[CLSA-2024:1724774331] kernel: Fix of 11 CVEs
Type:
security
Severity:
Important
Release date:
2024-08-27 15:58:54 UTC
Description:
- drm/vmwgfx: Fix invalid reads in fence signaled events {CVE-2024-36960} - af_unix: Fix garbage collector racing against connect() {CVE-2024-26923} - ipv6: remove max_size check inline with ipv4 {CVE-2023-52340} - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2023-6270} - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752} - hdlc_ppp: add range checks in ppp_cp_parse_cr() {CVE-2020-25643} - perf/core: Fix race in the perf_mmap_close() function {CVE-2020-14351} - media: xirlink_cit: add missing descriptor sanity checks {CVE-2020-11668} - vt: selection, close sel_buffer race {CVE-2020-8648} - net: sched: sch_qfq: Fix UAF in qfq_dequeue() {CVE-2023-4921} - media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:1f9b174d060ad87cb5c83dc8157d529c9df01b13cb3c8a694e74c7335c361c6e
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:7218d72c6d7e2f61621fecf4aaf62ddc601b6f97288ddd6dbc833ce9a439578b
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els16.i686.rpm
    sha:260ad38909e25d03ab29eab87e575f3e17d297823f1cc32b15bc89689b6f89d1
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:4248746da4f3a13c0e9d7c970b7fb02cb7cba5d9f27d9bda4f7b7ff9cc4caaad
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:6dabf34b1b0b770e38dba80d9023f0d25be5351b5ea5637e8ed6de63ca4e27d2
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:af64904cc42a92d7f60af02d204a6baddbd3ce96bdc1e5c8c6cd405f995954b1
  • perf-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:dfcad9164ca373633b3a88652a94afaf9be30e9ab9d49f4ef6c5e68292c12232
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els16.x86_64.rpm
    sha:ab5113afe8e8f3f5d9ded22cb660a7d5f5184aa1537360e84ac048c6bcdf900b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.