[CLSA-2025:1750175787] kernel: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2025-06-17 15:56:31 UTC
Description:
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init {CVE-2022-49478} - x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110} - cifs: fix potential double free during failed mount {CVE-2022-49541} - drm/amd/pm: fix double free in si_parse_power_table() {CVE-2022-49530}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:e2abac2de77f347cf6e61ca2c2386048d320b0f2a21f6a9df12a1acf95a6de1d
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:9b3dcb709a7deb2d9c543857bc474163dd1f468541f02544b659b5db2fa51725
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:395f6c29f51ad1aa8f290fe66f74517cbc0abaf7bf1b7c266a61a0c40d100b31
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els23.i686.rpm
    sha:ff3a7fce417ea751feb0d83bdf2ad63a363e0a7a75cefa1f808e89245f704992
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:047358cfd153ec44c3f47425e5de284c165b9c254224dd6bc3e94dbe00df948e
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:d093533688bd878628c022fd859099fbab8979048f946b68aa902790fb8ddbb2
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:9d0dbee8e1be80d24366c63466d89646946f14f7dd07a162991c7d6392ded43a
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:7f38f83f6bdc3792ae367d90a4bafbf1f298f7a28441e607812e716d476cd728
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:43ce767de3f15f63e654c03a7fd7acc1fbcaf9778421141950895e6a5ac2540d
  • perf-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:8824f8c350f6cc4d407089de4db68a51ac90fdf9485f86f9cba51f13ca8dea74
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:9a93d37bbc57b03021eefd2a0da78349ba6c930654798d0cf31ab9625c20f6cb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.