Advisory: CLSA-2026:1768774361
OS: CentOS 8.4 ELS
Public date: 2026-01-18 22:12:43.31243
Project: kernel
Version: 4.18.0-305.25.1.el8_4.tuxcare.els33
Errata link: https://errata.tuxcare.com/els_os/centos8.4els/CLSA-2026-1768774361.html
- ip6_vti: fix slab-use-after-free in decode_session6 {CVE-2023-53821} - ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer {CVE-2023-53395} - wifi: mac80211_hwsim: drop short frames {CVE-2023-53321} - ext4: add bounds checking in get_max_inline_xattr_value_size() {CVE-2023-53285} - md/raid10: fix null-ptr-deref in raid10_sync_request {CVE-2023-53832} - dm flakey: fix a crash with invalid table line {CVE-2023-53786} - wifi: mt7601u: fix an integer underflow {CVE-2023-53679} - ext4: fix bug_on in __es_tree_search caused by bad boot loader inode {CVE-2022-50638} - USB: usbtmc: Fix direction for 0-length ioctl control messages {CVE-2023-53761} - scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() {CVE-2023-53803} - ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() {CVE-2025-38249} - md/raid1: Fix stack memory use after return in raid1_reshape {CVE-2025-38445} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - dm cache: free background tracker's queued work in {CVE-2023-53765} - drm/amdkfd: Fix UBSAN shift-out-of-bounds warning {CVE-2021-4460} - drm/vmwgfx: Validate the box size for the snooped cursor {CVE-2022-36280,CVE-2022-50440} - vsock: Do not allow binding to VMADDR_PORT_ANY {CVE-2025-38618} - ice: set tx_tstamps when creating new Tx rings via ethtool {CVE-2022-50710} - media: dvb-frontends: avoid stack overflow warnings with clang {CVE-2024-27075} - PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free {CVE-2023-53446} - cifs: Fix warning and UAF when destroy the MR list {CVE-2023-53427} - sctp: fix a potential overflow in sctp_ifwdtsn_skip {CVE-2023-53372} - md/raid10: check slab-out-of-bounds in md_bitmap_get_counter {CVE-2023-53357} - lwt: Fix return values of BPF xmit ops {CVE-2023-53338} - ubi: ensure that VID header offset + VID header size <= alloc, size {CVE-2023-53265} - ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() {CVE-2022-50423} - Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - ACPICA: Fix error code path in acpi_ds_call_control_method() {CVE-2022-50411} - ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315} - wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace {CVE-2023-54286}
Update command: dnf update kernel*
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm perf-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els33.x86_64.rpm