Description:
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896}
- tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
Updated packages:
-
kernel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:7a15d54de0d1296164241b93bc1822a6d934ff55
-
kernel-debug-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:0b22e2c10b02edbed22033f8e151e0f424f78e35
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.i686.rpm
sha:d7c4dfa56b88c906cf00bc34a4132394df709c31
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:61fee98197256eeb813b6c30e935d7b901345a58
-
kernel-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:ce48c45d022eab72074d8ff5ccee1961b7bcf967
-
kernel-headers-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:0de334aa92698da5bcbfc96d119f9034d3661b76
-
perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:aafd97873063abe206c1a8f02a7d5a2271986aa4
-
python-perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:5f0e40a0990f3005cbd3f0b1630e893c197e718d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.