Release date:
2026-05-01 09:15:50 UTC
Description:
- crypto: algif_aead - Fix minimum RX size check for decryption {CVE-2026-31431}
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl {CVE-2026-31431}
- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec {CVE-2026-31431}
- crypto: authencesn - Fix src offset when decrypting in-place {CVE-2026-31431}
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption {CVE-2026-31431}
- crypto: authenc - use memcpy_sglist() instead of null skcipher {CVE-2026-31431}
- crypto: algif_aead - snapshot IV for async AEAD requests {CVE-2026-31431}
- crypto: algif_aead - Revert to operating out-of-place {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher {CVE-2026-31431}
- crypto: scatterwalk - Backport memcpy_sglist() {CVE-2026-31431}
- wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() {CVE-2022-50551}
- bonding: limit BOND_MODE_8023AD to Ethernet devices {CVE-2026-23099}
- libceph: make decode_pool() more resilient against corrupted osdmaps {CVE-2025-71116}
- scsi: qla2xxx: Fix bsg_done() causing double free {CVE-2025-71238}
- ftrace: Fix use-after-free for dynamic ftrace_ops {CVE-2022-49892}
- intel_th: msu: Fix vmalloced buffers {CVE-2022-50142}
- vt: Clear selection before changing the font {CVE-2022-49948}
- ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411}
- usbnet: Run unregister_netdev() before unbind_all() {CVE-2022-50220}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- bpf: Propagate error from htab_lock_bucket() to userspace {CVE-2022-50490}
- binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497}
- module: fix [e_shstrndx].sh_size=0 OOB access {CVE-2022-49444}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- tracing: Fix potential double free in create_var_ref() {CVE-2022-49410}
- powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue {CVE-2022-50366}
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- xsk: Fix xsk_diag use-after-free error during socket cleanup {CVE-2023-53426}
- svcrdma: bound check rq_pages index in inline path {CVE-2025-71068}
- net: hns3: add VLAN id validation before using {CVE-2025-71112}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315}
- i2c: piix4: Fix adapter not be removed in piix4_remove() {CVE-2022-49900}
- team: fix check for port enabled in team_queue_override_port_prio_changed() {CVE-2025-71091}
- staging: vme_user: Fix possible UAF in tsi148_dma_list_add {CVE-2022-50384}
- ALSA: ctxfi: Fix potential OOB access in audio mixer handling {CVE-2026-23076}
- ftrace: Add cond_resched() to ftrace_graph_set_hash() {CVE-2025-37940}
- net: stmmac: Fix accessing freed irq affinity_hint {CVE-2025-23155}
- ext4: set goal start correctly in ext4_mb_normalize_request {CVE-2023-54021}
- netfilter: ipset: fix region locking in hash types {CVE-2025-37997}
- openvswitch: Fix unsafe attribute parsing in output_userspace() {CVE-2025-37998}
- wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() {CVE-2025-37990}
- nfs: handle failure of nfs_get_lock_context in unlock path {CVE-2025-38023}
- drm/amd/pm: Prevent division by zero {CVE-2025-37767}
- netfilter: ctnetlink: remove refcounting in expectation dumpers {CVE-2025-39764}
- tracing: Fix null pointer dereference in tracing_err_log_open() {CVE-2023-53167}
- ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386}
- scsi: qla2xxx: Pointer may be dereferenced {CVE-2023-53150}
- net: pktgen: fix access outside of user given buffer in pktgen_thread_write() {CVE-2025-38061}
- dm cache: prevent BUG_ON by blocking retries on failed device resumes {CVE-2025-38066}
- libnvdimm/labels: Fix divide error in nd_label_data_init() {CVE-2025-38072}
- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() {CVE-2023-53251}
- tracing: Free error logs of tracing instances {CVE-2023-53375}
- perf: Revert to requiring CAP_SYS_ADMIN for uprobes {CVE-2025-38466}
- gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO {CVE-2025-38122}
- dma-buf: insert memory barrier before updating num_fences {CVE-2025-38095}
- x86/sgx: Prevent attempts to reclaim poisoned pages {CVE-2025-38334}
- ext4: inline: fix len overflow in ext4_prepare_inline_data {CVE-2025-38222}
- fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var {CVE-2025-38214}
- sctp: initialize more fields in sctp_v6_from_sk() {CVE-2025-39812}
- atm: Revert atm_account_tx() if copy_from_iter_full() fails. {CVE-2025-38190}
- usb: net: sierra: check for no status endpoint {CVE-2025-38474}
- vxlan: Annotate FDB data races {CVE-2025-38037}
- tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer {CVE-2025-38184}
- calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). {CVE-2025-38181}
- net_sched: sch_sfq: fix a potential crash on gso_skb handling {CVE-2025-38115}
- RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert {CVE-2025-38387}
- jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() {CVE-2025-38337}
- mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). {CVE-2025-38324}
- fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() {CVE-2025-38312}
- usb: typec: altmodes/displayport: do not index invalid pin_assignments {CVE-2025-38391}
- nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request {CVE-2025-38430}
- wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb() {CVE-2022-50829}
- wifi: mt76: disable napi on driver removal {CVE-2025-38009}
- ftrace: Fix potential warning in trace_printk_seq during ftrace_dump {CVE-2025-39813}
- net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457}
- scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() {CVE-2026-23216}
- Bluetooth: btusb: revert use of devm_kzalloc in btusb {CVE-2025-71082}
- e1000: fix OOB in e1000_tbi_should_accept() {CVE-2025-71093}
- RDMA/irdma: avoid invalid read in irdma_net_event {CVE-2025-71133}
- scsi: qla4xxx: Prevent a potential error pointer dereference {CVE-2025-39676}
- ppp: fix race conditions in ppp_fill_forward_path {CVE-2025-39673}
- libceph: replace overzealous BUG_ON in osdmap_apply_incremental() {CVE-2026-22990}
- thunderbolt: Do not double dequeue a configuration request {CVE-2025-38174}
- bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT {CVE-2025-38439}
- ACPICA: fix acpi operand cache leak in dswstate.c {CVE-2025-38345}
- atm: clip: Fix potential null-ptr-deref in to_atmarpd(). {CVE-2025-38460}
- dm: fix unconditional IO throttle caused by REQ_PREFLUSH {CVE-2025-38063}
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs {CVE-2023-53391}
- nfsd: Initialize ssc before laundromat_work to prevent NULL dereference {CVE-2025-38231}
- udf: Do not update file length for failed writes to inline files {CVE-2023-53295}
- bpf: Fix WARN() in get_bpf_raw_tp_regs {CVE-2025-38285}
- net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree {CVE-2025-38468}
- nvmet-tcp: don't restore null sk_state_change {CVE-2025-38035}
- wifi: iwlwifi: mvm: fix double free on tx path. {CVE-2022-50248}
- ACPICA: fix acpi parse and parseext cache leaks {CVE-2025-38344}
- bonding: fix use-after-free due to enslave fail after slave array update {CVE-2026-23171}
- macvlan: fix error recovery in macvlan_common_newlink() {CVE-2026-23209}
- cxl/acpi: Fix a use-after-free in cxl_parse_cfmws() {CVE-2023-53479}
- fbcon: Fix OOB access in font allocation
- fbcon: fix integer overflow in fbcon_do_set_font {CVE-2025-39967}
- ALSA: aloop: Fix racy access at PCM trigger {CVE-2026-23191}
- rename(): fix the locking of subdirectories
- scsi: qedi: Fix use after free bug in qedi_remove() {CVE-2023-54100}
- ixgbe: Fix panic during XDP_TX with > 64 CPUs {CVE-2023-54090}
- bpf: Do not let BPF test infra emit invalid GSO types to stack {CVE-2025-68725}
- net: usb: rtl8150: fix memory leak on usb_submit_urb() failure {CVE-2025-71154}
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() {CVE-2023-54014}
- selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() {CVE-2022-50699}
- HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() {CVE-2025-39808}
- PCI: Fix dropping valid root bus resources with .end = zero {CVE-2023-53814}
- KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state {CVE-2023-53208}
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini {CVE-2023-53193}
- block: avoid possible overflow for chunk_sectors check in blk_stack_limits() {CVE-2025-39795}
- libceph: return the handler error from mon_handle_auth_done() {CVE-2026-22992}
- Bluetooth: Fix hci_suspend_sync crash {CVE-2023-53520}
- jbd2: prevent softlockup in jbd2_log_do_checkpoint() {CVE-2025-39782}
- net: sock: fix hardened usercopy panic in sock_recv_errqueue {CVE-2026-22977}
- wifi: ath11k: clear initialized flag for deinit-ed srng lists {CVE-2025-38601}
- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec {CVE-2026-23060}
- libceph: make free_choose_arg_map() resilient to partial allocation {CVE-2026-22991}
- soundwire: fix enumeration completion {CVE-2023-54096}
- ext4: fix inode leak in ext4_xattr_inode_create() on an error path {CVE-2022-50845}
- ring-buffer: Handle race between rb_move_tail and rb_check_pages {CVE-2023-53709}
- netlink: fix potential deadlock in netlink_set_err() {CVE-2023-53731}
- xhci: dbc: Fix memory leak in xhci_alloc_dbc() {CVE-2022-50809}
- ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline {CVE-2022-50286}
- ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed {CVE-2023-53481}
- driver core: location: Free struct acpi_pld_info *pld before return false {CVE-2023-53211}
- x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() {CVE-2025-39845}
- dma-buf/dma-resv: Stop leaking on krealloc() failure {CVE-2023-53181}
- rxrpc: Fix oops due to non-existence of prealloc backlog struct {CVE-2025-38514}
- xfrm: Zero padding when dumping algos and encap {CVE-2023-53684}
- ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer {CVE-2023-53648}
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF {CVE-2023-53747}
- ice: fix wrong fallback logic for FDIR {CVE-2023-54040}
- cifs: Fix xid leak in cifs_create() {CVE-2022-50351}
- drm/amd/display: populate subvp cmd info only for the top pipe {CVE-2023-53806}
- netfilter: ctnetlink: fix refcount leak on table dump {CVE-2025-38721}
- sfc: fix crash when reading stats while NIC is resetting {CVE-2023-54156}
- Bluetooth: Fix race condition in hidp_session_thread {CVE-2023-54120}
- bpf: Reject %p% format string in bprintf-like helpers {CVE-2025-38528}
- RDMA/bnxt_re: Prevent handling any completions after qp destroy {CVE-2023-54048}
- RDMA/siw: Fix immediate work request flush to completion queue {CVE-2022-50736}
- net/packet: fix a race in packet_set_ring() and packet_notifier() {CVE-2025-38617}
- ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr {CVE-2025-38701}
- IB/hfi1: Fix possible panic during hotplug remove {CVE-2023-53488}
- cgroup: split cgroup_destroy_wq into 3 workqueues {CVE-2025-39953}
- NFS: Fix the setting of capabilities when automounting a new filesystem {CVE-2025-39798}
- fs: Prevent file descriptor table allocations exceeding INT_MAX {CVE-2025-39756}
- ext4: remove a BUG_ON in ext4_mb_release_group_pa() {CVE-2023-53450}
- media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() {CVE-2025-39713}
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}
- wifi: mac80211: reject TDLS operations when station is not associated {CVE-2025-38644}
- ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() {CVE-2023-53271}
- RDMA/bnxt_re: wraparound mbox producer index {CVE-2023-53201}
- x86/iopl: Cure TIF_IO_BITMAP inconsistencies {CVE-2025-38100}
- ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() {CVE-2025-38706}
- scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated {CVE-2025-38700}
- ALSA: hda: Fix Oops by 9.1 surround channel names {CVE-2023-53400}
- mm: move page table sync declarations to linux/pgtable.h {CVE-2025-39844}
- rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access {CVE-2023-53419}
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails {CVE-2023-53199}
- HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras {CVE-2025-38540}
- scsi: ses: Don't attach if enclosure has no components {CVE-2023-53431}
- ipv6/addrconf: fix a potential refcount underflow for idev {CVE-2023-53189}
- wifi: ath11k: Fix SKB corruption in REO destination ring {CVE-2023-53315}
- bpf: fix ktls panic with sockmap {CVE-2025-38166}
- net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime {CVE-2025-38470}
- net: openvswitch: fix race on port output {CVE-2023-53188}
- net_sched: Flush gso_skb list too during ->change() {CVE-2025-37992}
- netfilter: x_tables: fix percpu counter block leak on error path when creating new netns {CVE-2023-53200}
- RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction {CVE-2025-38161}
- af_unix: Fix data-race around unix_tot_inflight. {CVE-2023-54006}
- watchdog: Fix kmemleak in watchdog_cdev_register {CVE-2023-53234}
- usb: idmouse: fix an uninit-value in idmouse_open {CVE-2022-50733}
- net: dcb: choose correct policy to parse DCB_ATTR_BCN {CVE-2023-53369}
- mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host() {CVE-2022-50347}
- Bluetooth: l2cap: Check encryption key size on incoming connection {CVE-2025-39889}
- x86/apic: Don't disable x2APIC if locked {CVE-2022-50720}
- serial: 8250: Reinit port->pm on port specific driver unbind {CVE-2023-53176}
- devlink: hold region lock when flushing snapshots {CVE-2022-50712}
- net: qrtr: Fix a refcount bug in qrtr_recvmsg() {CVE-2023-53445}
- be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list {CVE-2026-23084}
- PM: EM: fix memory leak with using debugfs_lookup() {CVE-2023-53411}
- vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check {CVE-2023-54031}
- atm: clip: prevent NULL deref in clip_push() {CVE-2025-38251}
- ceph: fix potential use-after-free bug when trimming caps {CVE-2023-53867}
- ACPI: video: check for error while searching for backlight device parent {CVE-2023-52693}
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL {CVE-2023-53246}
- x86/xen: Fix memory leak in xen_init_lock_cpu() {CVE-2022-50761}
- net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping {CVE-2025-38126}
- platform/x86: dell_rbu: Fix list usage {CVE-2025-38197}
- x86/kexec: Fix double-free of elf header buffer {CVE-2023-54146}
- ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() {CVE-2025-38305}
- KVM: Destroy target device if coalesced MMIO unregistration fails {CVE-2023-54024}
- drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table {CVE-2025-38319}
- rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() {CVE-2022-50771}
- drm/radeon: Fix integer overflow in radeon_cs_parser_init {CVE-2023-53309}
- net: atlantic: fix fragment overflow handling in RX path {CVE-2025-68301}
- bpf: Fix oob access in cgroup local storage {CVE-2025-38502}
- bpf: Add cookie object to bpf maps {CVE-2025-38502}
- misc: vmw_balloon: fix memory leak with using debugfs_lookup() {CVE-2023-53279}
- platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks {CVE-2025-38412}
- virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN {CVE-2025-38048}
- tracing: Fix race issue between cpu buffer write and swap {CVE-2023-53368}
- USB: wdm: close race between wdm_open and wdm_wwan_port_stop {CVE-2025-37985}
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write {CVE-2023-53344}
- wifi: ath11k: fix node corruption in ar->arvifs list {CVE-2025-38293}
- x86/mm: Check return value from memblock_phys_alloc_range() {CVE-2025-38071}
- net: Fix TOCTOU issue in sk_is_readable() {CVE-2025-38112}
- scsi: mpi3mr: Fix an issue found by KASAN {CVE-2023-54011}
- net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204}
- net: add skb_header_pointer_careful() helper
- scsi: qla2xxx: Array index may go out of bound {CVE-2023-54179}
- net/mlx5e: fix memory leak in mlx5e_ptp_open {CVE-2023-54169}
- igc: Fix Kernel Panic during ndo_tx_timeout callback {CVE-2023-54166}
- Bluetooth: L2CAP: Fix potential user-after-free {CVE-2023-54214}
- RDMA/restrack: Release MR restrack when delete {CVE-2022-50822}
- RDMA/irdma: Fix memory leak of PBLE objects {CVE-2023-54055}
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup {CVE-2023-54275}
- mptcp: stricter state check in mptcp_worker {CVE-2023-54176}
- nfsd: provide locking for v4_end_grace {CVE-2026-22980}
- iommu: disable SVA when CONFIG_X86 is set {CVE-2025-71089}
- net: atlantic: add check for MAX_SKB_FRAGS {CVE-2025-68301}
- net: atlantic: reduce scope of is_rsc_complete
- atlantic: Fix buff_ring OOB in aq_ring_rx_clean
- drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies {CVE-2025-40096}
- net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe {CVE-2022-50777}
- wifi: rt2x00: Fix memory leak when handling surveys {CVE-2023-54131}
- wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs() {CVE-2022-50740}
- scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193}
- mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure {CVE-2026-23144}
- ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423}
- wifi: ath10k: fix dma_free_coherent() pointer {CVE-2026-23133}
- bpf: Move bpf map owner out of common struct {CVE-2025-38502}
- fs: Lock moved directories
- fs: Establish locking order for unrelated directories
- mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats {CVE-2025-68800}
- macvlan: fix possible UAF in macvlan_forward_source() {CVE-2026-23001}
- HID: uclogic: Correct devm device reference for hidinput input_dev name {CVE-2023-54207}
- libceph: prevent potential out-of-bounds reads in handle_auth_done() {CVE-2026-22984}
- ppp: fix memory leak in pad_compress_skb {CVE-2025-39847}
- migrate: correct lock ordering for hugetlb file folios {CVE-2026-23097}
- keys: Fix linking a duplicate key to a keyring's assoc_array {CVE-2023-54170}
- scsi: qla4xxx: Add length check when parsing nlattrs {CVE-2023-53456}
- scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() {CVE-2023-53320}
- wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range {CVE-2023-54229}
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference {CVE-2023-54053}
- dm flakey: don't corrupt the zero page {CVE-2023-54317}
- md/raid10: fix memleak for 'conf->bio_split' {CVE-2023-54123}
- crypto: qat - fix out-of-bounds read {CVE-2023-54325}
- drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP {CVE-2023-54263}
- ipmi:ssif: Fix a memory leak when scanning for an adapter {CVE-2023-54064}
- Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" {CVE-2023-54197}
- netfilter: nf_tables: always release netdev hooks from notifier {CVE-2023-54200}
- wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO {CVE-2023-54029}
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` {CVE-2023-53719}
- soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow {CVE-2023-54259}
- vfio/type1: fix cap_migration information leak {CVE-2023-54137}
- drm/client: Fix memory leak in drm_client_target_cloned {CVE-2023-54091}
- RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() {CVE-2025-39742}
- crypto: ccp - Fix crash when rebind ccp device for ccp.ko {CVE-2025-38581}
- iwlwifi: Add missing check for alloc_ordered_workqueue {CVE-2025-38602}
- net: bridge: fix soft lockup in br_multicast_query_expired() {CVE-2025-39773}
- net: drop UFO packets in udp_rcv_segment() {CVE-2025-38622}
- iommu: Fix error unwind in iommu_group_alloc() {CVE-2023-53482}
- qed: allow sleep in qed_mcp_trace_dump() {CVE-2023-53509}
- cifs: Fix xid leak in cifs_flock() {CVE-2022-50460}
- platform/x86: dell-sysman: Fix reference leak {CVE-2023-53631}
- scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure {CVE-2025-38695}
- bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls {CVE-2025-38608}
- bpf: prevent decl_tag from being referenced in func_proto {CVE-2022-50862}
- mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock {CVE-2025-39736}
- mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup() {CVE-2025-39737}
- drm/amd/display: Fix potential null dereference {CVE-2023-53498}
- x86/MCE/AMD: Use an u64 for bank_map {CVE-2023-53474}
- kobject: Add sanity check for kset->kobj.ktype in kset_register() {CVE-2023-53480}
Updated packages:
-
bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:b60532f77942950497900c33594353d26ebdbff5210909b097412fc3ad4db497
-
kernel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:a9449b828b6f6faf951c5c32eeda1fc1437944e5f879aa8455410a8318dac61f
-
kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els30.noarch.rpm
sha:1acb0fb7762942a441fc4b52eb56546186c7da876ad4412fcc43da014564aedb
-
kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:d86850147f5f4af5391df090f5e561c2d01d3591c31ce1836b059ac357961aac
-
kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:e48b431166432baea38b005b7efaa66d44cc664ca1a84d395164d4c039e1f649
-
kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:d4abf4c5527e8b719e41f32166fea8e695cc7caffdc725f4afc48eafc75b70d6
-
kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:00e38aee760f887ccb1e4977798342529440a1c3ef9253ba34ef832b562eafd0
-
kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:6c75935fe2ff90f082fe94c346a93fa1a6b0b4dd8da89c4c8dcb19a3b360944e
-
kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:31142acc77b10ec91c508317e913176e649f43f43867de4af53a7cbaed4a49ac
-
kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:edf6ea7ede8324e78c52896adfc0e4ecb8c6603ceaf9b67d9d2eddceb66cb137
-
kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:c542d44f6816e8edddd33ffc8a5883eaeaade5938d7799fad422226d65821370
-
kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:2ca8b6f5ed8fa84ce63e2b726efc01a85df8b9419f34b078cc9d537d5f33a4f8
-
kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:1e8d0a57cd542faeb257f52bd27c06858d0d8a04cd67adbb355de889c4666434
-
kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:98e80140cbd65a0cf371e8d6319308e1de1ac0a34be42bfa0b4e233caa722ff5
-
kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:762d94137408e9f75c1099b4cb3dfe33f1801394de3fa591715151a9256233dd
-
kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:710a7d60372cbf47aadfc45a12a378b4a2ca2e1bb5267984bee8e1623026526f
-
kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:f051d3e8fe8a7370723161c433672dd37319b7c83c7baf0d2e5d4b9e0b4bd812
-
kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els30.noarch.rpm
sha:6a1ffeb84e1e957c79a0ba92612949b2ae683d4f2d5fd71b3a46e6c2f98430a0
-
kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:8bacf76904d5aa12cdf2fe2fe2e525099d9c317833a7557b7d066026b257cf7e
-
kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:0a1bd2a112bef5b551093a2d435f1d84a2efcfaa4353039a79a403cacbc2f22e
-
kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:cc2e1776f9f2154cefcead5bb3ff5f2c3d728ad482f02211924104ace8d28718
-
kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:d3dccc28c56cb5e6da73bc15bd03b8c6b4610f495953d22df5a62f46b6a331fb
-
kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:eb8d9b41743594266ac68cecaeae2a6910698124fe330a9d36d8a4e829be99bc
-
kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:6b83978b59bb0b9048b234b49903cb1c4f2b1f39aa386fbc4a9e3228644519c6
-
kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:3452a3fe12941d41ea78d050a8275d9f88b53be8800687bd37a3262ba501590a
-
kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:2b36d97392c710f38552ef3c34ab212cf792e2c875daa7116cb6d8ca9104c7cd
-
kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:a812e1833208f0b5ef40c8dd13acf3977be3c38cef91b8e23c27a82e7b05e49b
-
kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:7b2a016125f868b9ef14c26b18938a7a795020c160be38c057cee99e2994dad8
-
kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:f8c7b6fab3ed2ec1b7ba0f7790d66d04b8a0f0f22d8a40eb27fcaa2e261894cd
-
kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:65e1849403a8144cea4593130f6dc6e22e455b6b208e7e23e47a8a3014f61d6f
-
libbpf-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
sha:3d3846bb9eb0d0259f7fa036f890acfa92c24adf2c613049c27e121ec95ed0e0
-
libbpf-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
sha:eacd91591f6f3ceeada3994df84954a2d317f295a68dfa4dfd2c9c9899010151
-
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
sha:fd787f6fe8a48a76469636c0abb82759807b68919481a5916f7da0882cd5c586
-
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
sha:813b8ea9d36d9447a1afab037692b083083727a94a6097e8b20d180a089172b5
-
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
sha:b454fd93dd370228dd35ef2bcc6a6490a8a8d735835f2f6c1ea457baf7e9d074
-
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
sha:bc1786938b9c5a73aa65ec318fb7ebcf09c7f86e387a78c8aac3329e5efdb685
-
perf-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:4ddbbff5293fe31f6231302a90ac20cc7f3ce5340702cc72f7cdf9373a625b82
-
python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:1c331d59ddfa125b72402a5c1183745d95848c5bcd6853d353f2995657d438c2
-
rtla-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
sha:c3c50432be91fab0c2964d1deebbfc8beb9cc86197d923bb0b5b1a9e34e05547
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.