Release date:
2026-05-01 12:08:35 UTC
Description:
* CVE-2026-31431
- crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
{CVE-2026-31431}
- crypto: scatterwalk - Backport memcpy_sglist() {CVE-2026-31431}
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place
decryption {CVE-2026-31431}
- crypto: authencesn - Fix src offset when decrypting in-place
{CVE-2026-31431}
- crypto: aead - prevent using AEADs without setting key
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher
{CVE-2026-31431}
- crypto: algif_aead - Revert to operating out-of-place {CVE-2026-31431}
- crypto: algif_aead - snapshot IV for async AEAD requests {CVE-2026-31431}
- crypto: authenc - use memcpy_sglist() instead of null skcipher
{CVE-2026-31431}
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
{CVE-2026-31431}
- crypto: algif_aead - Fix minimum RX size check for decryption
{CVE-2026-31431}
* CVE-2022-49267
- mmc: core: Do not export MMC_NAME= and MODALIAS=mmc:block for SDIO cards
{CVE-2022-49267}
- mmc: core: Export device/vendor ids from Common CIS for SDIO cards
{CVE-2022-49267}
- mmc: sdio: Extend sdio_config_attr macro and use it also for modalias
{CVE-2022-49267}
- mmc: sdio: Parse CISTPL_VERS_1 major and minor revision numbers
{CVE-2022-49267}
* CVE-2026-23089
- ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() {CVE-2026-23089}
* CVE-2026-23074
- net/sched: Enforce that teql can only be used as root qdisc {CVE-2026-23074}
* CVE-2025-39853
- i40e: Fix potential invalid access when MAC list is empty {CVE-2025-39853}
* CVE-2025-38677
- f2fs: fix to avoid out-of-boundary access in dnode page {CVE-2025-38677}
* CVE-2025-38652
- f2fs: fix to avoid out-of-boundary access in devs.path {CVE-2025-38652}
* CVE-2025-38415
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
* CVE-2025-38226
- media: vivid: Change the siize of the composing {CVE-2025-38226}
* CVE-2025-38211
- RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
{CVE-2025-38211}
* CVE-2023-53075
- ftrace: Fix invalid address access in lookup_rec() when index >=
FTRACE_MAX_RECORDS {CVE-2023-53075}
* CVE-2023-53322
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
* CVE-2025-71162
- dmaengine: tegra-adma: Fix use-after-free {CVE-2025-71162}
* Miscellaneous upstream changes
- tuxcare: update version
Updated packages:
-
linux-buildinfo-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:217dc7ffd97e61e630b6514046c7e19ef0791158
-
linux-buildinfo-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:f15b2c901de9afce081ee9dc90e4f449c8a50432
-
linux-cloud-tools-4.15.0-255-tuxcare.els43_4.15.0-255.266_amd64.deb
sha:af92e187fc3976910c030811162c5a775660b852
-
linux-cloud-tools-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:da8ec2ce705ec6780cb114382aeca6971fb88b39
-
linux-cloud-tools-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:17f90ffbd546fffda5708fa30a358e5e15287578
-
linux-cloud-tools-common_4.15.0-255.266_all.deb
sha:e39db3ab2c405f62af047846d4219d4dda762699
-
linux-doc_4.15.0-255.266_all.deb
sha:82b286f512aa15b331dc13714b12a2af6543a04d
-
linux-headers-4.15.0-255-tuxcare.els43_4.15.0-255.266_all.deb
sha:6bbb178823b69b608e98d0ffa11d969d4a036424
-
linux-headers-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:9ad81e302d27c4eef83f25ea3a77b9ddd1a6b675
-
linux-headers-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:08a633017358fae4a2a6d29d9dfc63f48bc3afac
-
linux-image-unsigned-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:9dd43bf5c5475c770e3698b03b03aa0ff63d7baf
-
linux-image-unsigned-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:db0cbbe8bfbd2b174d4e40548897b29c50e14c81
-
linux-libc-dev_4.15.0-255.266_amd64.deb
sha:4300592a5ad5b94ec416f8c971ce61a5898f27b9
-
linux-modules-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:235ae6445ca3762b8c0f16c62e6c3683dc8bb2a9
-
linux-modules-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:2d7967b9d86fdad586948d9e05359098870a5b60
-
linux-modules-extra-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:5f53336ee420324021cd10ab59f02261642a2704
-
linux-source-4.15.0_4.15.0-255.266_all.deb
sha:e0baf247a6cb7ebce72f96744aea24aedbd1e907
-
linux-tools-4.15.0-255-tuxcare.els43_4.15.0-255.266_amd64.deb
sha:fcca48cf2fd7984a77c0a34f125c1c746c09b9a7
-
linux-tools-4.15.0-255-tuxcare.els43-generic_4.15.0-255.266_amd64.deb
sha:3c6ea3b4419c3403a131353d8b98b427c28c2fee
-
linux-tools-4.15.0-255-tuxcare.els43-lowlatency_4.15.0-255.266_amd64.deb
sha:28d0ef6060bb249b0c1334f74288fe609d2329ed
-
linux-tools-common_4.15.0-255.266_all.deb
sha:f6875c4cd1b74a68f6cc9f91e6459fb599f07271
-
linux-tools-host_4.15.0-255.266_all.deb
sha:01db55127e137a8dd6586e183c6dc7a27db44dff
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.