Release date:
2026-05-15 07:56:34 UTC
Description:
- net: skbuff: propagate shared-frag marker through pskb_copy()
- mptcp: always handle address removal under msk socket lock {CVE-2025-21875}
- uprobes: Reject the shared zeropage in uprobe_write_opcode() {CVE-2025-21881}
- net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error {CVE-2025-21924}
- wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() {CVE-2025-21744}
- mptcp: fix NULL pointer in can_accept_new_subflow {CVE-2025-23145}
- bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock {CVE-2025-21951}
- blk-cgroup: Fix class @block_class's subsystem refcount leakage {CVE-2025-21745}
- net/mlx5: handle errors in mlx5_chains_create_table() {CVE-2025-21975}
- USB: hub: Ignore non-compliant devices with too many configs or interfaces {CVE-2025-21776}
- wifi: iwlwifi: don't warn when if there is a FW error {CVE-2025-38096}
- ice: fix memory leak in aRFS after reset {CVE-2025-21981}
- KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel {CVE-2025-21779}
- Bluetooth: Disable SCO support if READ_VOICE_SETTING is unsupported/broken {CVE-2025-38099}
- regulator: check that dummy regulator has been probed before using it {CVE-2025-22008}
- acpi: nfit: fix narrowing conversion in acpi_nfit_ctl {CVE-2025-22044}
- drm/scheduler: signal scheduled fence when kill job {CVE-2025-38436}
- nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request {CVE-2025-38430}
- net: decrease cached dst counters in dst_release {CVE-2025-22057}
- bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT {CVE-2025-38439}
- net: fix NULL pointer dereference in l3mdev_l3_rcv {CVE-2025-22103}
- dlm: prevent NPD when writing a positive value to event_done {CVE-2025-23131}
- drm/amd/display: fix a Null pointer dereference vulnerability {CVE-2025-39705}
- net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree {CVE-2025-38468}
- drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params {CVE-2025-21941}
- drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities {CVE-2025-39707}
- HID: appleir: Fix potential NULL dereference at raw event handle {CVE-2025-21948}
- usb: net: sierra: check for no status endpoint {CVE-2025-38474}
- drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() {CVE-2025-21996}
- wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() {CVE-2025-38643}
- netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets {CVE-2025-22063}
- vxlan: Fix NPD when refreshing an FDB entry with a nexthop object {CVE-2025-39851}
- thermal: int340x: Add NULL check for adev {CVE-2025-23136}
- Bluetooth: l2cap: Check encryption key size on incoming connection {CVE-2025-39889}
- dm thin: make get_first_thin use rcu-safe list first function {CVE-2025-21664}
- tracing: Add down_write(trace_event_sem) when adding trace event {CVE-2025-38539}
- usbnet: Fix using smp_processor_id() in preemptible code warnings {CVE-2025-40164}
- bpf: Send signals asynchronously if !preemptible {CVE-2025-21728}
- ima: Fix a potential integer overflow in ima_appraise_measurement {CVE-2022-49643}
- dm-stripe: fix a possible integer overflow {CVE-2025-39940}
- usbnet: gl620a: fix endpoint checking in genelink_bind() {CVE-2025-21877}
- fs: dlm: fix use after free in midcomms commit {CVE-2023-53629}
- usbnet: fix memory leak in error case {CVE-2022-49657}
- wifi: nl80211: reject cooked mode if it is set along with other flags {CVE-2025-21909}
- can: j1939: j1939_send_one(): fix missing CAN header initialization {CVE-2022-49845}
- ima: Fix use-after-free on a dentry's dname.name {CVE-2024-39494}
- posix-clock: Fix missing timespec64 check in pc_clock_settime() {CVE-2024-50195}
- net_sched: Prevent creation of classes with TC_H_ROOT {CVE-2025-21971}
- mm/slub: avoid accessing metadata when pointer is invalid in object_err() {CVE-2025-39902}
- RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow {CVE-2025-22086}
- virtio/vsock: Fix accept_queue memory leak {CVE-2024-53119}
- wifi: mac80211: Purge vif txq in ieee80211_do_stop() {CVE-2025-37794}
- tipc: fix memory leak in tipc_link_xmit {CVE-2025-37757}
- tipc: fix NULL pointer dereference in tipc_mon_reinit_self() {CVE-2025-37824}
- drm/amd/pm: Prevent division by zero {CVE-2025-37766}
- acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl {CVE-2024-56662}
- virtiofs: add filesystem context source name check {CVE-2025-37773}
- usb: xhci: Fix NULL pointer dereference on certain command aborts {CVE-2024-57981}
- net_sched: sch_sfq: reject invalid perturb period {CVE-2025-38193}
- Bluetooth: btrtl: Prevent potential NULL dereference {CVE-2025-37792}
- trace/fgraph: Fix the warning caused by missing unregister notifier {CVE-2025-39829}
- can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods {CVE-2022-49024}
- Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() {CVE-2024-57987}
- wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion {CVE-2025-21729}
- ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params {CVE-2024-58012}
- io_uring/rw: fix missing NOWAIT check for O_DIRECT start write {CVE-2024-53052}
- wifi: iwlwifi: mvm: avoid NULL pointer dereference {CVE-2024-58062}
- page_pool: avoid infinite loop to schedule delayed worker {CVE-2025-37859}
- HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check {CVE-2024-57993}
- bpf: Fix deadlock when freeing cgroup storage {CVE-2024-58088}
- ice: ice_adapter: release xa entry on adapter allocation failure {CVE-2025-40185}
- RDMA/core: Silence oversized kvmalloc() warning {CVE-2025-37867}
- iommu: Clear iommu-dma ops on cleanup {CVE-2025-37877}
- nfsd: clear acl_access/acl_default after releasing them {CVE-2025-21796}
- ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback {CVE-2024-58077}
- netfilter: conntrack: clamp maximum hashtable size to INT_MAX {CVE-2025-21648}
- cachestat: fix page cache statistics permission checking {CVE-2025-21691}
- sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy {CVE-2025-21636}
- ALSA: ctxfi: Fix potential OOB access in audio mixer handling {CVE-2026-23076}
- block: fix resource leak in blk_register_queue() error path {CVE-2025-37980}
- wifi: iwlwifi: fix debug actions order {CVE-2025-38045}
- net: hns3: fix kernel crash when 1588 is sent on HIP08 devices {CVE-2025-21649}
- filemap: avoid truncating 64-bit offset to 32 bits {CVE-2025-21665}
- wifi: brcmfmac: Check the return value of of_property_read_string_index() {CVE-2025-21750}
- smb: client: add NULL check in automount_fullpath {CVE-2025-38208}
- afs: Fix merge preference rule failure condition {CVE-2025-21672}
- ipv6: mcast: add RCU protection to mld_newpack() {CVE-2025-21758}
- landlock: Handle weird files {CVE-2025-21830}
- bpf: Fix bpf_sk_select_reuseport() memory leak {CVE-2025-21683}
- usb: gadget: core: flush gadget workqueue after device removal {CVE-2025-21838}
- rtnetlink: Allocate vfinfo size for VF GUIDs when supported {CVE-2025-22075}
- vfs: fix race between evice_inodes() and find_inode()&iput() {CVE-2024-47679}
- af_packet: avoid erroring out after sock_init_data() in packet_create() {CVE-2024-56606}
- mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() {CVE-2025-21861}
- tun: Fix memory leak for detached NAPI queue. {CVE-2023-53685}
- ntb_netdev: Use dev_kfree_skb_any() in interrupt context {CVE-2022-50476}
- OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized {CVE-2024-58068}
- libceph: make decode_pool() more resilient against corrupted osdmaps {CVE-2025-71116}
- netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() {CVE-2025-21959}
- spi: spi-imx: Add check for spi_imx_setupxfer() {CVE-2025-37801}
- smb: client: Add check for next_buffer in receive_encrypted_standard() {CVE-2025-21844}
- rcutorture: Fix rcutorture_one_extend_check() splat in RT kernels {CVE-2025-39745}
- ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() {CVE-2025-21847}
- net: hinic: fix memory leak when reading function table {CVE-2022-50438}
- ipv4: use RCU protection in __ip_rt_update_pmtu() {CVE-2025-21766}
- usb: typec: ucsi: displayport: Fix NULL pointer access {CVE-2025-37994}
- eth: alx: take rtnl_lock on resume {CVE-2022-50498}
- misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() {CVE-2022-50349}
- Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock {CVE-2026-31500}
- RDMA/efa: Fix use of completion ctx after free {CVE-2026-31493}
- bpf: avoid holding freeze_mutex during mmap operation {CVE-2025-21853}
- RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers {CVE-2025-21885}
- ipvlan: ensure network headers are in skb linear part {CVE-2025-21891}
- net: hinic: fix the issue of CMDQ memory leaks {CVE-2022-50387}
- iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE {CVE-2025-21833}
- chardev: fix error handling in cdev_device_add() {CVE-2022-50282}
- udf: Fix uninitialized array access for some pathnames {CVE-2023-53165}
- net: usb: smsc95xx: Limit packet length to skb->len {CVE-2023-53062}
- drm/amd/pm: fix null pointer access {CVE-2025-38705}
- drm/nouveau: prime: fix ttm_bo_delayed_delete oops {CVE-2025-37765}
- wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. {CVE-2026-31551}
- md: suspend array while updating raid_disks via sysfs {CVE-2025-71225}
- sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT {CVE-2026-23125}
Updated packages:
-
kernel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:7fb3caeba9b85f17e3fa15f300b2d9cf014ae0e9932c3f36fb72d2ab48200169
-
kernel-abi-stablelists-5.14.0-570.62.1.el9_6.tuxcare.1.els6.noarch.rpm
sha:1cf53145d0a379c7d5e2a6ae43a20994aaba28673c3298925667d016af1ae6f2
-
kernel-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:36989a0b1498f1ec9da8bcf7d3ca402df89c4dd590434065b06bad3ba11bee41
-
kernel-cross-headers-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:7fa74ef2891abee0e42818cbd949b0e1f893a8f8a88b1e04ff2a56580355478f
-
kernel-debug-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:141fef8259f443110a16e3bb08fc9548b6a03258f77c004e3886e8dfb23c1c07
-
kernel-debug-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:25f79237dad943ebd497895173aeec6401c5abe0d6f9fe8092d04abfe5b903b4
-
kernel-debug-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:0c2d02ded32825c5e655a23d4af8a0cb7ab8a0cd73063135a878e2cd716d6a65
-
kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:d52af43a326db689157f8d82923952794c1f5cc2936af463c5a17f1986504e0b
-
kernel-debug-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:1cbc4793e55bf60d866b47a8ccd29fce940cb6554d0a29569435d28927a7947b
-
kernel-debug-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:d6b55057c17c68b145c4c2ad2a78d16f734fd03fdcb5ae9d52e376d250da39b1
-
kernel-debug-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:5379abfc8c77036a05d27f1b5690087224ec0c8cc5197078c58156ab0ed807d0
-
kernel-debug-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:a94469de009c0cb876385ff45142ccc8797e66fa14fb3fec73e3b069b4ab49ad
-
kernel-debug-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:81f294c1119adf3a2214410aa37425f8f7cf1934819bfd804541962985e0accf
-
kernel-debug-uki-virt-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:f67b4970ab874e04fea95f409849a2b1050ffb3710c61d881b8e1fca29e364c1
-
kernel-debug-uki-virt-addons-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:ea2e62d6acacf1e63df0f3e94e577c2db5961fe4e4085a91c315d01d394ca05a
-
kernel-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:3206f0197227c71fe5d2cce0894b3e3e283cecd78268f75515e19d765bde61ac
-
kernel-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:7fe3a7901da60bb2290d29862e5a8e56ff7396b227d00e6b569f6715a8223d45
-
kernel-doc-5.14.0-570.62.1.el9_6.tuxcare.1.els6.noarch.rpm
sha:ea2808349620f916347aa45ef3d3f17520dfe052a0aca3a511c362dcd0f68f75
-
kernel-headers-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:3a04b831530c97d85692c86939188d5340abae83dfe64b05f244b27a91029080
-
kernel-ipaclones-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:b71998ff0b2400367d38e0fa8f5a7c4391b9b3eb4b30fa999ae51fde53401eb3
-
kernel-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:640d2f470d727dde480010f702a364546512024a8c29fa3f58f1185cbc074886
-
kernel-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:05a273cd7670750e62a2eb7e023319d32db1d1a71b639932aac1a3b978d370da
-
kernel-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:74d82109edd96693d7c9d18c37693d0b497e712b9dac33b4cf0e0484b6641dfd
-
kernel-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:bbdea3a8afd06b529740f1e46b9fdb20ba8b5a15e979b3f4b81264b2d53438c2
-
kernel-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:5a9faf052a5bc9bba993db23ff4a105cf87fe87e9f358b6397c8308fe31ae8b0
-
kernel-rt-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:5f67614ac78defbad9dff1a2b8e81292fcc53eadf2ea85cb6d67e2ff53a44a54
-
kernel-rt-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:49948bccd01bc11a420315949476c79a72df1348a1cbe4956d60f5ce8e7d59c1
-
kernel-rt-debug-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:37761b0badcedd364944b22639458697928ba5b07fc968f27a6b5e89e2080697
-
kernel-rt-debug-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:02f75b69ab39c91c82e87728f4fc6a5831fbb67463baee01fa001f9ac7f6a12e
-
kernel-rt-debug-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:784ec026a7cb97ca0f4a39a76359df82bbc3eb88e79a23718343ecccf6fcb1f4
-
kernel-rt-debug-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:fc146d69680bac3303ff418e7ddb89adfb14dab95551cfb06f3edf3907491099
-
kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:63f31a466f768b39d8b524fbe88f48a1fae829dda896faa4899aecdf10eea2b5
-
kernel-rt-debug-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:c8652d59516c65e5c859c156b453a0e2e796dfed7efcd99d7e2e944a7c5ac5ac
-
kernel-rt-debug-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:a972952020b51898b6b10396484a4082693bb905b747a6059a174b4f96b5bd60
-
kernel-rt-debug-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:75896e1bbaa16b650d40844615722f1395004eec2785c3be560732c42c7bd7a9
-
kernel-rt-debug-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:1399fab07370f5328576d8a39bc1e587102ebdc2e091f3328f2e6da57ac995cf
-
kernel-rt-debug-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:8e5b04ce756296ecfc642c9b02b460db4e612471c252662e312159e248e5afdd
-
kernel-rt-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:ab2c56208a46fc5437287facd4c042a66ac556b2dc88602060080e344ac151a6
-
kernel-rt-devel-matched-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:c291e4f3b168764ca4dd6f83ce40117b6eb632d568dc62eca49036ef12af02ff
-
kernel-rt-kvm-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:d39a4f51e87ca8f4f82ac8a1618c9eb4b2c84b80f0458497cc6a0c1e094c5d79
-
kernel-rt-modules-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:2f60d3dbe901ede1fe5625d3bf1503b643247436f709cdfb35a5e73f645b9c51
-
kernel-rt-modules-core-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:54a45d0dc8564ebe4e70eb7ca2834799e797ad787928e34e01544c9e77e261f5
-
kernel-rt-modules-extra-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:5911e941b1195976fe3b0bd8202affad06a15f084f0b9d13b6f17389692728cf
-
kernel-rt-modules-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:727d9e1241b402660ff395acb50f5036a78bba78b12a307bf74246932bff12ee
-
kernel-rt-modules-partner-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:8bdb297216538e0eefa29b8bad10765652dd718f6a99d23c3c3565dee95c6028
-
kernel-selftests-internal-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:d4acf324a797ab56314e1ef4acf3b81b9ab5fc115b059ba07272a08b210257dc
-
kernel-tools-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:88de7cfbe35777a9ff11386ed3b0d75252ed7572bef3824304046f68c86b1237
-
kernel-tools-libs-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:2b521600a2be13f7b159020a6c0c38a523291166a77e106a2e5dd1fe992a1feb
-
kernel-tools-libs-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:4dc45ac2ecdd74bc37a110d2c18508a40489fafcc30a224fb0e51a21de4e00d8
-
kernel-uki-virt-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:305dffb1f9914fa088601dd32a837c495e7abbc21a38fadeaa6d147ee5bfde39
-
kernel-uki-virt-addons-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:1adb3d9e383e42f60b20cece5652bed16ca838a7ed7fdf137d7c36fac3728d1f
-
libperf-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:c5a1280d7cd4069cf2ee006bc182afaf458cb499a26aebfd16f8f12cbb71c81d
-
libperf-devel-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:40c219a5a28a3861fc37c38d87094c9bb39f937e97114cdbfe6dd8551449899d
-
perf-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:29d43382ecf26f8d68b391501d83043d3e5c468e47929764b43ce5c1aee9f12d
-
python3-perf-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:8bf6c9979f9d971b32810475bc25f94f5d87689508a4b3bf26e30ebdc947e1ed
-
rtla-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:77e8aacb70ea11878511bdc8f9e6c66dc1ee542edff37a26338042809713c832
-
rv-5.14.0-570.62.1.el9_6.tuxcare.1.els6.x86_64.rpm
sha:773fbe7815522e02513c92ec1189fc2e2d1f7ce05ab6834496ddd01ae84f0c3b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.