Release date:
2026-03-09 09:18:45 UTC
Description:
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921}
- ASoC: topology: Fix references to freed memory {CVE-2024-41069}
- net/sched: act_mirred: don't override retval if we already lost the skb {CVE-2024-26739}
- drivers: base: Free devm resources when unregistering a device {CVE-2023-53596}
- usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760}
- fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}
- net/mlx5e: Avoid field-overflowing memcpy() {CVE-2022-48744}
- ext4: fix use-after-free in ext4_orphan_cleanup {CVE-2022-50673}
- xfrm: fix slab-use-after-free in decode_session6 {CVE-2023-53500}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL {CVE-2023-53680}
- perf/core: Exit early on perf_mmap() fail {CVE-2025-38565}
- i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911}
- fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271}
- virtio_net: fix xdp_rxq_info bug after suspend/resume {CVE-2022-49687}
- NFSD: Fix the behavior of READ near OFFSET_MAX {CVE-2022-48827}
- usb: xhci: Apply the link chain quirk on NEC isoc endpoints {CVE-2025-22022}
- Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966}
- Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965}
- Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35967}
- netfilter: nf_tables: prefer nft_chain_validate {CVE-2024-41042}
- netfilter: validate user input for expected length {CVE-2024-35896}
- erspan: do not use skb_mac_header() in ndo_start_xmit() {CVE-2023-53053}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- i40e: remove read access to debugfs files {CVE-2025-39901}
- wifi: cfg80211: check A-MSDU format more carefully {CVE-2024-35937}
- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind {CVE-2025-68305}
- RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem {CVE-2025-38022}
- netfilter: allow exp not to be removed in nf_ct_find_expectation {CVE-2023-52927}
- dm-bufio: don't schedule in atomic context {CVE-2025-37928}
- HID: multitouch: Add NULL check in mt_input_configured {CVE-2024-58020}
- netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX {CVE-2025-38201}
- fs: writeback: fix use-after-free in __mark_inode_dirty() {CVE-2025-39866}
- tracing/histograms: Add histograms to hist_vars if they have referenced variables {CVE-2023-53560}
- netfilter: conntrack: Avoid nf_ct_helper_hash uses after free {CVE-2023-53619}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() {CVE-2024-35791}
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}
- dm cache: Fix UAF in destroy() {CVE-2022-50496}
- xhci: Remove device endpoints from bandwidth list when freeing the device {CVE-2022-50470}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats {CVE-2025-68800}
- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}
- igb: Do not bring the device up after non-fatal error {CVE-2024-50040}
- wifi: mwifiex: Initialize the chan_stats array to zero {CVE-2025-39891}
- HID: asus: fix UAF via HID_CLAIMED_INPUT validation {CVE-2025-39824}
- fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds {CVE-2025-40304}
- HID: multitouch: Correct devm device reference for hidinput input_dev name {CVE-2023-53454}
- udf: Do not bother merging very long extents {CVE-2023-53506}
- wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() {CVE-2022-50551}
- ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587}
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path {CVE-2023-53604}
- gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622}
- iavf: Fix use-after-free in free_netdev {CVE-2023-53556}
- cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}
- kernfs: fix use-after-free in __kernfs_remove {CVE-2022-50432}
- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. {CVE-2025-39913}
- tcp: fix a signed-integer-overflow bug in tcp_add_backlog() {CVE-2022-50865}
- HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras {CVE-2023-53471}
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf {CVE-2023-53524}
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write {CVE-2023-53282}
- rcu: Fix rcu_read_unlock() deadloop due to IRQ work {CVE-2025-39744}
- smb: client: let recv_done verify data_offset, data_length and remaining_data_length {CVE-2025-39933}
- mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- wifi: iwlwifi: fix a memory corruption {CVE-2024-26610}
- asix: fix uninit-value in asix_mdio_read() {CVE-2021-47101}
- igb: Fix igb_down hung on surprise removal {CVE-2023-53148}
- VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
Updated packages:
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:101033abaa6f19b26f033c756d5b8b511f8ebe0ca77cece3083a5a960d3aede2
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:3c98ca10d6b05fdde68eb2b3ed51f42f51ff7f922a4aad54597d036c355f0129
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:65494505ee402e6dd7b8b5ddcdb40777d849ed06a95721ce6f3bd987866ec556
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:5658cf439434097f9d3f235ea7eb41439df2e9e3950f4cd76db2bf2c4ac05905
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:5ab84183c3be3b91dea8c8f3b566b723c691ef30f59efa2f37aba1a6a99723b9
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:9d851e1bf2dc593d3fbb80493ccbcdbdccb108b41f6eaa93e624f11c53da3ce9
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:2ebd2e83be484f7c63211f2a2c36ad946596779e81506cf9db4d8e07168f2106
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:4640b12bef6f783cbe6b18ebb349d9371f7d49d6e5b4751512e0e0652848a708
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:002b4efd0e2942307688382fd58c239b2e743195f7c1a42b7dfbc52a398a960e
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:3086adcb75728fbc590b2a3af6c47ff6b15f10b6cdb086aeb7d239c3119f7111
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:3ba35c5983ba497edb2bc02e6f65fd573d6a06af14d069da5b50b480dba17709
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:623a97f44b5b3e741a3c19f3ae7f6b84b1835410a672f9809b08568a698d566e
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:458f39b59f3282246a208bf62f25f09aed78d5d600e2905308b7154ae1f3e5c7
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:ad7d82fa80bd044d010e64fa8b1b43228e0d79b19181faeb2773b57ddcf1503c
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:2033def3e689dc0d9196c068105e859df1976c9048fd95605f4cb6aeba9b5cb0
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:07a64be9767930fed067c1e6fb678fc916cad36282f35df408210cda175164a1
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:3520c779debf6a18867d5350400121f6c617cafb3f0901d0c6264c3f9eeb31bd
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:600115fc368b814c3c1d964b9ad48ed029a6a268f11094fccc9d9940dc4565ac
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:655f39eff76ec10e89010961629470fd812a2cd679b6de9295b26f494bf4dcd1
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:031b7926b771b72b8b9d8e70a3fddaa0863faa0ed5c0f01233675c789b5c795a
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:fc645885a939868fd60a533893d5d36918615528134c6519ce2ad3ff7f853302
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
sha:ae840076a49d17b27aa3e77ee9dc189bef008e48cc2c0135f90d775c8b54e1c2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.