[CLSA-2026:1778759582] kernel: Fix of 40 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-14 19:26:23 UTC
Description:
- fix: "vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}" - gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622} - ALSA: 6fire: fix use-after-free on disconnect {CVE-2026-31581} - nfnetlink_osf: validate individual option lengths in fingerprints {CVE-2026-23397} - netfilter: nfnetlink_osf: avoid OOB read {CVE-2026-23397} - Squashfs: check metadata block offset is within range {CVE-2026-23388} - scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() {CVE-2026-23216} - can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak {CVE-2026-23108} - net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag {CVE-2026-23105} - ALSA: ctxfi: Fix potential OOB access in audio mixer handling {CVE-2026-23076} - net: usb: pegasus: fix memory leak in update_eth_regs_async() {CVE-2026-23021} - ipv4: ip_gre: make ipgre_header() robust {CVE-2026-23011} - libceph: make decode_pool() more resilient against corrupted osdmaps {CVE-2025-71116} - via_wdt: fix critical boot hang due to unnamed resource allocation {CVE-2025-71114} - hwmon: (w83791d) Convert macros to functions to avoid TOCTOU {CVE-2025-71111} - Bluetooth: btusb: revert use of devm_kzalloc in btusb {CVE-2025-71082} - Revert "fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}" - driver core: fix potential null-ptr-deref in device_add() {CVE-2023-54321} - btrfs: output extra debug info if we failed to find an inline backref {CVE-2023-53672} - ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668} - netfilter: conntrack: Avoid nf_ct_helper_hash uses after free {CVE-2023-53619} - ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587} - net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb {CVE-2023-53548} - udf: Do not bother merging very long extents {CVE-2023-53506} - lib: cpu_rmap: Fix potential use-after-free in irq_cpu_rmap_release(CVE-2023-53484) - lib: cpu_rmap: Avoid use after free on rmap->obj array entries {CVE-2023-53484} - ext4: remove a BUG_ON in ext4_mb_release_group_pa() {CVE-2023-53450} - md/raid10: fix wrong setting of max_corr_read_errors {CVE-2023-53313} - platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() {CVE-2022-50521} - binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497} - ntb_netdev: Use dev_kfree_skb_any() in interrupt context {CVE-2022-50476} - i2c: ismt: use correct length when copy buffer {CVE-2022-50394} - misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() {CVE-2022-50349} - ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315} - ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network {CVE-2022-49865} - KVM: x86/mmu: make apf token non-zero to fix bug {CVE-2022-48943} - kvm: avoid speculation-based attacks from out-of-range memslot accesses {CVE-2021-47277} - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() {CVE-2021-47219} - scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() {CVE-2021-47191} - USB: core: Add routines for endpoint checks in old drivers - xen: sync some headers with xen tree - squashfs: fix memory leak in squashfs_fill_super {CVE-2025-38415} - pptp: fix pptp_xmit() error path {CVE-2025-38574} - Revert "net/sched: sch_hfsc: Ensure inner classes have fsc curve" {CVE-2023-4623}
Updated packages:
  • bpftool-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:b300bca45552dd43bf2e69bbc1f3974af60b58eebd8d81f0443edf44ba02d068
  • kernel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:88cdcb7e217d63aa418d3d740a5c421a5f1a12bcaadbc97b9805847ed733d19c
  • kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:524fbbf2f8dc9afaa530384a358b0912aeb96040fc4d02ed952a8401baf1a24a
  • kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:4825840190ce121e6fcd434ccbc444a2dfe98e482adcf4baa273f63904fc9573
  • kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:bd502947b12ac90fc7604e1d23bf25dbddc7021ed60a502546dee87c338dfec0
  • kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:af52370a230a0243997037222b2698bc1f324ad5fbb19cb594946d26c541ea75
  • kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:2768dbbcc384ce8e060a61244919d7fed41840a947c8df2de12df1d29f0922bf
  • kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:66be2ac96a5e7a21f75e34b3fcc7f5c414feb4493a6bd4448be7977ddcd8c5f0
  • kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:e545778e3c848babb9dbeb0dc25469c02a165816292f77f8a5a8717fcca000bf
  • perf-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:3c14c27719fc853c0f3495027aab1623ca73ef97a89d63834de0c17836251e80
  • python-perf-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
    sha:31084d0b3444f9e03f21c74daba1e98c0cac1c0cc70866c789da9bff90626c80
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.