[CLSA-2026:1768669128] kernel: Fix of 39 CVEs
Type:
security
Severity:
Important
Release date:
2026-01-20 12:06:07 UTC
Description:
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432} - wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} - wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380} - wifi: mac80211_hwsim: drop short frames {CVE-2023-53321} - wifi: cfg80211: Fix use after free for wext {CVE-2023-53153} - scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422} - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863} - NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945} - can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004} - Squashfs: check return result of sb_min_blocksize {CVE-2025-38415} - scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322} - fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978} - ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886} - wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157} - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051} - spec: merge oraclelinux6els changes - ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} - ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917} - ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918} - ipvs: use explicitly signed chars - HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823} - xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900} - netlink: prevent potential spectre v1 gadgets {CVE-2023-53000} - mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892} - igb: Do not free q_vector unless new one was allocated {CVE-2022-50252} - scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546} - net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907} - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870} - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258} - md-raid10: fix KASAN warning {CVE-2022-50211} - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882} - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} - crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} - wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014} - isofs: Prevent the use of too small fid {CVE-2025-37780} - net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789} - partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:4870f69ea1b9b4cb23214e4a7a94a0fb0b16f3a2ebb2756db16b817ef6dfe273
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:3da6d4f2956285ba53147d117b71d6ffc71cc8ab3ccbd83d9ab1fd9da14d1fc7
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:b6cfa29e267bfa7cb813eb20b9999c0932dfbc3fa963d8761c471a8238adbcdd
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.i686.rpm
    sha:b8de522149869040af06fe49601615ec6931f080c1e063958ac0ca4dfdc24d6d
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:571da072ecd6ff5a6b69643591d7d53e9550fbae41f58656602e5231c4936567
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:1f8b36fc7a29acba0d937829328a1045fcaedee83e821401aa3a5d0feff85e65
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:bc021ae5d75c96c87415f30244fd66fa42d071a6f5e981ab7f2862ccb741a653
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:ba03effba9388bcf6d926b5ef02c6c95d7e09d0e459a63292205226d856d2694
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:a49bb52c9f2f45cc67fec874ed870933991209e6b1836fc4abd4a34f5ad2fb21
  • perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:b88ed876c1fb7d715a199aa9e10b29db8b3f259d74c8b5e2fa4951ebcedd3c77
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:093a5b004844a95c2c0dea743c42dcc4a81fa4f8603f2324d5b229e2a18d9f9c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.