[CLSA-2026:1777614954] kernel: Fix of 37 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-01 12:44:14 UTC
Description:
- crypto: algif_aead - Fix minimum RX size check for decryption - crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl - crypto: authencesn - Fix src offset when decrypting in-place - crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption - crypto: authenc - use memcpy_sglist() instead of null skcipher - crypto: algif_aead - snapshot IV for async AEAD requests - crypto: algif_aead - Revert to operating out-of-place - crypto: algif_aead - use memcpy_sglist() instead of null skcipher - crypto: scatterwalk - Backport memcpy_sglist() - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec - macvlan: fix possible UAF in macvlan_forward_source() {CVE-2026-23001} - tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). {CVE-2025-40149} - bpf, cpumap: Make sure kthread is running before map update returns {CVE-2023-53577} - net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() {CVE-2023-53578} - migrate: correct lock ordering for hugetlb file folios {CVE-2026-23097} - net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve {CVE-2023-4623} - e1000e: fix heap overflow in e1000_set_eeprom {CVE-2025-39898} - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} - md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request {CVE-2023-53380} - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103} - tls: separate no-async decryption request handling from async {CVE-2024-58240} - ftrace: Also allocate and copy hash for reading of filter files {CVE-2025-39689} - HID: uclogic: Correct devm device reference for hidinput input_dev name {CVE-2023-54207} - ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() {CVE-2025-71085} - ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089} - nfsd: provide locking for v4_end_grace {CVE-2026-22980} - ext4: fix uninititialized value in 'ext4_evict_inode' {CVE-2022-50546} - ip_vti: fix potential slab-use-after-free in decode_session6 {CVE-2023-53559} - dm flakey: don't corrupt the zero page {CVE-2023-54317} - net: add dst_dev_rcu() helper for safe dst->dev access {CVE-2025-40135} - xhci: simplify event ring dequeue tracking for transfer events - i40e: increase max descriptors for XL710 - perf/core: Prevent VMA split of buffer mappings {CVE-2025-38563} - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class - KVM: x86: Reset IRTE to host control if *new* route isn't postable {CVE-2025-37885} - ipvlan: add ipvlan_route_v6_outbound() helper {CVE-2023-52796} - net: phylink: add lock for serializing concurrent pl->phydev writes with resolver {CVE-2025-39905} - kyber: fix out of bounds access when preempted {CVE-2021-46984} - page_pool: Fix use-after-free in page_pool_recycle_in_ring {CVE-2025-38129} - scsi: mpi3mr: Use number of bits to manage bitmap sizes {CVE-2023-53376} - crypto: lzo - Fix compression buffer overrun {CVE-2025-38068} - ipv6: use RCU for dst->dev access in ip6_xmit, ip6_output, ip6_finish_output2 {CVE-2025-40135} {CVE-2025-40158} - HID: hyperv: Correctly access fields declared as __le16 {CVE-2025-38103} - i40e: add validation for ring_len param {CVE-2025-39973} - mmc: core: use sysfs_emit() instead of sprintf() {CVE-2022-49267} - cacheinfo: Fix shared_cpu_map to handle shared caches at different levels {CVE-2023-53254} - drm/amdkfd: Fix double release compute pasid {CVE-2022-50303} - drm/amd/display: Check dce_hwseq before dereferencing it {CVE-2025-38361} - RDMA/rxe: Fix mr->map double free {CVE-2022-50543} - virtio-net: ensure the received length does not exceed allocated size {CVE-2025-38375} - crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:9e267ab223247abb511c66a2821ab1ef5f33462aa0f4cd68ea9ccb51003443dc
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:7b7cd1ce3b80c1f8feaf2d2cb5fadc885f165e44461bdc331dc1878f41be709c
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:e4817a9aba1857fbc606e7f13fbaeff44b5ee33a1daf6e786dfc3aa1d36d2ab3
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:eb0f32a9b94417c24abde6dd711062da22ab7159a593940ec038a834a0afa872
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:8e195c56ed634baaad23cc6e2e6c944a6059bc224ebad7b6d07417554cfee9a0
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:e277f2aa958728963c99533a85bd52b74b1445fe3bbebc9ac6f84f88b2d08237
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:d0474658234e42c72c065ea10559fda3034eeec320a5865cb3b5782414c0f332
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:1ba3f8b6dd0aba893d4135d92120b7df71c7e1b5408e1e7dd991c985dbf2f1aa
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:7044886ba0ad5684de0d080fe50ebec81e2f5f19695644ab70397911f2b51303
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:1d381bbd93b4b57fa67ec5e58eff0cf4171700b8aab789d49cfef92f4ec486ff
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:7eff6546f9adf4402d1a983ade6f8dfff12cc4d2054bccf0afd2c9bff4e42e31
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:036ee98721f7c69c7668c81d1b8f010f036958833673feffb4eba8f06f691971
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:ea4ed184bd808e83c0755ac08cf56021ea322a1e7d4e4fc468fe24b6b1c8bba2
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:430c9314a7f4fdddd0ace363d638bf8c2567bb64f8576833f2af10a3a99bd647
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:39d67e2ba955c3e177f328d78e2c691847d5ee407fd41cbb4216c4f3569dd7e0
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:d828da78ee2d360d69f4842f8f3ed561aefa57ceeaa62ff9c16b0a7dc0dac7c4
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:a737d547ac8dba7a36eb2f49f4116f1a38e7585c7da5b899bed9925f40afc68a
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:b5e994ec0afb6fd6e6a483c0a55c9611feedd34a1aaa5a13c7291fb5bbb84204
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:f919b3d5a463855bca87b5052e8f88c2997da4aa7f8d5941aa48e448fd0e88cd
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:d2f5e57bd70389465f28b731ad0fb9e9cb2a7787d0e08caf5cc293be2b877b81
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:b438064905af43407a21e9ea995f65a39c4d58dae1cf4360e3ed1d2a3f1f7761
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els36.x86_64.rpm
    sha:dafd3b2fc33521486c6e344e7a60e2c66c1fce9195ccf315a864625cf3934ceb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.