[CLSA-2026:1775655705] kernel-uek: Fix of 34 CVEs
Type:
security
Severity:
Important
Release date:
2026-04-08 13:41:49 UTC
Description:
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089} - HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory {CVE-2024-50115} - KVM: x86: Reset IRTE to host control if *new* route isn't postable {CVE-2025-37885} - NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945} - NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid {CVE-2025-68349} - Revert "IB/core: Implement clear counters" - Revert "IB/mlx5: Implement clear counters" - Revert "ib/core: add SET_DEVICE_OP call for clear_hw_stats()" - Revert "perf/x86: Always store regs->ip in perf_callchain_kernel()" - Revert "xfrm: destroy xfrm_state synchronously on net exit path" - bpf, sockmap: Fix race between element replace and close() {CVE-2024-56664} - can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak {CVE-2026-23061} - crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec {CVE-2026-23060} - crypto: lzo - Fix compression buffer overrun {CVE-2025-38068} - drm/amd/pm: fix the Out-of-bounds read warning {CVE-2024-46731} - drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number {CVE-2024-46724} - drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer {CVE-2024-49991} - ext4/jbd2: skip sb flush when EIO happened - ext4: save the error code which triggered an - fou: remove warn in gue_gro_receive on unsupported protocol {CVE-2024-44940} - fs: proc: inode: delay put_pid() by RCU - fs: writeback: fix use-after-free in __mark_inode_dirty() {CVE-2025-39866} - genirq/cpuhotplug: Notify about affinity changes breaking the affinity mask - io_uring: fix filename leak in __io_openat_prep() {CVE-2025-68814} - jbd2: store more accurate errno in superblock - libceph: fix potential use-after-free in have_mon_and_osd_map() {CVE-2025-68285} - libceph: make free_choose_arg_map() resilient to partial allocation {CVE-2026-22991} - macvlan: Add nodst option to macvlan type source - macvlan: Use 'hash' iterators to simplify code - macvlan: fix error recovery in macvlan_common_newlink() {CVE-2026-23209} - macvlan: fix possible UAF in macvlan_forward_source() {CVE-2026-23001} - macvlan: observe an RCU grace period in macvlan_common_newlink() error path {CVE-2026-23273} - media: xc2028: avoid use-after-free in load_firmware_cb() {CVE-2024-43900} - mm: call the security_mmap_file() LSM hook in remap_file_pages() {CVE-2024-47745} - net/sched: sch_qfq: do not free existing class in qfq_change_class() {CVE-2026-22999} - net: sock: fix hardened usercopy panic in sock_recv_errqueue {CVE-2026-22977} - net: usb: rtl8150: fix memory leak on usb_submit_urb() failure {CVE-2025-71154} - rds: Add state field to RDS trace logs. - rds: Drop rds conn in connect worker if not in down state. - scsi: mpi3mr: Sanitise num_phys {CVE-2024-42159} - scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() {CVE-2026-23193} - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux {CVE-2024-50073} - usb: core: config: Prevent OOB read in SS endpoint companion parsing {CVE-2025-39760} - vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint {CVE-2025-22083} - wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929} - xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added {CVE-2025-40256} - xfrm: delete x->tunnel as we delete x {CVE-2025-40215} - xfrm: flush all states in xfrm_state_fini
Updated packages:
  • bpftool-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:d596395611e161b71e6fcc7a4bd54246de478ddf8d4c48c9917647daeec68254
  • kernel-uek-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:3862abe51b363c727cd28900e118d683c5baf110fc84bdf5f647bd8142231aba
  • kernel-uek-container-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:8971cd0d69cd6b7d12cb6305039c47b42569e48afb2942fc0ae3eb0881c9ec98
  • kernel-uek-container-debug-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:5dc9864204959f1aa15300ab7cf9989fd6eab3300a5df749d4e03fa73117f249
  • kernel-uek-debug-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:e61c62b95e6e5cd15096cd73ef02d64fe05a92049f68cb0424aff2fa364958e9
  • kernel-uek-debug-devel-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:2256698123bb9b6144cf07dcf5f24a8e408f38cc4e182477befedb665b4076d3
  • kernel-uek-devel-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:ddf6a4e626df63d073348b1d09bc7f4786edc72d39088435c4a1d1992f7af506
  • kernel-uek-headers-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:350ab1aaa3988cf78c509c3d386853ca172ed6c606723dd4505598a9284ad1a3
  • kernel-uek-tools-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:8236a214d703061ce9c9685c64d6293a40a3c1c2d54d447f51e884cbc85e2e33
  • perf-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:a9e1bd8da906bd3f3ae8b52765177e2b6b5b2eb06a8f36846370badfaa67d781
  • python-perf-5.4.17-2136.354.4.el7uek.tuxcare.els1.x86_64.rpm
    sha:07fab17310af2922d085115d97f5fd5194ca75eeab5a599a19eab8a25112f207
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.