[CLSA-2026:1777616064] kernel: Fix of 260 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-01 09:15:50 UTC
Description:
- crypto: algif_aead - Fix minimum RX size check for decryption {CVE-2026-31431} - crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl {CVE-2026-31431} - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec {CVE-2026-31431} - crypto: authencesn - Fix src offset when decrypting in-place {CVE-2026-31431} - crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption {CVE-2026-31431} - crypto: authenc - use memcpy_sglist() instead of null skcipher {CVE-2026-31431} - crypto: algif_aead - snapshot IV for async AEAD requests {CVE-2026-31431} - crypto: algif_aead - Revert to operating out-of-place {CVE-2026-31431} - crypto: algif_aead - use memcpy_sglist() instead of null skcipher {CVE-2026-31431} - crypto: scatterwalk - Backport memcpy_sglist() {CVE-2026-31431} - wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() {CVE-2022-50551} - bonding: limit BOND_MODE_8023AD to Ethernet devices {CVE-2026-23099} - libceph: make decode_pool() more resilient against corrupted osdmaps {CVE-2025-71116} - scsi: qla2xxx: Fix bsg_done() causing double free {CVE-2025-71238} - ftrace: Fix use-after-free for dynamic ftrace_ops {CVE-2022-49892} - intel_th: msu: Fix vmalloced buffers {CVE-2022-50142} - vt: Clear selection before changing the font {CVE-2022-49948} - ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411} - usbnet: Run unregister_netdev() before unbind_all() {CVE-2022-50220} - ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917} - bpf: Propagate error from htab_lock_bucket() to userspace {CVE-2022-50490} - binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497} - module: fix [e_shstrndx].sh_size=0 OOB access {CVE-2022-49444} - ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770} - tracing: Fix potential double free in create_var_ref() {CVE-2022-49410} - powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue {CVE-2022-50366} - Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - xsk: Fix xsk_diag use-after-free error during socket cleanup {CVE-2023-53426} - svcrdma: bound check rq_pages index in inline path {CVE-2025-71068} - net: hns3: add VLAN id validation before using {CVE-2025-71112} - net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907} - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870} - ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315} - i2c: piix4: Fix adapter not be removed in piix4_remove() {CVE-2022-49900} - team: fix check for port enabled in team_queue_override_port_prio_changed() {CVE-2025-71091} - staging: vme_user: Fix possible UAF in tsi148_dma_list_add {CVE-2022-50384} - ALSA: ctxfi: Fix potential OOB access in audio mixer handling {CVE-2026-23076} - ftrace: Add cond_resched() to ftrace_graph_set_hash() {CVE-2025-37940} - net: stmmac: Fix accessing freed irq affinity_hint {CVE-2025-23155} - ext4: set goal start correctly in ext4_mb_normalize_request {CVE-2023-54021} - netfilter: ipset: fix region locking in hash types {CVE-2025-37997} - openvswitch: Fix unsafe attribute parsing in output_userspace() {CVE-2025-37998} - wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() {CVE-2025-37990} - nfs: handle failure of nfs_get_lock_context in unlock path {CVE-2025-38023} - drm/amd/pm: Prevent division by zero {CVE-2025-37767} - netfilter: ctnetlink: remove refcounting in expectation dumpers {CVE-2025-39764} - tracing: Fix null pointer dereference in tracing_err_log_open() {CVE-2023-53167} - ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386} - scsi: qla2xxx: Pointer may be dereferenced {CVE-2023-53150} - net: pktgen: fix access outside of user given buffer in pktgen_thread_write() {CVE-2025-38061} - dm cache: prevent BUG_ON by blocking retries on failed device resumes {CVE-2025-38066} - libnvdimm/labels: Fix divide error in nd_label_data_init() {CVE-2025-38072} - wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() {CVE-2023-53251} - tracing: Free error logs of tracing instances {CVE-2023-53375} - perf: Revert to requiring CAP_SYS_ADMIN for uprobes {CVE-2025-38466} - gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO {CVE-2025-38122} - dma-buf: insert memory barrier before updating num_fences {CVE-2025-38095} - x86/sgx: Prevent attempts to reclaim poisoned pages {CVE-2025-38334} - ext4: inline: fix len overflow in ext4_prepare_inline_data {CVE-2025-38222} - fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var {CVE-2025-38214} - sctp: initialize more fields in sctp_v6_from_sk() {CVE-2025-39812} - atm: Revert atm_account_tx() if copy_from_iter_full() fails. {CVE-2025-38190} - usb: net: sierra: check for no status endpoint {CVE-2025-38474} - vxlan: Annotate FDB data races {CVE-2025-38037} - tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer {CVE-2025-38184} - calipso: Fix null-ptr-deref in calipso_req_{set,del}attr(). {CVE-2025-38181} - net_sched: sch_sfq: fix a potential crash on gso_skb handling {CVE-2025-38115} - RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert {CVE-2025-38387} - jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() {CVE-2025-38337} - mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). {CVE-2025-38324} - fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() {CVE-2025-38312} - usb: typec: altmodes/displayport: do not index invalid pin_assignments {CVE-2025-38391} - nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request {CVE-2025-38430} - wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb() {CVE-2022-50829} - wifi: mt76: disable napi on driver removal {CVE-2025-38009} - ftrace: Fix potential warning in trace_printk_seq during ftrace_dump {CVE-2025-39813} - net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457} - scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() {CVE-2026-23216} - Bluetooth: btusb: revert use of devm_kzalloc in btusb {CVE-2025-71082} - e1000: fix OOB in e1000_tbi_should_accept() {CVE-2025-71093} - RDMA/irdma: avoid invalid read in irdma_net_event {CVE-2025-71133} - scsi: qla4xxx: Prevent a potential error pointer dereference {CVE-2025-39676} - ppp: fix race conditions in ppp_fill_forward_path {CVE-2025-39673} - libceph: replace overzealous BUG_ON in osdmap_apply_incremental() {CVE-2026-22990} - thunderbolt: Do not double dequeue a configuration request {CVE-2025-38174} - bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT {CVE-2025-38439} - ACPICA: fix acpi operand cache leak in dswstate.c {CVE-2025-38345} - atm: clip: Fix potential null-ptr-deref in to_atmarpd(). {CVE-2025-38460} - dm: fix unconditional IO throttle caused by REQ_PREFLUSH {CVE-2025-38063} - shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs {CVE-2023-53391} - nfsd: Initialize ssc before laundromat_work to prevent NULL dereference {CVE-2025-38231} - udf: Do not update file length for failed writes to inline files {CVE-2023-53295} - bpf: Fix WARN() in get_bpf_raw_tp_regs {CVE-2025-38285} - net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree {CVE-2025-38468} - nvmet-tcp: don't restore null sk_state_change {CVE-2025-38035} - wifi: iwlwifi: mvm: fix double free on tx path. {CVE-2022-50248} - ACPICA: fix acpi parse and parseext cache leaks {CVE-2025-38344} - bonding: fix use-after-free due to enslave fail after slave array update {CVE-2026-23171} - macvlan: fix error recovery in macvlan_common_newlink() {CVE-2026-23209} - cxl/acpi: Fix a use-after-free in cxl_parse_cfmws() {CVE-2023-53479} - fbcon: Fix OOB access in font allocation - fbcon: fix integer overflow in fbcon_do_set_font {CVE-2025-39967} - ALSA: aloop: Fix racy access at PCM trigger {CVE-2026-23191} - rename(): fix the locking of subdirectories - scsi: qedi: Fix use after free bug in qedi_remove() {CVE-2023-54100} - ixgbe: Fix panic during XDP_TX with > 64 CPUs {CVE-2023-54090} - bpf: Do not let BPF test infra emit invalid GSO types to stack {CVE-2025-68725} - net: usb: rtl8150: fix memory leak on usb_submit_urb() failure {CVE-2025-71154} - scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() {CVE-2023-54014} - selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() {CVE-2022-50699} - HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() {CVE-2025-39808} - PCI: Fix dropping valid root bus resources with .end = zero {CVE-2023-53814} - KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state {CVE-2023-53208} - drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini {CVE-2023-53193} - block: avoid possible overflow for chunk_sectors check in blk_stack_limits() {CVE-2025-39795} - libceph: return the handler error from mon_handle_auth_done() {CVE-2026-22992} - Bluetooth: Fix hci_suspend_sync crash {CVE-2023-53520} - jbd2: prevent softlockup in jbd2_log_do_checkpoint() {CVE-2025-39782} - net: sock: fix hardened usercopy panic in sock_recv_errqueue {CVE-2026-22977} - wifi: ath11k: clear initialized flag for deinit-ed srng lists {CVE-2025-38601} - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec {CVE-2026-23060} - libceph: make free_choose_arg_map() resilient to partial allocation {CVE-2026-22991} - soundwire: fix enumeration completion {CVE-2023-54096} - ext4: fix inode leak in ext4_xattr_inode_create() on an error path {CVE-2022-50845} - ring-buffer: Handle race between rb_move_tail and rb_check_pages {CVE-2023-53709} - netlink: fix potential deadlock in netlink_set_err() {CVE-2023-53731} - xhci: dbc: Fix memory leak in xhci_alloc_dbc() {CVE-2022-50809} - ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline {CVE-2022-50286} - ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed {CVE-2023-53481} - driver core: location: Free struct acpi_pld_info *pld before return false {CVE-2023-53211} - x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() {CVE-2025-39845} - dma-buf/dma-resv: Stop leaking on krealloc() failure {CVE-2023-53181} - rxrpc: Fix oops due to non-existence of prealloc backlog struct {CVE-2025-38514} - xfrm: Zero padding when dumping algos and encap {CVE-2023-53684} - ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer {CVE-2023-53648} - vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF {CVE-2023-53747} - ice: fix wrong fallback logic for FDIR {CVE-2023-54040} - cifs: Fix xid leak in cifs_create() {CVE-2022-50351} - drm/amd/display: populate subvp cmd info only for the top pipe {CVE-2023-53806} - netfilter: ctnetlink: fix refcount leak on table dump {CVE-2025-38721} - sfc: fix crash when reading stats while NIC is resetting {CVE-2023-54156} - Bluetooth: Fix race condition in hidp_session_thread {CVE-2023-54120} - bpf: Reject %p% format string in bprintf-like helpers {CVE-2025-38528} - RDMA/bnxt_re: Prevent handling any completions after qp destroy {CVE-2023-54048} - RDMA/siw: Fix immediate work request flush to completion queue {CVE-2022-50736} - net/packet: fix a race in packet_set_ring() and packet_notifier() {CVE-2025-38617} - ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr {CVE-2025-38701} - IB/hfi1: Fix possible panic during hotplug remove {CVE-2023-53488} - cgroup: split cgroup_destroy_wq into 3 workqueues {CVE-2025-39953} - NFS: Fix the setting of capabilities when automounting a new filesystem {CVE-2025-39798} - fs: Prevent file descriptor table allocations exceeding INT_MAX {CVE-2025-39756} - ext4: remove a BUG_ON in ext4_mb_release_group_pa() {CVE-2023-53450} - media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() {CVE-2025-39713} - ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089} - wifi: mac80211: reject TDLS operations when station is not associated {CVE-2025-38644} - ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume() {CVE-2023-53271} - RDMA/bnxt_re: wraparound mbox producer index {CVE-2023-53201} - x86/iopl: Cure TIF_IO_BITMAP inconsistencies {CVE-2025-38100} - ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() {CVE-2025-38706} - scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated {CVE-2025-38700} - ALSA: hda: Fix Oops by 9.1 surround channel names {CVE-2023-53400} - mm: move page table sync declarations to linux/pgtable.h {CVE-2025-39844} - rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access {CVE-2023-53419} - wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails {CVE-2023-53199} - HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras {CVE-2025-38540} - scsi: ses: Don't attach if enclosure has no components {CVE-2023-53431} - ipv6/addrconf: fix a potential refcount underflow for idev {CVE-2023-53189} - wifi: ath11k: Fix SKB corruption in REO destination ring {CVE-2023-53315} - bpf: fix ktls panic with sockmap {CVE-2025-38166} - net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime {CVE-2025-38470} - net: openvswitch: fix race on port output {CVE-2023-53188} - net_sched: Flush gso_skb list too during ->change() {CVE-2025-37992} - netfilter: x_tables: fix percpu counter block leak on error path when creating new netns {CVE-2023-53200} - RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction {CVE-2025-38161} - af_unix: Fix data-race around unix_tot_inflight. {CVE-2023-54006} - watchdog: Fix kmemleak in watchdog_cdev_register {CVE-2023-53234} - usb: idmouse: fix an uninit-value in idmouse_open {CVE-2022-50733} - net: dcb: choose correct policy to parse DCB_ATTR_BCN {CVE-2023-53369} - mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host() {CVE-2022-50347} - Bluetooth: l2cap: Check encryption key size on incoming connection {CVE-2025-39889} - x86/apic: Don't disable x2APIC if locked {CVE-2022-50720} - serial: 8250: Reinit port->pm on port specific driver unbind {CVE-2023-53176} - devlink: hold region lock when flushing snapshots {CVE-2022-50712} - net: qrtr: Fix a refcount bug in qrtr_recvmsg() {CVE-2023-53445} - be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list {CVE-2026-23084} - PM: EM: fix memory leak with using debugfs_lookup() {CVE-2023-53411} - vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check {CVE-2023-54031} - atm: clip: prevent NULL deref in clip_push() {CVE-2025-38251} - ceph: fix potential use-after-free bug when trimming caps {CVE-2023-53867} - ACPI: video: check for error while searching for backlight device parent {CVE-2023-52693} - cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL {CVE-2023-53246} - x86/xen: Fix memory leak in xen_init_lock_cpu() {CVE-2022-50761} - net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping {CVE-2025-38126} - platform/x86: dell_rbu: Fix list usage {CVE-2025-38197} - x86/kexec: Fix double-free of elf header buffer {CVE-2023-54146} - ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() {CVE-2025-38305} - KVM: Destroy target device if coalesced MMIO unregistration fails {CVE-2023-54024} - drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table {CVE-2025-38319} - rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() {CVE-2022-50771} - drm/radeon: Fix integer overflow in radeon_cs_parser_init {CVE-2023-53309} - net: atlantic: fix fragment overflow handling in RX path {CVE-2025-68301} - bpf: Fix oob access in cgroup local storage {CVE-2025-38502} - bpf: Add cookie object to bpf maps {CVE-2025-38502} - misc: vmw_balloon: fix memory leak with using debugfs_lookup() {CVE-2023-53279} - platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks {CVE-2025-38412} - virtio_ring: Fix data race by tagging event_triggered as racy for KCSAN {CVE-2025-38048} - tracing: Fix race issue between cpu buffer write and swap {CVE-2023-53368} - USB: wdm: close race between wdm_open and wdm_wwan_port_stop {CVE-2025-37985} - can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write {CVE-2023-53344} - wifi: ath11k: fix node corruption in ar->arvifs list {CVE-2025-38293} - x86/mm: Check return value from memblock_phys_alloc_range() {CVE-2025-38071} - net: Fix TOCTOU issue in sk_is_readable() {CVE-2025-38112} - scsi: mpi3mr: Fix an issue found by KASAN {CVE-2023-54011} - net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204} - net: add skb_header_pointer_careful() helper - scsi: qla2xxx: Array index may go out of bound {CVE-2023-54179} - net/mlx5e: fix memory leak in mlx5e_ptp_open {CVE-2023-54169} - igc: Fix Kernel Panic during ndo_tx_timeout callback {CVE-2023-54166} - Bluetooth: L2CAP: Fix potential user-after-free {CVE-2023-54214} - RDMA/restrack: Release MR restrack when delete {CVE-2022-50822} - RDMA/irdma: Fix memory leak of PBLE objects {CVE-2023-54055} - wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup {CVE-2023-54275} - mptcp: stricter state check in mptcp_worker {CVE-2023-54176} - nfsd: provide locking for v4_end_grace {CVE-2026-22980} - iommu: disable SVA when CONFIG_X86 is set {CVE-2025-71089} - net: atlantic: add check for MAX_SKB_FRAGS {CVE-2025-68301} - net: atlantic: reduce scope of is_rsc_complete - atlantic: Fix buff_ring OOB in aq_ring_rx_clean - drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies {CVE-2025-40096} - net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe {CVE-2022-50777} - wifi: rt2x00: Fix memory leak when handling surveys {CVE-2023-54131} - wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs() {CVE-2022-50740} - scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193} - mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure {CVE-2026-23144} - ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423} - wifi: ath10k: fix dma_free_coherent() pointer {CVE-2026-23133} - bpf: Move bpf map owner out of common struct {CVE-2025-38502} - fs: Lock moved directories - fs: Establish locking order for unrelated directories - mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats {CVE-2025-68800} - macvlan: fix possible UAF in macvlan_forward_source() {CVE-2026-23001} - HID: uclogic: Correct devm device reference for hidinput input_dev name {CVE-2023-54207} - libceph: prevent potential out-of-bounds reads in handle_auth_done() {CVE-2026-22984} - ppp: fix memory leak in pad_compress_skb {CVE-2025-39847} - migrate: correct lock ordering for hugetlb file folios {CVE-2026-23097} - keys: Fix linking a duplicate key to a keyring's assoc_array {CVE-2023-54170} - scsi: qla4xxx: Add length check when parsing nlattrs {CVE-2023-53456} - scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() {CVE-2023-53320} - wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range {CVE-2023-54229} - wifi: iwlwifi: pcie: fix possible NULL pointer dereference {CVE-2023-54053} - dm flakey: don't corrupt the zero page {CVE-2023-54317} - md/raid10: fix memleak for 'conf->bio_split' {CVE-2023-54123} - crypto: qat - fix out-of-bounds read {CVE-2023-54325} - drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP {CVE-2023-54263} - ipmi:ssif: Fix a memory leak when scanning for an adapter {CVE-2023-54064} - Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" {CVE-2023-54197} - netfilter: nf_tables: always release netdev hooks from notifier {CVE-2023-54200} - wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO {CVE-2023-54029} - serial: arc_uart: fix of_iomap leak in `arc_serial_probe` {CVE-2023-53719} - soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow {CVE-2023-54259} - vfio/type1: fix cap_migration information leak {CVE-2023-54137} - drm/client: Fix memory leak in drm_client_target_cloned {CVE-2023-54091} - RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() {CVE-2025-39742} - crypto: ccp - Fix crash when rebind ccp device for ccp.ko {CVE-2025-38581} - iwlwifi: Add missing check for alloc_ordered_workqueue {CVE-2025-38602} - net: bridge: fix soft lockup in br_multicast_query_expired() {CVE-2025-39773} - net: drop UFO packets in udp_rcv_segment() {CVE-2025-38622} - iommu: Fix error unwind in iommu_group_alloc() {CVE-2023-53482} - qed: allow sleep in qed_mcp_trace_dump() {CVE-2023-53509} - cifs: Fix xid leak in cifs_flock() {CVE-2022-50460} - platform/x86: dell-sysman: Fix reference leak {CVE-2023-53631} - scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure {CVE-2025-38695} - bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls {CVE-2025-38608} - bpf: prevent decl_tag from being referenced in func_proto {CVE-2022-50862} - mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock {CVE-2025-39736} - mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup() {CVE-2025-39737} - drm/amd/display: Fix potential null dereference {CVE-2023-53498} - x86/MCE/AMD: Use an u64 for bank_map {CVE-2023-53474} - kobject: Add sanity check for kset->kobj.ktype in kset_register() {CVE-2023-53480}
Updated packages:
  • bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:b60532f77942950497900c33594353d26ebdbff5210909b097412fc3ad4db497
  • kernel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:a9449b828b6f6faf951c5c32eeda1fc1437944e5f879aa8455410a8318dac61f
  • kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els30.noarch.rpm
    sha:1acb0fb7762942a441fc4b52eb56546186c7da876ad4412fcc43da014564aedb
  • kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:d86850147f5f4af5391df090f5e561c2d01d3591c31ce1836b059ac357961aac
  • kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:e48b431166432baea38b005b7efaa66d44cc664ca1a84d395164d4c039e1f649
  • kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:d4abf4c5527e8b719e41f32166fea8e695cc7caffdc725f4afc48eafc75b70d6
  • kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:00e38aee760f887ccb1e4977798342529440a1c3ef9253ba34ef832b562eafd0
  • kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:6c75935fe2ff90f082fe94c346a93fa1a6b0b4dd8da89c4c8dcb19a3b360944e
  • kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:31142acc77b10ec91c508317e913176e649f43f43867de4af53a7cbaed4a49ac
  • kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:edf6ea7ede8324e78c52896adfc0e4ecb8c6603ceaf9b67d9d2eddceb66cb137
  • kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:c542d44f6816e8edddd33ffc8a5883eaeaade5938d7799fad422226d65821370
  • kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:2ca8b6f5ed8fa84ce63e2b726efc01a85df8b9419f34b078cc9d537d5f33a4f8
  • kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:1e8d0a57cd542faeb257f52bd27c06858d0d8a04cd67adbb355de889c4666434
  • kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:98e80140cbd65a0cf371e8d6319308e1de1ac0a34be42bfa0b4e233caa722ff5
  • kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:762d94137408e9f75c1099b4cb3dfe33f1801394de3fa591715151a9256233dd
  • kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:710a7d60372cbf47aadfc45a12a378b4a2ca2e1bb5267984bee8e1623026526f
  • kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:f051d3e8fe8a7370723161c433672dd37319b7c83c7baf0d2e5d4b9e0b4bd812
  • kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els30.noarch.rpm
    sha:6a1ffeb84e1e957c79a0ba92612949b2ae683d4f2d5fd71b3a46e6c2f98430a0
  • kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:8bacf76904d5aa12cdf2fe2fe2e525099d9c317833a7557b7d066026b257cf7e
  • kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:0a1bd2a112bef5b551093a2d435f1d84a2efcfaa4353039a79a403cacbc2f22e
  • kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:cc2e1776f9f2154cefcead5bb3ff5f2c3d728ad482f02211924104ace8d28718
  • kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:d3dccc28c56cb5e6da73bc15bd03b8c6b4610f495953d22df5a62f46b6a331fb
  • kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:eb8d9b41743594266ac68cecaeae2a6910698124fe330a9d36d8a4e829be99bc
  • kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:6b83978b59bb0b9048b234b49903cb1c4f2b1f39aa386fbc4a9e3228644519c6
  • kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:3452a3fe12941d41ea78d050a8275d9f88b53be8800687bd37a3262ba501590a
  • kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:2b36d97392c710f38552ef3c34ab212cf792e2c875daa7116cb6d8ca9104c7cd
  • kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:a812e1833208f0b5ef40c8dd13acf3977be3c38cef91b8e23c27a82e7b05e49b
  • kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:7b2a016125f868b9ef14c26b18938a7a795020c160be38c057cee99e2994dad8
  • kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:f8c7b6fab3ed2ec1b7ba0f7790d66d04b8a0f0f22d8a40eb27fcaa2e261894cd
  • kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:65e1849403a8144cea4593130f6dc6e22e455b6b208e7e23e47a8a3014f61d6f
  • libbpf-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
    sha:3d3846bb9eb0d0259f7fa036f890acfa92c24adf2c613049c27e121ec95ed0e0
  • libbpf-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:eacd91591f6f3ceeada3994df84954a2d317f295a68dfa4dfd2c9c9899010151
  • libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
    sha:fd787f6fe8a48a76469636c0abb82759807b68919481a5916f7da0882cd5c586
  • libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:813b8ea9d36d9447a1afab037692b083083727a94a6097e8b20d180a089172b5
  • libbpf-static-1.0.0-2.el9_2.tuxcare.7.els30.i686.rpm
    sha:b454fd93dd370228dd35ef2bcc6a6490a8a8d735835f2f6c1ea457baf7e9d074
  • libbpf-static-1.0.0-2.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:bc1786938b9c5a73aa65ec318fb7ebcf09c7f86e387a78c8aac3329e5efdb685
  • perf-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:4ddbbff5293fe31f6231302a90ac20cc7f3ce5340702cc72f7cdf9373a625b82
  • python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:1c331d59ddfa125b72402a5c1183745d95848c5bcd6853d353f2995657d438c2
  • rtla-5.14.0-284.1101.el9_2.tuxcare.7.els30.x86_64.rpm
    sha:c3c50432be91fab0c2964d1deebbfc8beb9cc86197d923bb0b5b1a9e34e05547
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.