Description:
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}
- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}
- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}
- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}
- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}
- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach {CVE-2023-1670}
- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}
- Bluetooth: L2CAP: Fix accepting connection request for invalid SPSM {CVE-2022-42896}
- tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566}
- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}
Updated packages:
-
kernel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:993cd2680069b6d7acd6bf5683b34d8ab1ec1c1c
-
kernel-debug-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:7222c86b98d5399cad2be1abac665030579de876
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.i686.rpm
sha:0706195e979c9fa29746981fa9a3c320755a6261
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:21ef655a9b6ed744b6a04df82b0a94bf9948a09a
-
kernel-devel-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:9cb2e6adec0dfde673f2a34732f1175cc4069e3d
-
kernel-headers-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:16f1268d73656703a2f0283e1fcc34c9b9e1d357
-
perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:f781b38161b3e42b35796fa3d6c398b00da73f26
-
python-perf-2.6.32-754.35.8.el6.tuxcare.els14.x86_64.rpm
sha:b7274f2f79e64a5000635bb4a3df0805351b731f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.