Release date:
2026-01-20 12:06:07 UTC
Description:
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- spec: merge oraclelinux6els changes
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789}
- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
Updated packages:
-
kernel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:4870f69ea1b9b4cb23214e4a7a94a0fb0b16f3a2ebb2756db16b817ef6dfe273
-
kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:3da6d4f2956285ba53147d117b71d6ffc71cc8ab3ccbd83d9ab1fd9da14d1fc7
-
kernel-debug-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:b6cfa29e267bfa7cb813eb20b9999c0932dfbc3fa963d8761c471a8238adbcdd
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.i686.rpm
sha:b8de522149869040af06fe49601615ec6931f080c1e063958ac0ca4dfdc24d6d
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:571da072ecd6ff5a6b69643591d7d53e9550fbae41f58656602e5231c4936567
-
kernel-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:1f8b36fc7a29acba0d937829328a1045fcaedee83e821401aa3a5d0feff85e65
-
kernel-doc-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:bc021ae5d75c96c87415f30244fd66fa42d071a6f5e981ab7f2862ccb741a653
-
kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:ba03effba9388bcf6d926b5ef02c6c95d7e09d0e459a63292205226d856d2694
-
kernel-headers-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:a49bb52c9f2f45cc67fec874ed870933991209e6b1836fc4abd4a34f5ad2fb21
-
perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:b88ed876c1fb7d715a199aa9e10b29db8b3f259d74c8b5e2fa4951ebcedd3c77
-
python-perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:093a5b004844a95c2c0dea743c42dcc4a81fa4f8603f2324d5b229e2a18d9f9c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.