Release date:
2026-04-03 17:49:22 UTC
Description:
* CVE-2025-39683
- tracing: Remove unneeded goto out logic {CVE-2025-39683}
- tracing: Limit access to parser->buffer when trace_get_user failed
{CVE-2025-39683}
* CVE-2025-38079
- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}
* CVE-2025-38159
- wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
{CVE-2025-38159}
* CVE-2025-38211
- RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
{CVE-2025-38211}
* CVE-2025-38024
- RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug
{CVE-2025-38024}
* CVE-2025-38103
- HID: hyperv: Correctly access fields declared as __le16 {CVE-2025-38103}
- HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()
{CVE-2025-38103}
* CVE-2025-38157
- wifi: ath9k_htc: Abort software beacon handling if disabled
{CVE-2025-38157}
* CVE-2025-38230
- jfs: add sanity check for agwidth in dbMount {CVE-2025-38230}
- fs/jfs: consolidate sanity checking in dbMount {CVE-2025-38230}
- jfs: validate AG parameters in dbMount() to prevent crashes
{CVE-2025-38230}
* CVE-2025-39955
- tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
{CVE-2025-39955}
* CVE-2025-38680
- media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
{CVE-2025-38680}
* CVE-2025-38708
- drbd: add missing kref_get in handle_write_conflicts {CVE-2025-38708}
* CVE-2025-39759
- btrfs: qgroup: introduce quota mode {CVE-2025-39759}
- btrfs: qgroup: fix race between quota disable and quota rescan ioctl
{CVE-2025-39759}
* CVE-2025-38666
- net: appletalk: Fix use-after-free in AARP proxy probe {CVE-2025-38666}
* CVE-2025-40269
- ALSA: usb-audio: Improve frames size computation {CVE-2025-40269}
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate
{CVE-2025-40269}
- ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
{CVE-2025-40269}
* CVE-2025-40149
- net: netdevice: Add operation ndo_sk_get_lower_dev {CVE-2025-40149}
- net/tls: Device offload to use lowest netdevice in chain
{CVE-2025-40149}
- tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().
{CVE-2025-40149}
* CVE-2025-71089
- iommu: disable SVA when CONFIG_X86 is set {CVE-2025-71089}
* CVE-2026-23234
- f2fs: fix to avoid UAF in f2fs_write_end_io() {CVE-2026-23234}
* CVE-2026-23089
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
{CVE-2026-23089}
* CVE-2026-23074
- net/sched: Enforce that teql can only be used as root qdisc
{CVE-2026-23074}
* CVE-2026-23061
- can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak
{CVE-2026-23061}
* CVE-2026-23060
- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN
spec {CVE-2026-23060}
* CVE-2026-22997
- net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session
upon receiving the second rts {CVE-2026-22997}
* CVE-2026-22991
- libceph: make free_choose_arg_map() resilient to partial allocation
{CVE-2026-22991}
* CVE-2026-22990
- libceph: replace overzealous BUG_ON in osdmap_apply_incremental()
{CVE-2026-22990}
* CVE-2026-22978
- wifi: avoid kernel-infoleak from struct iw_point {CVE-2026-22978}
* CVE-2026-22977
- net: sock: fix hardened usercopy panic in sock_recv_errqueue
{CVE-2026-22977}
* CVE-2025-71154
- net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
{CVE-2025-71154}
* CVE-2025-71085
- ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
{CVE-2025-71085}
* CVE-2025-68734
- isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()
{CVE-2025-68734}
* CVE-2025-68349
- NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
pnfs_mark_layout_stateid_invalid {CVE-2025-68349}
* CVE-2025-68340
- team: Move team device type change at the end of team_port_add
{CVE-2025-68340}
* CVE-2025-68325
- net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop
{CVE-2025-68325}
* CVE-2025-68287
- usb: dwc3: Fix race condition between concurrent dwc3_remove_requests()
call paths {CVE-2025-68287}
* CVE-2025-68285
- libceph: fix potential use-after-free in have_mon_and_osd_map()
{CVE-2025-68285}
* CVE-2025-68241
- ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
{CVE-2025-68241}
* CVE-2025-68229
- scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
{CVE-2025-68229}
* CVE-2025-68220
- net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return
NULL on error {CVE-2025-68220}
* CVE-2025-68194
- media: imon: make send_packet() more robust {CVE-2025-68194}
* CVE-2025-68192
- net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup
{CVE-2025-68192}
* CVE-2025-68185
- nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode
dereferencing {CVE-2025-68185}
* CVE-2025-68168
- jfs: fix uninitialized waitqueue in transaction manager {CVE-2025-68168}
* CVE-2025-40363
- net: ipv6: fix field-spanning memcpy warning in AH output
{CVE-2025-40363}
* CVE-2025-40331
- sctp: Prevent TOCTOU out-of-bounds write {CVE-2025-40331}
* CVE-2025-40322
- fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}
* CVE-2025-40317
- regmap: slimbus: fix bus_context pointer in regmap init calls
{CVE-2025-40317}
* CVE-2025-40315
- usb: gadget: f_fs: Fix epfile null pointer access after ep enable.
{CVE-2025-40315}
* CVE-2025-40309
- Bluetooth: SCO: Fix UAF on sco_conn_free {CVE-2025-40309}
* CVE-2025-40308
- Bluetooth: bcsp: receive data only if registered {CVE-2025-40308}
* CVE-2025-40306
- orangefs: fix xattr related buffer overflow... {CVE-2025-40306}
* CVE-2025-40304
- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
{CVE-2025-40304}
* CVE-2025-40283
- Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
{CVE-2025-40283}
* CVE-2025-40282
- Bluetooth: 6lowpan: reset link-local header on ipv6 recv path
{CVE-2025-40282}
* CVE-2025-40277
- drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
{CVE-2025-40277}
* CVE-2025-40275
- ALSA: usb-audio: Fix NULL pointer dereference in
snd_usb_mixer_controls_badd {CVE-2025-40275}
* CVE-2025-40264
- be2net: pass wrb_params in case of OS2BMC {CVE-2025-40264}
* CVE-2025-40263
- Input: cros_ec_keyb - fix an invalid memory access {CVE-2025-40263}
* CVE-2025-40259
- scsi: sg: Do not sleep in atomic context {CVE-2025-40259}
* CVE-2025-40254
- net: openvswitch: remove never-working support for setting nsh fields
{CVE-2025-40254}
* CVE-2025-40248
- vsock: Ignore signal/timeout on connect() if already established
{CVE-2025-40248}
* CVE-2025-40211
- ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
{CVE-2025-40211}
* CVE-2025-40106
- comedi: fix divide-by-zero in comedi_buf_munge() {CVE-2025-40106}
* CVE-2025-40087
- NFSD: Define a proc_layoutcommit for the FlexFiles layout type
{CVE-2025-40087}
* CVE-2025-40055
- ocfs2: fix double free in user_cluster_connect() {CVE-2025-40055}
* CVE-2025-39945
- cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}
* CVE-2025-39738
- btrfs: do proper error handling in create_reloc_root {CVE-2025-39738}
- btrfs: do not allow relocation of partially dropped subvolumes
{CVE-2025-39738}
* CVE-2025-39685
- comedi: pcl726: Prevent invalid irq number {CVE-2025-39685}
* CVE-2024-46830
- KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS
{CVE-2024-46830}
* CVE-2024-41014
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
* CVE-2025-39866
- fs: writeback: fix use-after-free in __mark_inode_dirty()
{CVE-2025-39866}
* CVE-2025-39686
- comedi: Fix some signed shift left operations {CVE-2025-39686}
- comedi: Make insn_rw_emulate_bits() do insn->n samples {CVE-2025-39686}
* CVE-2025-39766
- net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
{CVE-2025-39766}
* CVE-2025-39828
- net/atm: remove the atmdev_ops {get, set}sockopt methods
{CVE-2025-39828}
- atm: atmtcp: Free invalid length skb in atmtcp_c_send().
{CVE-2025-39828}
- atm: Revert atm_account_tx() if copy_from_iter_full() fails.
{CVE-2025-39828}
- atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control().
{CVE-2025-39828}
* CVE-2022-49267
- mmc: core: Do not export MMC_NAME= and MODALIAS=mmc:block for SDIO cards
{CVE-2022-49267}
- mmc: core: Export device/vendor ids from Common CIS for SDIO cards
{CVE-2022-49267}
- mmc: sdio: Extend sdio_config_attr macro and use it also for modalias
{CVE-2022-49267}
- mmc: sdio: Export SDIO revision and info strings to userspace
{CVE-2022-49267}
- mmc: sdio: Parse CISTPL_VERS_1 major and minor revision numbers
{CVE-2022-49267}
- mmc: core: use sysfs_emit() instead of sprintf() {CVE-2022-49267}
* CVE-2025-39967
- fbcon: fix integer overflow in fbcon_do_set_font {CVE-2025-39967}
* CVE-2025-38108
- net_sched: red: fix a race in __red_change() {CVE-2025-38108}
* CVE-2025-38212
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
* CVE-2025-38403
- vsock/vmci: Clear the vmci transport packet properly when initializing
it {CVE-2025-38403}
* CVE-2025-38464
- tipc: Fix use-after-free in tipc_conn_close(). {CVE-2025-38464}
* CVE-2025-38555
- usb: gadget : fix use-after-free in composite_dev_cleanup()
{CVE-2025-38555}
* CVE-2025-38652
- f2fs: fix to avoid out-of-boundary access in devs.path {CVE-2025-38652}
* CVE-2025-38677
- f2fs: fix to avoid out-of-boundary access in dnode page {CVE-2025-38677}
* CVE-2025-38713
- hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
{CVE-2025-38713}
* CVE-2025-38714
- hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() {CVE-2025-38714}
* CVE-2025-38715
- hfs: fix slab-out-of-bounds in hfs_bnode_read() {CVE-2025-38715}
* CVE-2025-38729
- ALSA: usb-audio: Validate UAC3 power domain descriptors, too
{CVE-2025-38729}
* CVE-2025-39691
- fs/buffer: fix use-after-free when call bh_read() helper
{CVE-2025-39691}
* CVE-2025-39743
- jfs: truncate good inode pages when hard link is 0 {CVE-2025-39743}
* CVE-2025-39783
- PCI: endpoint: Fix configfs group list head handling {CVE-2025-39783}
* CVE-2025-39824
- HID: asus: fix UAF via HID_CLAIMED_INPUT validation {CVE-2025-39824}
* CVE-2025-39839
- batman-adv: fix OOB read/write in network-coding decode {CVE-2025-39839}
* CVE-2025-39913
- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to
allocate psock->cork. {CVE-2025-39913}
* CVE-2025-40240
- sctp: avoid NULL dereference when chunk data buffer is missing
{CVE-2025-40240}
* CVE-2025-38004
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
* Miscellaneous upstream changes
- wifi: wilc1000: avoid buffer overflow in WID string configuration
{CVE-2025-39952}
- Revert "dm-bufio: don't schedule in atomic context {CVE-2025-37928}"
Updated packages:
-
linux-buildinfo-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:fba69923821c76489265ecc6f8e4fe0750b0a949
-
linux-buildinfo-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:a8dc7b13a1534517b4b1a08359d7db6ae9946466
-
linux-cloud-tools-5.4.0-226-tuxcare.els8_5.4.0-226.246_amd64.deb
sha:593f4e534630353b0067f9f1ae23984fc32c512d
-
linux-cloud-tools-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:75a3a58427b60650a52083dea0ab9da5fe548cf4
-
linux-cloud-tools-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:8c17f444028b8f8e4ec3cf927d5206ba6be7b8aa
-
linux-cloud-tools-common_5.4.0-226.246_all.deb
sha:3fb6e12b4ce1a2c1ef919dad5a248d596dcc20fc
-
linux-doc_5.4.0-226.246_all.deb
sha:f6be33387cfe4fffae0ad6a2519b543f9f70a57f
-
linux-headers-5.4.0-226-tuxcare.els8_5.4.0-226.246_all.deb
sha:610f3cded12a6e202c9236c45eb7534bc0e61677
-
linux-headers-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:0cb99d6f40dfa7e4513b452b9949129379b113c0
-
linux-headers-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:8487afb46b73b210a677f1697d4da4c71cb2ddb6
-
linux-image-unsigned-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:2d1bb45cdaf879d9f5c6993650ce22cb59dd8265
-
linux-image-unsigned-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:6fc8d60932b173ca96ceaaf5c181c4e3587231a2
-
linux-libc-dev_5.4.0-226.246_amd64.deb
sha:39b8d88e41318a5a7e2953f5d9a9aaa9a3632566
-
linux-modules-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:7f92105fef0d709641b7d2bc4e6289008b41abe3
-
linux-modules-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:0c99a4f284e253aee2440f54aaa200e4878673f8
-
linux-modules-extra-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:1575afbff58c96cd6ff6cc1f750d312564b05785
-
linux-source-5.4.0_5.4.0-226.246_all.deb
sha:ff891a9698764b67bbf52d0ea4cb40e54325ebf3
-
linux-tools-5.4.0-226-tuxcare.els8_5.4.0-226.246_amd64.deb
sha:ad972f86f8aa789115769781cdc2dc47ef3b9d32
-
linux-tools-5.4.0-226-tuxcare.els8-generic_5.4.0-226.246_amd64.deb
sha:3b6048b3bcc974a2240cf15322fdd33878e15902
-
linux-tools-5.4.0-226-tuxcare.els8-lowlatency_5.4.0-226.246_amd64.deb
sha:69f1bfcf15df0e930eda90922a91e5960977560d
-
linux-tools-common_5.4.0-226.246_all.deb
sha:2485e111021c2d9981103028b705075b2d3f8857
-
linux-tools-host_5.4.0-226.246_all.deb
sha:270a201fd2d3793daae42cd791e8f1f883c14bb5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.