Release Info

Advisory: CLSA-2025:1758796886

OS: AlmaLinux 9.2 ESU

Public date: 2025-09-25 10:41:28.903428

Project: kernel

Version: 7.0.0-284.1101.el9_2.tuxcare.7.els20

Errata link: https://errata.tuxcare.com/els_os/almalinux9.2esu/CLSA-2025-1758796886.html

Changelog

- drm/amd/amdgpu: introduce gc_*_mes_2.bin v2 - proc: fix a dentry lock race between release_task and lookup - scsi: aacraid: Stop using PCI_IRQ_AFFINITY - scsi: aacraid: Remove useless code - scsi: aacraid: Remove unused aac_check_health() - scsi: aacraid: struct {user,}sgmap{,64,raw}: Replace 1-element arrays with flexible arrays - scsi: aacraid: Rearrange order of struct aac_srb_unit - scsi: aacraid: struct aac_ciss_phys_luns_resp: Replace 1-element array with flexible array - scsi: aacraid: union aac_init: Replace 1-element array with flexible array - scsi: aacraid: aachba: Replace snprintf() with the safer scnprintf() variant - Revert "scsi: aacraid: Reply queue mapping to CPUs based on IRQ affinity" - scsi: aacraid: Avoid -Warray-bounds warning - scsi: aacraid: Reply queue mapping to CPUs based on IRQ affinity - scsi: aacraid: Replace all non-returning strlcpy with strscpy - scsi: aacraid: Declare SCSI host template const - scsi: aacraid: Drop redundant pci_enable_pcie_error_reporting() - scsi: aacraid: Allocate cmd_priv with scsicmd - scsi: aacraid: Remove redundant "the" - scsi: aacraid: Fix undefined behavior due to shift overflowing the constant - scsi: aacraid: Clean up some inconsistent indenting - scsi: aacraid: Move the SCSI pointer to private command data - scsi: aacraid: Fix spelling of "its" - scsi: aacraid: Call scsi_done() directly - scsi: aacraid: Introduce aac_scsi_done() - scsi: aacraid: Use scsi_cmd_to_rq() instead of scsi_cmnd.request - scsi: aacraid: Remove an unused include - x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler {CVE-2024-25743} - net: sched: sfb: fix null pointer access issue when sfb_init() fails {CVE-2022-50356} - ipv6: mcast: Delay put pmc->idev in mld_del_delrec() {CVE-2025-38550} - scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332} - PM: hibernate: defer device probing when resuming from hibernation {CVE-2022-50202} - net: fix UaF in netns ops registration error path {CVE-2023-52999} - net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed {CVE-2023-52999} - usb: typec: fix potential array underflow in ucsi_ccg_sync_control() {CVE-2024-53203} - soundwire: cadence: fix invalid PDI offset {CVE-2024-38635} - drm/i915/vma: Fix UAF on destroy against retire race {CVE-2024-26939} - netns: Make get_net_ns() handle zero refcount net {CVE-2024-40958} - bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487} - wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921} - wifi: ath11k: fix gtk offload status event locking {CVE-2023-52777} - wifi: mac80211: fix potential key use-after-free {CVE-2023-52530} - i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() {CVE-2022-48632} - net/sched: act_mirred: don't override retval if we already lost the skb {CVE-2024-26739} - can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv {CVE-2021-47459} - net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg {CVE-2021-47596} - Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982} - crypto: qat - resolve race condition during AER recovery {CVE-2024-26974} - crypto: qat - fix double free during reset - media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445} - fs/smb/client: Reset password pointer to NULL {CVE-2023-5345}

Update

Update command: dnf update kernel*

Packages list

bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els20.noarch.rpm kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els20.noarch.rpm kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm libbpf-1.0.0-2.el9_2.tuxcare.7.els20.i686.rpm libbpf-1.0.0-2.el9_2.tuxcare.7.els20.x86_64.rpm libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els20.i686.rpm libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els20.x86_64.rpm libbpf-static-1.0.0-2.el9_2.tuxcare.7.els20.i686.rpm libbpf-static-1.0.0-2.el9_2.tuxcare.7.els20.x86_64.rpm perf-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm rtla-5.14.0-284.1101.el9_2.tuxcare.7.els20.x86_64.rpm

CVEs

CVE-2024-26939
CVE-2024-26939
CVE-2024-36921
CVE-2024-36921
CVE-2024-26974
CVE-2024-26974
CVE-2025-38550
CVE-2022-48632
CVE-2022-48632
CVE-2024-26739
CVE-2021-47459
CVE-2021-47459
CVE-2024-26982
CVE-2024-53203
CVE-2022-50202
CVE-2023-52530
CVE-2023-52999
CVE-2024-39487
CVE-2021-47596
CVE-2021-47596
CVE-2023-52999
CVE-2025-38332
CVE-2023-52445
CVE-2023-5345
CVE-2023-5345
CVE-2024-40958
CVE-2024-25743
CVE-2024-40958
CVE-2024-26739
CVE-2024-39487
CVE-2023-52777
CVE-2024-38635
CVE-2024-38635
CVE-2023-52777
CVE-2023-52530
CVE-2022-50356
CVE-2024-53203
CVE-2024-25743
CVE-2023-52445
CVE-2024-26982