Release date:
2025-10-22 13:29:28 UTC
Description:
- nfs: fix UAF in direct writes {CVE-2024-26958}
- NFSD: Fix the behavior of READ near OFFSET_MAX {CVE-2022-48827}
- thermal: core: prevent potential string overflow {CVE-2023-52868}
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 {CVE-2021-47633}
- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests {CVE-2021-47391}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- wifi: mac80211: fix potential key use-after-free {CVE-2023-52530}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
- netfilter: validate user input for expected length {CVE-2024-35896}
- wifi: cfg80211: check A-MSDU format more carefully {CVE-2024-35937}
- net: bridge: xmit: make sure we have at least eth header len bytes {CVE-2024-38538}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() {CVE-2024-39487}
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() {CVE-2023-52885}
- tty: Fix out-of-bound vmalloc access in imageblit {CVE-2021-47383}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- virtio-net: Add validation for used length {CVE-2021-47352}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695}
- jffs2: prevent xattr node from overflowing the eraseblock {CVE-2024-38599}
- ecryptfs: Fix buffer size for tag 66 packet {CVE-2024-38578}
- dlm: fix plock invalid read {CVE-2022-49407}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332}
- jfs: fix shift-out-of-bounds in dbSplit {CVE-2024-56597}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2023-51779}
- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition {CVE-2023-35824}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvb-core: Fix use-after-free due on race condition at dvb_net {CVE-2022-45886}
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885}
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 {CVE-2022-45919}
- x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265}
- x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265}
- x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265}
- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}
Updated packages:
-
kernel-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:caff98b94b300e263642a08ec80793014af5f7e4f2c0be51fd83c276c0f20c32
-
kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els26.noarch.rpm
sha:2ca39027b1740d473f2ca96cea7447f975e1635d5d9d1123201560548804d176
-
kernel-debug-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:909e37ccd0f03647aeaadba3966746b8e8bf83909b77407b6e8ecdb8a395c904
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els26.i686.rpm
sha:747d7cd7957580515759edf3eb7f242e2542f52309a51e1a0a9fc2daebb0b18b
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:db927d8da002643827d020066db23f9b76d7f237f775609f2a9e027f0e4f557d
-
kernel-devel-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:5b5b3e4e646f7765492e2d7384af9b780618769b39498b7cfa2251bf1a7fb49f
-
kernel-doc-2.6.32-754.35.8.el6.tuxcare.els26.noarch.rpm
sha:b8cdc7b63a0e31a8b5e499056e4abdc688498b136c05cff0679f43bf5a50869d
-
kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els26.noarch.rpm
sha:6ca63cabbd57967afb8567484305e24526100de200326edd33807784072555bb
-
kernel-headers-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:637162a6719d88c29a7fcc03abe2a833fcbacc8a0d1d4e5dfd76c0890ac31252
-
perf-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:c469007009c0f504feca9dbb66e00474795abb8d57c6f9caf457472f86a3b182
-
python-perf-2.6.32-754.35.8.el6.tuxcare.els26.x86_64.rpm
sha:f97d1faf877cb52258414042e05e2e7208493ba4ce8cc46fc648e12bdfdc40b5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.