Release info for CLSA-2026:1771239384
kernel: Fix of 75 CVEs
Published on Feb 16, 2026
Details
High- Advisory
- CLSA-2026:1771239384
- Operating system
- AlmaLinux 9.2 ESU
- Published date
- 2026-02-16
- Component
- kernel
- Type
- security
Packages list
bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els28.noarch.rpm
kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els28.noarch.rpm
kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
libbpf-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
libbpf-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els28.i686.rpm
libbpf-static-1.0.0-2.el9_2.tuxcare.7.els28.x86_64.rpm
perf-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
rtla-5.14.0-284.1101.el9_2.tuxcare.7.els28.x86_64.rpm
CVEs
- CVE-2022-50329
- CVE-2022-50488
- CVE-2022-50700
- CVE-2022-50865
- CVE-2023-52983
- CVE-2023-53259
- CVE-2023-53473
- CVE-2023-53484
- CVE-2023-53668
- CVE-2023-53676
- CVE-2023-53680
- CVE-2023-53762
- CVE-2023-53780
- CVE-2023-53996
- CVE-2023-54015
- CVE-2023-54072
- CVE-2023-54102
- CVE-2023-54155
- CVE-2024-58013
- CVE-2025-37825
- CVE-2025-38004
- CVE-2025-38013
- CVE-2025-38051
- CVE-2025-38083
- CVE-2025-38102
- CVE-2025-38103
- CVE-2025-38107
- CVE-2025-38108
- CVE-2025-38111
- CVE-2025-38118
- CVE-2025-38129
- CVE-2025-38157
- CVE-2025-38180
- CVE-2025-38212
- CVE-2025-38245
- CVE-2025-38320
- CVE-2025-38323
- CVE-2025-38346
- CVE-2025-38375
- CVE-2025-38395
- CVE-2025-38403
- CVE-2025-38415
- CVE-2025-38425
- CVE-2025-38572
- CVE-2025-38574
- CVE-2025-38680
- CVE-2025-38685
- CVE-2025-38702
- CVE-2025-38729
- CVE-2025-39689
- CVE-2025-39691
- CVE-2025-39749
- CVE-2025-39766
- CVE-2025-39790
- CVE-2025-39823
- CVE-2025-39853
- CVE-2025-39863
- CVE-2025-39880
- CVE-2025-39883
- CVE-2025-39891
- CVE-2025-39901
- CVE-2025-39905
- CVE-2025-39911
- CVE-2025-39933
- CVE-2025-39973
- CVE-2025-40141
- CVE-2025-40154
- CVE-2025-40240
- CVE-2025-40248
- CVE-2025-40258
- CVE-2025-40269
- CVE-2025-40271
- CVE-2025-40277
- CVE-2025-68285
- CVE-2025-68305