Details
-
Task
-
Resolution: Won't Fix
-
Medium
-
None
-
Lustre 2.18.0
-
None
-
3
-
9223372036854775807
Description
Security Fix(es) for kernel 5.14.0-611.16.1.el9_7:
- kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (CVE-2025-38499)
- kernel: iommufd: Fix race during abort for file descriptors (CVE-2025-39966)
- kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails (CVE-2025-40176)
https://access.redhat.com/errata/product/479/ver=/rhel---9/x86_64/RHSA-2025:23241
Security Fix(es) for kernel 5.14.0-611.24.1.el9_7:
- kernel: drm/xe: Make dma-fences compliant with the safe access rules (CVE-2025-38703)
- kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933)
- kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277)
- kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (CVE-2025-68287)
- kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285)
https://access.redhat.com/errata/product/479/ver=/rhel---9/x86_64/RHSA-2026:0793