[CLSA-2026:1778769697] kernel: Fix of 31 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-14 19:15:52 UTC
Description:
- net: skbuff: propagate shared-frag marker through pskb_copy() - HID: ignore non-functional sensor in HP 5MP Camera {CVE-2025-21992} - net: fix crash when config small gso_max_size/gso_ipv4_max_size {CVE-2024-50258} - ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() {CVE-2024-53042} - ALSA: ctxfi: Limit PTP to a single page {CVE-2026-31602} - serial: imx: Add missing .thaw_noirq hook {CVE-2022-49841} - module: ensure that kobject_put() is safe for module type kobjects {CVE-2025-37995} - udf: Fix uninitialized array access for some pathnames {CVE-2023-53165} - ACPICA: Avoid undefined behavior: applying zero offset to null pointer {CVE-2023-53182} - net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled {CVE-2026-23381} - platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data {CVE-2026-23370} - HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them {CVE-2026-23382} - icmp: fix NULL pointer dereference in icmp_tag_validation() {CVE-2026-23398} - net/sched: ets: fix divide by zero in the offload path {CVE-2026-23379} - ice: Fix memory leak in ice_set_ringparam() {CVE-2026-23389} - wifi: radiotap: reject radiotap with unknown bits {CVE-2026-23367} - HID: asus: avoid memory leak in asus_report_fixup() {CVE-2026-31524} - xprtrdma: treat all calls not a bcall when bc_serv is NULL {CVE-2022-49321} - mm/mempolicy: fix uninit-value in mpol_rebind_policy() {CVE-2022-49567} - x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails {CVE-2022-49549} - af_unix: Fix a data-race in unix_dgram_peer_wake_me(). {CVE-2022-49344} - bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data {CVE-2022-50536} - net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() {CVE-2023-53578} - wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() {CVE-2023-53570} - mptcp: fix race on unaccepted mptcp sockets {CVE-2022-49669} - ALSA: usb-audio: Use correct version for UAC3 header validation {CVE-2026-23318} - wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() {CVE-2026-23315} - net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check {CVE-2026-23447} - Squashfs: check metadata block offset is within range {CVE-2026-23388} - apparmor: Fix double free of ns_name in aa_replace_profiles() {CVE-2026-23408} - nfnetlink_osf: validate individual option lengths in fingerprints {CVE-2026-23397} - i2c: piix4: Fix a memory leak in the EFCH MMIO support {CVE-2022-49653}
Updated packages:
  • bpftool-7.0.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:5bb7378f25a3e99223b5fb793790034e5705cb4e63efac8ef1126210f0253ab0
  • kernel-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:36c96a382aec8f24239930fe5028eebb251c2ee79d2686408ac99020f85434ac
  • kernel-abi-stablelists-5.14.0-284.1101.el9_2.tuxcare.7.els32.noarch.rpm
    sha:110ce45b6b9a1c7d1f7d5f1157e52d1342d70acf50f2b3fbbfec186478598a80
  • kernel-core-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:bae2246a17510eb358425e654dcdef70e62fb5e3659a54a281b29a0a1697c10d
  • kernel-cross-headers-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:f2c4cac96d62ae3851e0e5f2d81da61c88994941c7403a5ad8a8e5adf1980e0d
  • kernel-debug-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:4bf3400abb8282b7c5c7f06c9f501325f8a5ae5da897c5891f57b07220832268
  • kernel-debug-core-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:96c5b4430837c387707feb22b6ccd6247b5d9343e399cbbedef608f6c0cec50a
  • kernel-debug-devel-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:bed88ddbec49aa013bc59eaa2d07dc331d5b00395a55035cddf937e9cea0e48d
  • kernel-debug-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:e17144567f06d585fd6445d8d50815ab797735c33292569fb8598eb30227c089
  • kernel-debug-modules-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:f648d7385857ca42c2c328664df3db7cb5e0d10875485ecbd6cd89c65e360c47
  • kernel-debug-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:1b7c2855867eab20f671fc5e616d9018669b91b0914abd8d927de7a8bc8e74ff
  • kernel-debug-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:8e977f6b9c6f794ee0dce819f5f085bd7ed54dc5e87ba9dbe6363b7158f00ead
  • kernel-debug-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:2f2839ada8bae4206bc94e482916a8c5f76eef4d2a243b231c8fac96bfbc21c1
  • kernel-debug-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:861d9f23dcb92d3b039b98465d1bc053079e2e01f8ad38f4aa1bb18c6c5d573e
  • kernel-debug-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:b7954d529aef89953a73aaad50f176afe4ae8d48d3bddd0ebc55677b23092340
  • kernel-devel-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:9fc6e596ba1b43fae8c3f15383052439a36b47db387e3973ddc2fbba1956b642
  • kernel-devel-matched-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:6e7863b49ec79be212c082c6b28033f0f78bdeb805296921eebd05abfef14c8a
  • kernel-doc-5.14.0-284.1101.el9_2.tuxcare.7.els32.noarch.rpm
    sha:09ba7fff16e48244f7954bc85a7f59662fd15007468e3fb2e4a46e5e085495e2
  • kernel-headers-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:b9f05faa247c250187d8636199256152629c5492e2785d83440b922bbcc9ebb2
  • kernel-ipaclones-internal-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:9808bcffc5a7fe5a9ad66ed932e9bac91b4afc8091910e93bf8e1910cb433963
  • kernel-modules-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:8bcdd08057ddbe4387e16ba7f7fa33a42810646c8b1e34534531f78c0da6d674
  • kernel-modules-core-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:41caa60b47ea54bab5328170a0ef2b40e7d9515700bcfabb8a5cf7d970808b60
  • kernel-modules-extra-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:83a102426557b628c03e5d419ebe4f98d1bc9593f6b3db4e9b259350bec52dc2
  • kernel-modules-internal-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:58f9095a1e5dd891f1cbe57bb3ab544eb7fbf75ba537cced7058b7532f292f3a
  • kernel-modules-partner-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:5efdbb05bdf401835ea7638ab86720accfcec99561a2fe32f6a36cc58b201a14
  • kernel-selftests-internal-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:e71a58d4b6b230d86edf8f365173cbee61ef92b99fc8717c3205f14bbf0a26d4
  • kernel-tools-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:337cb98b7ddc925897c18a02aa5a64ca6f2de4f36108faefecf51c3673e51672
  • kernel-tools-libs-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:3862cb52e8656ed3c93f6a245cbb4b0628401162e1b3b4e917a8794310c10d84
  • kernel-tools-libs-devel-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:0db527adb2e4047f9274ef671dcd333d9529e88dfaedacb146cb62995083fd04
  • kernel-uki-virt-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:148f76e0ba4b848799c170e491ac11c358a0ea71dc87c1eb4d54d434f1ada4fc
  • libbpf-1.0.0-2.el9_2.tuxcare.7.els32.i686.rpm
    sha:a4200292a20f0034b339f309451b32b784af82fde05731c84a10df5f8df26379
  • libbpf-1.0.0-2.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:b13f4f1ba7bb1938d48f2ca90a9642158be457eda970ed40d92a8a3aad2480dc
  • libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els32.i686.rpm
    sha:06bd37bf96d4e4adc0a9fe962ea15880c8875b9c5d93bae9935e3b1122453c34
  • libbpf-devel-1.0.0-2.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:bc88630c530e92ce7c862e990a69f0e16d8000f3da60cfe44635fa4407aacf0f
  • libbpf-static-1.0.0-2.el9_2.tuxcare.7.els32.i686.rpm
    sha:36b405b98941e855dc0e60324b300fd2cfb1970b5b40a1a11e3f3a57d9c81272
  • libbpf-static-1.0.0-2.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:db3daf70aee72fbbd9dfaa5da918989925326717947b17ee56495c12fd67631c
  • perf-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:79399090d4178794727637a9bad2a726799ac697a2e422f20054e7d07d638f5c
  • python3-perf-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:275977211291e0209269188aa188166b267e1144aaaa4151d535fca78b97346e
  • rtla-5.14.0-284.1101.el9_2.tuxcare.7.els32.x86_64.rpm
    sha:7754f036c672c2a7a5ccc6a2713b70b0024e6eca66c56850be56bbcbb1ffcebb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.