ims_pcu_flash_firmware() {CVE-2025-38428} * CVE-2025-38102 - VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102} * CVE-2025-38245 - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245} * CVE-2025-38249 - ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249} * CVE-2025-38377 - rose: fix dangling neighbour pointers in rose_rt_device_down() {CVE-2025-38377} * CVE-2025-38389 - drm/i915/gt: Fix timeline left held on VMA alloc error {CVE-2025-38389} * CVE-2025-38395 - regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods {CVE-2025-38395} * CVE-2025-38401 - mtk-sd: Prevent memory corruption from DMA map failure {CVE-2025-38401} * CVE-2025-38445 - md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445} * CVE-2025-38459 - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} * CVE-2025-39863 - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863} * CVE-2025-38068 - crypto: lzo - Fix compression buffer overrun {CVE-2025-38068} * CVE-2025-21726 - padata: avoid UAF for reorder_work {CVE-2025-21726} * CVE-2025-39760 - usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760} * CVE-2022-49698 - netfilter: use get_random_u32 instead of prandom {CVE-2022-49698} * CVE-2025-38198 - fbcon: Introduce wrapper for console->fb_info lookup {CVE-2025-38198} - fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198} * CVE-2025-38422 - net: lan743x: Add support for 4 Tx queues {CVE-2025-38422} - net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices {CVE-2025-38422} - net: lan743x: Add PCI11010 / PCI11414 device IDs {CVE-2025-38422} * CVE-2025-38375 - virtio-net: ensure the received length does not exceed allocated size {CVE-2025-38375} * CVE-2025-39901 - i40e: remove read access to debugfs files {CVE-2025-39901} * CVE-2025-39810 - bnxt_en: Fix memory corruption when FW resources change during ifdown {CVE-2025-39810} * CVE-2025-39905 - net: phylink: add lock for serializing concurrent pl->phydev writes with resolver {CVE-2025-39905} * CVE-2025-39993 - media: imon: reorganize serialization {CVE-2025-39993} - media: rc: fix races with imon_disconnect() {CVE-2025-39993} * CVE-2025-39883 - mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883} * Miscellaneous upstream changes - net: atm: fix /proc/net/atm/lec handling {CVE-2025-38323}
Updated packages:
  • linux-buildinfo-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:52446849e96cb84f089883ea24afc60e8fdc9231
  • linux-buildinfo-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:5dcc895a78b57e6c595e385d50508746b626d7c3
  • linux-cloud-tools-5.4.0-225-tuxcare.els7_5.4.0-225.245_amd64.deb
    sha:21b0b2e2c56672bb3ea6628dd3b3b7d1cc7824f3
  • linux-cloud-tools-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:eaac2c73a1bb562f86aeb9320a99774856da1713
  • linux-cloud-tools-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:7b5d3a08891918eb831dad3f662b8b0cf5b41b3c
  • linux-cloud-tools-common_5.4.0-225.245_all.deb
    sha:144048735337ce4cc321235ade87e078b08566b2
  • linux-doc_5.4.0-225.245_all.deb
    sha:47750920791ef44930f72f33d94adba9bc5cf422
  • linux-headers-5.4.0-225-tuxcare.els7_5.4.0-225.245_all.deb
    sha:da83fc609868948bde05c5ac1cb97bf3cc302566
  • linux-headers-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:ed2f7197879838deecd3eeef0b56d8289b65cb86
  • linux-headers-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:82bc0f174f0ac3d767d11e3b5225547583f7e584
  • linux-image-unsigned-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:746d28a48998fb3678ec50372d43d487ccd33e03
  • linux-image-unsigned-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:fe8800070518c5a8542a24751b32c0645f45e200
  • linux-libc-dev_5.4.0-225.245_amd64.deb
    sha:8cf87776a1ca03e856f03eac633476a78a21ff52
  • linux-modules-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:4de9ff51409f291b0fcf978146f97bcd4dbe37eb
  • linux-modules-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:dd69bce95fb2a61a40aab616cc2f80b68531b6b9
  • linux-modules-extra-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:fbd1fca63ab1e8aa2c0ad2dbb11bb023c81800f1
  • linux-source-5.4.0_5.4.0-225.245_all.deb
    sha:d437f1b2f02dbe607fc4fad97cbd059b17f35e92
  • linux-tools-5.4.0-225-tuxcare.els7_5.4.0-225.245_amd64.deb
    sha:533cfb0ac2285da60a001f99a33ba4969c72171b
  • linux-tools-5.4.0-225-tuxcare.els7-generic_5.4.0-225.245_amd64.deb
    sha:77bded36806a4790ab11ae7e77d032e34af7d7d6
  • linux-tools-5.4.0-225-tuxcare.els7-lowlatency_5.4.0-225.245_amd64.deb
    sha:8c015db2928cba7c93fd31cbd3ca60bf645aaf79
  • linux-tools-common_5.4.0-225.245_all.deb
    sha:9a8710bd5ee8a407d1083a0096e549045c486283
  • linux-tools-host_5.4.0-225.245_all.deb
    sha:5229dbe14c05a1e546fcfbfda1173a677d0d3c5c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.