Release info for CLSA-2026:1771078945
kernel: Fix of 131 CVEs
Published on Feb 14, 2026
Details
High- Advisory
- CLSA-2026:1771078945
- Operating system
- CentOS 8.4 ELS
- Published date
- 2026-02-14
- Component
- kernel
- Type
- security
Packages list
bpftool-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-core-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-cross-headers-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-core-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-modules-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-debug-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-headers-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-ipaclones-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-modules-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-modules-extra-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-modules-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-selftests-internal-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-tools-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-tools-libs-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
kernel-tools-libs-devel-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
perf-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
python3-perf-4.18.0-305.25.1.el8_4.tuxcare.els34.x86_64.rpm
CVEs
- CVE-2021-47118
- CVE-2021-47153
- CVE-2022-21546
- CVE-2022-48883
- CVE-2022-49503
- CVE-2022-49581
- CVE-2022-49674
- CVE-2022-49770
- CVE-2022-49799
- CVE-2022-49826
- CVE-2022-49865
- CVE-2022-49870
- CVE-2022-49907
- CVE-2022-49917
- CVE-2022-49934
- CVE-2022-49948
- CVE-2022-49975
- CVE-2022-50030
- CVE-2022-50050
- CVE-2022-50084
- CVE-2022-50085
- CVE-2022-50093
- CVE-2022-50103
- CVE-2022-50164
- CVE-2022-50185
- CVE-2022-50200
- CVE-2022-50220
- CVE-2022-50243
- CVE-2022-50252
- CVE-2022-50279
- CVE-2022-50366
- CVE-2022-50403
- CVE-2022-50406
- CVE-2022-50497
- CVE-2022-50706
- CVE-2023-1989
- CVE-2023-52578
- CVE-2023-52594
- CVE-2023-52764
- CVE-2023-52835
- CVE-2023-52864
- CVE-2023-52885
- CVE-2023-53000
- CVE-2023-53039
- CVE-2023-53075
- CVE-2023-53077
- CVE-2023-53084
- CVE-2023-53090
- CVE-2023-53111
- CVE-2023-53116
- CVE-2023-53117
- CVE-2023-53145
- CVE-2023-53153
- CVE-2023-53215
- CVE-2023-53259
- CVE-2023-53305
- CVE-2023-53307
- CVE-2023-53432
- CVE-2023-53484
- CVE-2023-53513
- CVE-2023-53668
- CVE-2023-53673
- CVE-2023-53676
- CVE-2023-54015
- CVE-2023-54072
- CVE-2023-54102
- CVE-2023-54148
- CVE-2024-26610
- CVE-2024-26872
- CVE-2024-26958
- CVE-2024-26961
- CVE-2024-26982
- CVE-2024-27395
- CVE-2024-35855
- CVE-2024-35886
- CVE-2024-35937
- CVE-2024-35962
- CVE-2024-36921
- CVE-2024-38538
- CVE-2024-38555
- CVE-2024-38586
- CVE-2024-38627
- CVE-2024-39487
- CVE-2024-39493
- CVE-2024-40978
- CVE-2024-41042
- CVE-2024-42120
- CVE-2024-42292
- CVE-2024-43830
- CVE-2024-46815
- CVE-2024-56616
- CVE-2025-37749
- CVE-2025-37780
- CVE-2025-37797
- CVE-2025-37823
- CVE-2025-37839
- CVE-2025-37923
- CVE-2025-37927
- CVE-2025-38024
- CVE-2025-38051
- CVE-2025-38157
- CVE-2025-38180
- CVE-2025-38198
- CVE-2025-38212
- CVE-2025-38245
- CVE-2025-38323
- CVE-2025-38346
- CVE-2025-38403
- CVE-2025-38415
- CVE-2025-38556
- CVE-2025-38572
- CVE-2025-38574
- CVE-2025-38680
- CVE-2025-38702
- CVE-2025-38724
- CVE-2025-38729
- CVE-2025-39691
- CVE-2025-39797
- CVE-2025-39853
- CVE-2025-39863
- CVE-2025-39955
- CVE-2025-39971
- CVE-2025-39993
- CVE-2025-40154
- CVE-2025-40248
- CVE-2025-40258
- CVE-2025-40269
- CVE-2025-40277
- CVE-2025-40322
- CVE-2025-68285
- CVE-2025-68349