[CLSA-2026:1770032032] kernel: Fix of 63 CVEs
Type:
security
Severity:
Important
Release date:
2026-02-02 11:33:56 UTC
Description:
- mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883} - comedi: aio_iiro_16: Fix bit shift out of bounds {CVE-2025-38529} - comedi: das6402: Fix bit shift out of bounds {CVE-2025-38482} - comedi: pcl812: Fix bit shift out of bounds {CVE-2025-38530} - comedi: das16m1: Fix bit shift out of bounds {CVE-2025-38483} - tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). {CVE-2025-40186} - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863} - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051} - libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285} - sctp: avoid NULL dereference when chunk data buffer is missing {CVE-2025-40240} - smb: client: let recv_done verify data_offset, data_length and remaining_data_length {CVE-2025-39933} - vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248} - ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping {CVE-2025-40154} - Bluetooth: hci_event: call disconnect callback before deleting conn {CVE-2023-53673} - net: fix information leakage in /proc/net/ptype {CVE-2022-48757} - net/mlx5e: fix a potential double-free in fs_any_create_groups {CVE-2023-52667} - mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update {CVE-2024-35855} - Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982} - crypto: qat - resolve race condition during AER recovery {CVE-2024-26974} - perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835} - ext4: fix double-free of blocks due to wrong extents moved_len {CVE-2024-26704} - stm class: Fix a double free in stm_register_device() {CVE-2024-38627} - pinctrl: core: delete incorrect free in pinctrl_enable() {CVE-2024-36940} - ipvlan: add ipvlan_route_v6_outbound() helper {CVE-2023-52796} - wifi: ath11k: fix gtk offload status event locking {CVE-2023-52777} - ice: fix memory corruption bug with suspend and rebuild {CVE-2024-35911} - drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' {CVE-2024-27042} - drm/i915/vma: Fix UAF on destroy against retire race {CVE-2024-26939} - netfilter: nf_tables: prefer nft_chain_validate {CVE-2024-41042} - Bluetooth: Fix potential use-after-free when clear keys {CVE-2023-53386} - drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] {CVE-2024-46815} - drm/amd/display: Check pipe offset before setting vblank {CVE-2024-42120} - nbd: fix incomplete validation of ioctl arg {CVE-2023-53513} - RDMA/rxe: Fix incomplete state save in rxe_requester {CVE-2023-53539} - netfilter: nftables: exthdr: fix 4-byte stack OOB write - net: ppp: Add bound checking for skb data on ppp_sync_txmung {CVE-2025-37749} - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823} - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid {CVE-2025-37927} - drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE {CVE-2025-40277} - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() {CVE-2025-38724} - RDMA/rxe: Fix mr->map double free {CVE-2022-50543} - ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212} - vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403} - RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug {CVE-2025-38024} - drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies {CVE-2025-40096} - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() {CVE-2025-38103} - drm/i915: mark requests for GuC virtual engines to avoid use-after-free {CVE-2023-53552} - net: atlantic: fix fragment overflow handling in RX path {CVE-2025-68301} - net: atm: add lec_mutex {CVE-2025-38323} - net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789} - scsi: lpfc: Fix buffer free/clear order in deferred receive path {CVE-2025-39841} - jbd2: remove wrong sb->s_sequence check {CVE-2025-37839} - tracing: Fix oob write in trace_seq_to_buffer() {CVE-2025-37923} - Squashfs: check return result of sb_min_blocksize {CVE-2025-38415} - ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346} - tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). {CVE-2025-39955} - wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157} - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245} - ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249} - md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - bpf: Avoid __bpf_prog_ret0_warn when jit fails {CVE-2025-38280} - vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618} - fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}
Updated packages:
  • bpftool-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:e4f03b22d2f1122f5a1f32e881c7979ecba110c583d1b814f28e3913c80c073b
  • kernel-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:0eba7e758e5efbc76d4e50013c073d48adf7600bfd42a1837976c8e9df06499b
  • kernel-core-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:68561a536ce40deebe51531a2340b7cf35324fd61f788e24eb86ed1df63cbcd9
  • kernel-cross-headers-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:cf018224b0d7a13693d914b5820c3f53be33e1c60c30762a176127393a8847d6
  • kernel-debug-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:790027cd1b2013d9fc6656fef3f00af4673c9e10ed23477fc5698b75c4406c1c
  • kernel-debug-core-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:1cb57e2cd9e7c41f9eeed36f953c9805bff81bd00fb9b549ae16d27dd6198e72
  • kernel-debug-devel-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:585d96e021eb2bc38a33d927e487f6cb9aa97a4a4d39e70ec1d4cd485900d986
  • kernel-debug-modules-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:c3df845bd99a7fe72df1bee3f80a3681f76a288564ada4624e8978a86397a34e
  • kernel-debug-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:9c5b03488b09f576c1db2250885d021621824db17b4aa7d5a86377a6a5824d93
  • kernel-debug-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:de1465f7de7e67d82a7ea75a777c5947e617bed1b1e8ec2498b9994eefa896b9
  • kernel-devel-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:658dd9b900f53b4707359dc5a02d87d8a2bcbb4eb32aa78280e04b02920008cf
  • kernel-headers-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:9cab796a438d29b993bd04000ff9660179ebe6b42aa8934e75da83a924ff269e
  • kernel-ipaclones-internal-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:13a0ebeda5ff826fc9bc9f9ec26c55fb198fe1334211e83334832dea98fe7f50
  • kernel-modules-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:bbcafa183de69bbcd41af475c1e2c1e391f89172625eea1b9ffe8bf21b3d2540
  • kernel-modules-extra-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:f3baa841518182083c82fe803a8b4628f8442b8617c950c922444c611310f7de
  • kernel-modules-internal-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:fe85d2d2c10a3067cdac37baf83c88fc36202dc4285e266cb553a69ee6e61a59
  • kernel-selftests-internal-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:0af96c4992630c7ea5427c3d5f0b0b13bb91c1d60714eda8c55e64748053bc3c
  • kernel-tools-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:a9f928e880471333411c1245de5fbdaecf55dde75bb5a6ce6fad0f1419b4c67e
  • kernel-tools-libs-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:ea9db18635da15713ac0c1a3113281310cd940ff55a72e23a0a2021b24fec8a4
  • kernel-tools-libs-devel-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:526e34f3b7b1c09fb6f8a91c1426f7e620711d8b50b3bddfd162cc474b2b7264
  • perf-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:17094214d7c26ed0f9b97d2df244e2313d7860048274b34a211f6dc89b92af5c
  • python3-perf-4.18.0-553.6.1.el8_10.tuxcare.els15.x86_64.rpm
    sha:b095c14292dc4e188094471ba8288306ecf6e0e2b217fa1955121cf372685f8f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.