Release info for CLSA-2025:1760546935
kernel: Fix of 43 CVEs
Published on Oct 15, 2025
Details
High- Advisory
- CLSA-2025:1760546935
- Operating system
- AlmaLinux 9.2 ESU
- Published date
- 2025-10-15
- Component
- kernel
- Type
- security
Packages list
bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els22.noarch.rpm
kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els22.noarch.rpm
kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
libbpf-1.0.0-2.el9_2.tuxcare.7.els22.i686.rpm
libbpf-1.0.0-2.el9_2.tuxcare.7.els22.x86_64.rpm
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els22.i686.rpm
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els22.x86_64.rpm
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els22.i686.rpm
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els22.x86_64.rpm
perf-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
rtla-5.14.0-284.1101.el9_2.tuxcare.7.els22.x86_64.rpm
CVEs
- CVE-2022-50272
- CVE-2022-50327
- CVE-2022-50341
- CVE-2022-50447
- CVE-2022-50464
- CVE-2023-52697
- CVE-2023-52731
- CVE-2023-52836
- CVE-2023-53185
- CVE-2023-53220
- CVE-2023-53224
- CVE-2023-53232
- CVE-2023-53263
- CVE-2023-53280
- CVE-2023-53292
- CVE-2023-53296
- CVE-2023-53297
- CVE-2023-53365
- CVE-2023-53376
- CVE-2023-53395
- CVE-2023-53398
- CVE-2023-53464
- CVE-2023-53470
- CVE-2023-53477
- CVE-2023-53512
- CVE-2023-53521
- CVE-2023-53532
- CVE-2024-26910
- CVE-2024-35932
- CVE-2024-36032
- CVE-2024-36880
- CVE-2024-36898
- CVE-2024-36974
- CVE-2024-38659
- CVE-2024-39503
- CVE-2024-40993
- CVE-2024-41042
- CVE-2024-42119
- CVE-2024-57876
- CVE-2025-38472
- CVE-2025-38527
- CVE-2025-38718
- CVE-2025-39825