[CLSA-2026:1773047921] kernel: Fix of 70 CVEs
Type:
security
Severity:
Important
Release date:
2026-03-09 09:18:45 UTC
Description:
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921} - ASoC: topology: Fix references to freed memory {CVE-2024-41069} - net/sched: act_mirred: don't override retval if we already lost the skb {CVE-2024-26739} - drivers: base: Free devm resources when unregistering a device {CVE-2023-53596} - usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760} - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685} - net/mlx5e: Avoid field-overflowing memcpy() {CVE-2022-48744} - ext4: fix use-after-free in ext4_orphan_cleanup {CVE-2022-50673} - xfrm: fix slab-use-after-free in decode_session6 {CVE-2023-53500} - net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538} - NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL {CVE-2023-53680} - perf/core: Exit early on perf_mmap() fail {CVE-2025-38565} - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path {CVE-2025-39911} - fs/proc: fix uaf in proc_readdir_de() {CVE-2025-40271} - virtio_net: fix xdp_rxq_info bug after suspend/resume {CVE-2022-49687} - NFSD: Fix the behavior of READ near OFFSET_MAX {CVE-2022-48827} - usb: xhci: Apply the link chain quirk on NEC isoc endpoints {CVE-2025-22022} - Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966} - Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965} - Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35967} - netfilter: nf_tables: prefer nft_chain_validate {CVE-2024-41042} - netfilter: validate user input for expected length {CVE-2024-35896} - erspan: do not use skb_mac_header() in ndo_start_xmit() {CVE-2023-53053} - scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422} - i40e: remove read access to debugfs files {CVE-2025-39901} - wifi: cfg80211: check A-MSDU format more carefully {CVE-2024-35937} - Bluetooth: hci_sock: Prevent race in socket write iter and sock bind {CVE-2025-68305} - RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem {CVE-2025-38022} - netfilter: allow exp not to be removed in nf_ct_find_expectation {CVE-2023-52927} - dm-bufio: don't schedule in atomic context {CVE-2025-37928} - HID: multitouch: Add NULL check in mt_input_configured {CVE-2024-58020} - netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX {CVE-2025-38201} - fs: writeback: fix use-after-free in __mark_inode_dirty() {CVE-2025-39866} - tracing/histograms: Add histograms to hist_vars if they have referenced variables {CVE-2023-53560} - netfilter: conntrack: Avoid nf_ct_helper_hash uses after free {CVE-2023-53619} - drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616} - KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() {CVE-2024-35791} - scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521} - dm cache: Fix UAF in destroy() {CVE-2022-50496} - xhci: Remove device endpoints from bandwidth list when freeing the device {CVE-2022-50470} - Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} - mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats {CVE-2025-68800} - net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074} - igb: Do not bring the device up after non-fatal error {CVE-2024-50040} - wifi: mwifiex: Initialize the chan_stats array to zero {CVE-2025-39891} - HID: asus: fix UAF via HID_CLAIMED_INPUT validation {CVE-2025-39824} - fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds {CVE-2025-40304} - HID: multitouch: Correct devm device reference for hidinput input_dev name {CVE-2023-53454} - udf: Do not bother merging very long extents {CVE-2023-53506} - wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() {CVE-2022-50551} - ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587} - dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path {CVE-2023-53604} - gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622} - iavf: Fix use-after-free in free_netdev {CVE-2023-53556} - cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945} - kernfs: fix use-after-free in __kernfs_remove {CVE-2022-50432} - tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. {CVE-2025-39913} - tcp: fix a signed-integer-overflow bug in tcp_add_backlog() {CVE-2022-50865} - HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494} - drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras {CVE-2023-53471} - wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf {CVE-2023-53524} - scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write {CVE-2023-53282} - rcu: Fix rcu_read_unlock() deadloop due to IRQ work {CVE-2025-39744} - smb: client: let recv_done verify data_offset, data_length and remaining_data_length {CVE-2025-39933} - mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory {CVE-2025-39883} - ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770} - wifi: iwlwifi: fix a memory corruption {CVE-2024-26610} - asix: fix uninit-value in asix_mdio_read() {CVE-2021-47101} - igb: Fix igb_down hung on surprise removal {CVE-2023-53148} - VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify {CVE-2025-38102}
Updated packages:
  • bpftool-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:101033abaa6f19b26f033c756d5b8b511f8ebe0ca77cece3083a5a960d3aede2
  • kernel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:3c98ca10d6b05fdde68eb2b3ed51f42f51ff7f922a4aad54597d036c355f0129
  • kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:65494505ee402e6dd7b8b5ddcdb40777d849ed06a95721ce6f3bd987866ec556
  • kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:5658cf439434097f9d3f235ea7eb41439df2e9e3950f4cd76db2bf2c4ac05905
  • kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:5ab84183c3be3b91dea8c8f3b566b723c691ef30f59efa2f37aba1a6a99723b9
  • kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:9d851e1bf2dc593d3fbb80493ccbcdbdccb108b41f6eaa93e624f11c53da3ce9
  • kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:2ebd2e83be484f7c63211f2a2c36ad946596779e81506cf9db4d8e07168f2106
  • kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:4640b12bef6f783cbe6b18ebb349d9371f7d49d6e5b4751512e0e0652848a708
  • kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:002b4efd0e2942307688382fd58c239b2e743195f7c1a42b7dfbc52a398a960e
  • kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:3086adcb75728fbc590b2a3af6c47ff6b15f10b6cdb086aeb7d239c3119f7111
  • kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:3ba35c5983ba497edb2bc02e6f65fd573d6a06af14d069da5b50b480dba17709
  • kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:623a97f44b5b3e741a3c19f3ae7f6b84b1835410a672f9809b08568a698d566e
  • kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:458f39b59f3282246a208bf62f25f09aed78d5d600e2905308b7154ae1f3e5c7
  • kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:ad7d82fa80bd044d010e64fa8b1b43228e0d79b19181faeb2773b57ddcf1503c
  • kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:2033def3e689dc0d9196c068105e859df1976c9048fd95605f4cb6aeba9b5cb0
  • kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:07a64be9767930fed067c1e6fb678fc916cad36282f35df408210cda175164a1
  • kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:3520c779debf6a18867d5350400121f6c617cafb3f0901d0c6264c3f9eeb31bd
  • kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:600115fc368b814c3c1d964b9ad48ed029a6a268f11094fccc9d9940dc4565ac
  • kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:655f39eff76ec10e89010961629470fd812a2cd679b6de9295b26f494bf4dcd1
  • kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:031b7926b771b72b8b9d8e70a3fddaa0863faa0ed5c0f01233675c789b5c795a
  • perf-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:fc645885a939868fd60a533893d5d36918615528134c6519ce2ad3ff7f853302
  • python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els35.x86_64.rpm
    sha:ae840076a49d17b27aa3e77ee9dc189bef008e48cc2c0135f90d775c8b54e1c2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.