[CLSA-2026:1777614651] kernel: Fix of 52 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-01 09:25:18 UTC
Description:
- crypto: algif_aead - Fix minimum RX size check for decryption - crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl - crypto: authencesn - Fix src offset when decrypting in-place - crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption - crypto: authenc - use memcpy_sglist() instead of null skcipher - crypto: algif_aead - snapshot IV for async AEAD requests - crypto: algif_aead - Revert to operating out-of-place - crypto: algif_aead - use memcpy_sglist() instead of null skcipher - crypto: scatterwalk - Backport memcpy_sglist() - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec - nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec {CVE-2026-22998} - xfrm: add NULL check in xfrm_update_ae_params {CVE-2023-3772} - sctp: check send stream number after wait_for_sndbuf {CVE-2023-53296} - ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value {CVE-2022-50327} - ext4: fix uninititialized value in 'ext4_evict_inode' {CVE-2022-50546} - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). {CVE-2025-40149} - bpf, cpumap: Make sure kthread is running before map update returns {CVE-2023-53577} - net: add dst_dev_rcu() helper for safe dst->dev access {CVE-2025-40135} - net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204} - net: add skb_header_pointer_careful() helper - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623} - ip_vti: fix potential slab-use-after-free in decode_session6 {CVE-2023-53559} - e1000e: fix heap overflow in e1000_set_eeprom {CVE-2025-39898} - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} - md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request {CVE-2023-53380} - HID: uclogic: Correct devm device reference for hidinput input_dev name {CVE-2023-54207} - ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() {CVE-2022-50698} - selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context() {CVE-2022-50699} - scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() {CVE-2023-54014} - ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() {CVE-2025-71085} - ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089} - scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193} - drm/i915/gvt: fix gvt debugfs destroy {CVE-2023-54098} - nfsd: provide locking for v4_end_grace {CVE-2026-22980} - dm flakey: don't corrupt the zero page {CVE-2023-54317} - drm/amdkfd: Fix double release compute pasid {CVE-2022-50303} - RDMA/srpt: Fix a use-after-free {CVE-2022-50129} - RDMA/srpt: Introduce a reference count in struct srpt_device - RDMA/srpt: Duplicate port name members - KVM: x86: Reset IRTE to host control if *new* route isn't postable {CVE-2025-37885} - ipvlan: add ipvlan_route_v6_outbound() helper {CVE-2023-52796} - mmc: core: use scnprintf() instead of sprintf() in sysfs show functions {CVE-2022-49267} - rcu: Fix rcu_read_unlock() deadloop due to IRQ work {CVE-2025-39744} - net/mlx5: Add a timeout to acquire the command queue semaphore {CVE-2024-38556} - virtio-net: ensure the received length does not exceed allocated size {CVE-2025-38375} - cacheinfo: Fix shared_cpu_map to handle shared caches at different levels {CVE-2023-53254} - RDMA/mlx5: Return the firmware result upon destroying QP/RQ {CVE-2023-53286} - RDMA/rxe: Fix mr->map double free {CVE-2022-50543} - wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() {CVE-2022-50881} - tcp: fix a signed-integer-overflow bug in tcp_add_backlog() {CVE-2022-50865} - NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945} - perf/aux: Fix AUX buffer serialization {CVE-2024-46713} - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882} - usb: xhci: Complete 'error mid TD' transfers when handling Missed Service - usb: xhci: remove 'handling_skipped_tds' from handle_tx_event() - xhci: simplify event ring dequeue tracking for transfer events - smb3: fix for slab out of bounds on mount to ksmbd {CVE-2025-38728} - perf/core: Prevent VMA split of buffer mappings {CVE-2025-38563} - i40e: add validation for ring_len param {CVE-2025-39973} - i40e: increase max descriptors for XL710 - RDMA/rxe: Fix incomplete state save in rxe_requester {CVE-2023-53539} - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103} - HID: hyperv: Correctly access fields declared as __le16 {CVE-2025-38103} - ASoC: topology: Fix references to freed memory {CVE-2024-41069} - drivers: base: Free devm resources when unregistering a device {CVE-2023-53596} - ext4: fix use-after-free in ext4_orphan_cleanup {CVE-2022-50673} - net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538} - perf/core: Exit early on perf_mmap() fail {CVE-2025-38565} - fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271} - virtio_net: fix xdp_rxq_info bug after suspend/resume {CVE-2022-49687} - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:f1fd645a0fbe9a9c4f1dce7165e5c798dede65500984a596f15a447a5c1b06df
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:7904b97b0551551266c1646551b274b51854420efd9d2439f74d22be378c3e8e
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:1b52c68d62787aae668f4828e6e2a36d456dbecfc92a7924a75c553c7f9f28ad
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:b4dd93f551ad85114f769d154699facaa51c8d05be7b2dc28913f1dd581e49bb
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:6e98c08cd920733b1b8c8854fc03d812e6172c53714dfc222af7c8bd6b4f3226
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:58d7b329095a6cc64c70c8f8ac81b5b39d7bc2e3f82785595956c067ee46ef58
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:9cd47fbdb5bc83a0f3760a80eefb171c0f7bf3639c7c2769932f32c00172b5a5
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:30e250b831ac9a47cbbd502dc9597f93d2168b12e74bfc707b9ede5e25094ffb
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:c2dcbd5e6c62261746b7bc804ce1ba15c557a7d2f0520103026522bade288723
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:6367fe2495c52fcbc916e7f7b5e1b9b7736644fbd370725579ef535820f0b3e2
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:5653a10e7c2d2730e922146a98a3e582f7d3a57f62013b403a242c18b19d939f
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:1b5ec421cee9f13ea495df4f4bf51e1eb7e1ff9b6730306ef736e666120b31f1
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:18892846e99057d787243a2ca53f2d8703a74c52a9365a733fd3e7856734a744
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:0e06ef2a23fb6e7028c4592c0ae377f2098f6fdb3a3ea5b86d8c6a4dff39fb76
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:03a10eaaecf8c874c27599a02ca1a8a418bd47a1bf5a6dfea4a743bc0555a311
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:aab6d2009905d734ffe77a355ed0df6087322da5abac8fba5803e7ead1ecc4d5
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:de5d8f2c087feff65b71158ce9400e67aa444da8a35189121ab11689475ad4ce
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:f08bdd5ec15a8be75c0fbe51c93304fa00e50edb72b4f5ce89d19c4bc33ca8ed
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:680d0525885acdf0e001ed93f9a5ee45263a945eded6302d81b7c29533b64d98
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:c0ad5c9829c6eb80f2015a3ac2fb8ad5114f62f4565d816cd210f4c313b0e730
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:da0ae7e5ab28cfc8a499f6e331afc691067d3c81a124bc9ee16189409a8ffbce
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els36.x86_64.rpm
    sha:b3e30ce65568591b03d09166f646b2d690dc018c1723b5846f679768be6c825a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.