[CLSA-2025:1740656525] kernel: Fix of 3 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-27 11:42:11 UTC
Description:
- NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150} - misc/libmasm/module: Fix two use after free in ibmasm_init_one {CVE-2021-47334}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:c63f6b9612f5bad0f3e74f2885f18ba3db9a4c5e7dfff0cfbf6e0128ab304839
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:75a559c1fd8978efdcda0fa8d1039fc9c89a51a49e71c5295f4d9b5c40eb91ed
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:40283fe178aef964ee348173af0f76da9034bbe2befde934bd66ed3201b3859f
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els21.i686.rpm
    sha:6ce90328cd16ea705a0b2ceebefa31cccc55cdd356a3b9cd9a83b056e1e582d3
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:b77ff15041b6300611a6ba18242bdf0141b46b1d3190c68d41008d485ec58458
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:c7436c5575af1a677d013eb7e20115a47b59279d9357eb8f9f3d02a342102999
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:b209858aae1b608e5bbdf8920ffba789c1447339635902ae6599e6fdb21b9b16
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:45402eda33d98d7cc846ee6110a60837d5bc7d1ca790a3799526dabaae628a34
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:cb078ad36c3401edecfdc44ef203968ba6b8de3bd9d430b6a086906b732af565
  • perf-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:faaaa020192b875a4cdad80740a2082201a2e1d400c03f60184d66cb389b823a
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:e091d138e68b6360857f7f11b76b69da5ce3b22eb967bb95863eb6f00f40b220
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.