The Linux Kernel, the operating system core itself.
Security Fix(es):
In the Linux kernel, the following vulnerability has been resolved:
media: av7110: prevent underflow in writetsto_decoder()
The buf[4] value comes from the user via tsplay(). It is a value in the u8 range. The final length we pass to av7110ipackinstantrepack() is "len - (buf[4] + 1) - 4" so add a check to ensure that the length is not negative. It's not clear that passing a negative len value does anything bad necessarily, but it's not best practice.
With the new bounds checking the "if (!len)" condition is no longer possible or required so remove that.(CVE-2023-54284)
In the Linux kernel, the following vulnerability has been resolved:
ipvs: Defer ipvsftp unregister during netns cleanup
On the netns cleanup path, _ipvsftpexit() may unregister ipvsftp before connections with valid cp->app pointers are flushed, leading to a use-after-free.
Fix this by introducing a global exiting_module flag, set to true in
ipvsftpexit() before unregistering the pernet subsystem. In
_ipvsftpexit(), skip ipvsftp unregister if called during netns
cleanup (when exitingmodule is false) and defer it to
_ipvscleanupbatch(), which unregisters all apps after all connections
are flushed. If called during module exit, unregister ipvsftp
immediately.(CVE-2025-40018)
In the Linux kernel, the following vulnerability has been resolved:
libceph: fix potential use-after-free in havemonandosdmap()
The wait loop in _cephopensession() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both cephmonchandlemap() and handleonemap() install a new map immediately after freeing the old one
kfree(monc->monmap);
monc->monmap = monmap;
ceph_osdmap_destroy(osdc->osdmap);
osdc->osdmap = newmap;
under client->monc.mutex and client->osdc.lock respectively, but because neither is taken in havemonandosdmap() it's possible for client->monc.monmap->epoch and client->osdc.osdmap->epoch arms in
client->monc.monmap && client->monc.monmap->epoch &&
client->osdc.osdmap && client->osdc.osdmap->epoch;
condition to dereference an already freed map. This happens to be reproducible with generic/395 and generic/397 with KASAN enabled:
BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
...
Call Trace:
<TASK>
have_mon_and_osd_map+0x56/0x70
ceph_open_session+0x182/0x290
ceph_get_tree+0x333/0x680
vfs_get_tree+0x49/0x180
do_new_mount+0x1a3/0x2d0
path_mount+0x6dd/0x730
do_mount+0x99/0xe0
__do_sys_mount+0x141/0x180
do_syscall_64+0x9f/0x100
entry_SYSCALL_64_after_hwframe+0x76/0x7e
</TASK>
Allocated by task 13305:
ceph_osdmap_alloc+0x16/0x130
ceph_osdc_init+0x27a/0x4c0
ceph_create_client+0x153/0x190
create_fs_client+0x50/0x2a0
ceph_get_tree+0xff/0x680
vfs_get_tree+0x49/0x180
do_new_mount+0x1a3/0x2d0
path_mount+0x6dd/0x730
do_mount+0x99/0xe0
__do_sys_mount+0x141/0x180
do_syscall_64+0x9f/0x100
entry_SYSCALL_64_after_hwframe+0x76/0x7e
Freed by task 9475:
kfree+0x212/0x290
handle_one_map+0x23c/0x3b0
ceph_osdc_handle_map+0x3c9/0x590
mon_dispatch+0x655/0x6f0
ceph_con_process_message+0xc3/0xe0
ceph_con_v1_try_read+0x614/0x760
ceph_con_workfn+0x2de/0x650
process_one_work+0x486/0x7c0
process_scheduled_works+0x73/0x90
worker_thread+0x1c8/0x2a0
kthread+0x2ec/0x300
ret_from_fork+0x24/0x40
ret_from_fork_asm+0x1a/0x30
Rewrite the wait loop to check the above condition directly with client->monc.mutex and client->osdc.lock taken as appropriate. While at it, improve the timeout handling (previously mounttimeout could be exceeded in case waiteventinterruptibletimeout() slept more than once) and access client->autherr under client->monc.mutex to match how it's set in finishauth().
monmapshow() and osdmapshow() now take the respective lock before accessing the map as well.(CVE-2025-68285)
In the Linux kernel, the following vulnerability has been resolved:
ip6tunnel: use skbvlaninetprepare() in _ip6tnl_rcv()
Blamed commit did not take care of VLAN encapsulations as spotted by syzbot [1].
Use skbvlaninetprepare() instead of pskbinetmaypull().
[1] BUG: KMSAN: uninit-value in _INETECNdecapsulate include/net/inetecn.h:253 [inline] BUG: KMSAN: uninit-value in INETECNdecapsulate include/net/inetecn.h:275 [inline] BUG: KMSAN: uninit-value in IP6ECNdecapsulate+0x7a8/0x1fa0 include/net/inetecn.h:321 _INETECNdecapsulate include/net/inetecn.h:253 [inline] INETECNdecapsulate include/net/inetecn.h:275 [inline] IP6ECNdecapsulate+0x7a8/0x1fa0 include/net/inetecn.h:321 ip6ip6dscpecndecapsulate+0x16f/0x1b0 net/ipv6/ip6tunnel.c:729 _ip6tnlrcv+0xed9/0x1b50 net/ipv6/ip6tunnel.c:860 ip6tnlrcv+0xc3/0x100 net/ipv6/ip6tunnel.c:903 grercv+0x1529/0x1b90 net/ipv6/ip6gre.c:-1 ip6protocoldeliverrcu+0x1c89/0x2c60 net/ipv6/ip6input.c:438 ip6inputfinish+0x1f4/0x4a0 net/ipv6/ip6input.c:489 NFHOOK include/linux/netfilter.h:318 [inline] ip6input+0x9c/0x330 net/ipv6/ip6input.c:500 ip6mcinput+0x7ca/0xc10 net/ipv6/ip6input.c:590 dstinput include/net/dst.h:474 [inline] ip6rcvfinish+0x958/0x990 net/ipv6/ip6input.c:79 NFHOOK include/linux/netfilter.h:318 [inline] ipv6rcv+0xf1/0x3c0 net/ipv6/ip6input.c:311 _netifreceiveskbonecore net/core/dev.c:6139 [inline] _netifreceiveskb+0x1df/0xac0 net/core/dev.c:6252 netifreceiveskbinternal net/core/dev.c:6338 [inline] netifreceiveskb+0x57/0x630 net/core/dev.c:6397 tunrxbatched+0x1df/0x980 drivers/net/tun.c:1485 tungetuser+0x5c0e/0x6c60 drivers/net/tun.c:1953 tunchrwriteiter+0x3e9/0x5c0 drivers/net/tun.c:1999 newsyncwrite fs/readwrite.c:593 [inline] vfswrite+0xbe2/0x15d0 fs/readwrite.c:686 ksyswrite fs/readwrite.c:738 [inline] _dosyswrite fs/readwrite.c:749 [inline] _sesyswrite fs/readwrite.c:746 [inline] _x64syswrite+0x1fb/0x4d0 fs/readwrite.c:746 x64syscall+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls64.h:2 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd3/0xf80 arch/x86/entry/syscall64.c:94 entrySYSCALL64after_hwframe+0x77/0x7f
Uninit was created at: slabpostallochook mm/slub.c:4960 [inline] slaballocnode mm/slub.c:5263 [inline] kmemcacheallocnodenoprof+0x9e7/0x17a0 mm/slub.c:5315 kmallocreserve+0x13c/0x4b0 net/core/skbuff.c:586 _allocskb+0x805/0x1040 net/core/skbuff.c:690 allocskb include/linux/skbuff.h:1383 [inline] allocskbwithfrags+0xc5/0xa60 net/core/skbuff.c:6712 sockallocsendpskb+0xacc/0xc60 net/core/sock.c:2995 tunallocskb drivers/net/tun.c:1461 [inline] tungetuser+0x1142/0x6c60 drivers/net/tun.c:1794 tunchrwriteiter+0x3e9/0x5c0 drivers/net/tun.c:1999 newsyncwrite fs/readwrite.c:593 [inline] vfswrite+0xbe2/0x15d0 fs/readwrite.c:686 ksyswrite fs/readwrite.c:738 [inline] _dosyswrite fs/readwrite.c:749 [inline] _sesyswrite fs/readwrite.c:746 [inline] _x64syswrite+0x1fb/0x4d0 fs/readwrite.c:746 x64syscall+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls64.h:2 dosyscallx64 arch/x86/entry/syscall64.c:63 [inline] dosyscall64+0xd3/0xf80 arch/x86/entry/syscall64.c:94 entrySYSCALL64afterhwframe+0x77/0x7f
CPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025(CVE-2026-23003)
{
"severity": "High"
}{
"aarch64": [
"bpftool-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"bpftool-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-debugsource-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-devel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-source-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-tools-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-tools-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"kernel-tools-devel-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"python2-perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"python2-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"python3-perf-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm",
"python3-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.aarch64.rpm"
],
"x86_64": [
"bpftool-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"bpftool-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-debugsource-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-devel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-source-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-tools-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-tools-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"kernel-tools-devel-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"python2-perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"python2-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"python3-perf-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm",
"python3-perf-debuginfo-4.19.90-2602.2.0.0362.oe2003sp4.x86_64.rpm"
],
"src": [
"kernel-4.19.90-2602.2.0.0362.oe2003sp4.src.rpm"
]
}