[CLSA-2026:1768774361] kernel: Fix of 31 CVEs
Type:
security
Severity:
Important
Release date:
2026-01-18 22:12:45 UTC
Description:
- ip6_vti: fix slab-use-after-free in decode_session6 {CVE-2023-53821} - ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer {CVE-2023-53395} - wifi: mac80211_hwsim: drop short frames {CVE-2023-53321} - ext4: add bounds checking in get_max_inline_xattr_value_size() {CVE-2023-53285} - md/raid10: fix null-ptr-deref in raid10_sync_request {CVE-2023-53832} - dm flakey: fix a crash with invalid table line {CVE-2023-53786} - wifi: mt7601u: fix an integer underflow {CVE-2023-53679} - ext4: fix bug_on in __es_tree_search caused by bad boot loader inode {CVE-2022-50638} - USB: usbtmc: Fix direction for 0-length ioctl control messages {CVE-2023-53761} - scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() {CVE-2023-53803} - ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249} - md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - dm cache: free background tracker's queued work in {CVE-2023-53765} - drm/amdkfd: Fix UBSAN shift-out-of-bounds warning {CVE-2021-4460} - drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280,CVE-2022-50440} - vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618} - ice: set tx_tstamps when creating new Tx rings via ethtool {CVE-2022-50710} - media: dvb-frontends: avoid stack overflow warnings with clang {CVE-2024-27075} - PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free {CVE-2023-53446} - cifs: Fix warning and UAF when destroy the MR list {CVE-2023-53427} - sctp: fix a potential overflow in sctp_ifwdtsn_skip {CVE-2023-53372} - md/raid10: check slab-out-of-bounds in md_bitmap_get_counter {CVE-2023-53357} - lwt: Fix return values of BPF xmit ops {CVE-2023-53338} - ubi: ensure that VID header offset + VID header size <= alloc, size {CVE-2023-53265} - ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423} - Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411} - ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315} - wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace {CVE-2023-54286}
Updated packages:
  • bpftool-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:331c01a64112b3553c1555f015d0ecc4b2e8582c2a3d7ba77cb91ef8fbd1f226
  • kernel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:bcf1c73930e55e92f829433068edfa997a6cf6f43c7251afe0d0df48951d7929
  • kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:61c6616bed2fa78164a197fdda4f955ebfd53246cf8db17dd59bbe8d2ef73839
  • kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:a5ea0e955388105b300882a804923491837f526f353f0adac847bd7a647dc4e0
  • kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:bea1e62956a83e24b23fb5d4cfbaa176628fdbcef15a8cf41b7e648fda65bdee
  • kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:621edde4a4829b171ef49a6a8e0cd3c3fb47b8dca356e08140691f25f034188d
  • kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:1ac6e60d371b4fde6820e5a3e5f8957ad46735c66496f00836ec7c1e8ac94f24
  • kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:5b7d0a9b1c324d3a63ed4cadf59aabaf51c1e1209671fdb969728b0cfa867935
  • kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:3a73f7ff599fb9737004e4734a47f93a3da8dca73ecae225ed93515e331b5f20
  • kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:7ab59114d00b79d7cba860adcfc799086507ad54baa434ed611f055534c84f57
  • kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:6d4810da7faf4f3b122bff4658cec52fe27c8d5b0af21f6a3d0e66f5856551ca
  • kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:3a9b3000d6bbbea783fa2a203a485624b189b6b30d70785dab4c52e3e00c5be4
  • kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:0d5dcdea0d8962bce2620f7e2199c1a264713ac89bfc8bd41ba457cd178505f9
  • kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:3972cbfc0ee96543a2d46b74ff073cfe56bb3b6bd600b4fce50989251476f094
  • kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:d4d521c48f8796f3633262456c6d60b2429ebb2d06be988e06fa8488075ae212
  • kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:569fc805585ebfab95f6adcd768b745f9d946ab1f3fabf5fe15abb1a09fbe536
  • kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:fa62925d49141e07417e9def2a7adc4fb767b24f9ad9fe8162115be69d5f1241
  • kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:3f389ddc27503d888d88a2ec841d0a21a9deb31a18de0ff8b45eb9b12f20d6e2
  • kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:99d55832793a345ce0e127ae61b085e5c964714e585207eccc6bd054eb618de1
  • kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:809d650afaa34fa60d00804e11cf0f3cfb13e1e1fad8f9293f91fbb6f80aee08
  • perf-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:92b750bf55250fe3469301c1b66a50ddadd62b733735bdb28af4f59778d322c7
  • python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm
    sha:f8371cbc9bdef9c0716b7fbce22e1222ff3edba1f5588b134c3c77169bb56e65
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.