Release Info

Advisory: CLSA-2025:1747725447

OS: AlmaLinux 9.2 ESU

Public date: 2025-05-20 07:17:29

Project: kernel

Version: 7.0.0-284.1101.el9_2.tuxcare.7.els13

Errata link: https://errata.tuxcare.com/els_os/almalinux9.2esu/CLSA-2025-1747725447.html

Changelog

- ext4: fix OOB read when checking dotdot dir {CVE-2025-37785} - wifi: iwlwifi: limit printed string from FW file {CVE-2025-21905} - drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' {CVE-2024-27042} - dm-crypt: don't modify the data when using authenticated encryption {CVE-2024-26763} - sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket {CVE-2024-53168} - cifs: Fix UAF in cifs_demultiplex_thread() {CVE-2023-52572} - veth: Fix use after free in XDP_REDIRECT {CVE-2023-53107} - firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() {CVE-2024-53068} - arm64/sve: Discard stale CPU state when handling SVE traps {CVE-2024-50275} - Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd {CVE-2025-21969} - wifi: mt76: mt7921e: fix use-after-free in free_irq() {CVE-2024-26892} - rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read {CVE-2024-58069} - nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() {CVE-2025-21927} - pfifo_tail_enqueue: Drop new packet when sch->limit == 0 {CVE-2025-21702} - net_sched: sch_fifo: implement lockless __fifo_dump() {CVE-2025-21702} - iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() {CVE-2025-21993} - vlan: enforce underlying device type {CVE-2025-21920} - HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() {CVE-2025-21928} - watch_queue: Actually free the watch {CVE-2022-49256} - can: bcm: Fix UAF in bcm_proc_show() {CVE-2023-52922} - ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() {CVE-2023-52988} - netfilter: nf_set_pipapo: fix initial map fill {CVE-2024-57947} - hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations {CVE-2021-47098} - aio: fix use-after-free due to missing POLLFREE handling {CVE-2021-47505} - aio: keep poll requests on waitqueue until completed {CVE-2021-47505} - smb: client: fix potential deadlock when releasing mids {CVE-2023-52757} - cifs: remove useless DeleteMidQEntry() {CVE-2023-52757} - media: uvcvideo: Remove dangling pointers {CVE-2024-58002} - media: uvcvideo: Only save async fh if success {CVE-2024-58002} - media: uvcvideo: Refactor iterators {CVE-2024-58002} - drm: nv04: Fix out of bounds access {CVE-2024-27008} - drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() {CVE-2025-21780} - arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array {CVE-2025-21785} - net: rose: fix timer races against user threads {CVE-2025-21718} - media: uvcvideo: Fix double free in error path {CVE-2024-57980} - vrf: use RCU protection in l3mdev_l3_out() {CVE-2025-21791} - geneve: Fix use-after-free in geneve_find_dev(). {CVE-2025-21858} - afs: Increase buffer size in afs_update_volume_status() {CVE-2024-26736} - net: atlantic: eliminate double free in error handling logic {CVE-2023-52664} - bpf: Check validity of link->type in bpf_link_show_fdinfo() {CVE-2024-53099}

Update

Update command: dnf update kernel*

Packages list

bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els13.noarch.rpm kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els13.noarch.rpm kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm libbpf-1.0.0-2.el9_2.tuxcare.7.els13.i686.rpm libbpf-1.0.0-2.el9_2.tuxcare.7.els13.x86_64.rpm libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els13.i686.rpm libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els13.x86_64.rpm libbpf-static-1.0.0-2.el9_2.tuxcare.7.els13.i686.rpm libbpf-static-1.0.0-2.el9_2.tuxcare.7.els13.x86_64.rpm perf-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm rtla-5.14.0-284.1101.el9_2.tuxcare.7.els13.x86_64.rpm

CVEs

CVE-2022-49256
CVE-2024-58069
CVE-2025-21920
CVE-2025-21993
CVE-2021-47505
CVE-2025-21702
CVE-2024-58002
CVE-2025-37785
CVE-2023-52988
CVE-2023-52922
CVE-2024-58069
CVE-2025-21718
CVE-2024-57980
CVE-2021-47098
CVE-2025-21969
CVE-2025-21780
CVE-2025-21785
CVE-2024-27008
CVE-2025-21928
CVE-2024-57947
CVE-2025-21905
CVE-2023-52572
CVE-2024-53099
CVE-2025-21858
CVE-2023-52664
CVE-2025-21927
CVE-2023-53107
CVE-2024-53168
CVE-2024-27042
CVE-2024-26736
CVE-2024-53068
CVE-2025-21791
CVE-2023-52757
CVE-2024-50275