[CLSA-2025:1740598467] kernel: Fix of 3 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-26 19:34:32 UTC
Description:
- NFSv4.0: Fix a use-after-free problem in the asynchronous open() {CVE-2024-53173} - ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150} - misc/libmasm/module: Fix two use after free in ibmasm_init_one {CVE-2021-47334}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:51a341a79555da6c9389921be97fd561a8c567c30dc06c2f196fbb9c6f3c5499
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:8de7ac96ec8d61f8bcbbdb08e3cb49a4a02ff90358d5a0ed777b88d385037481
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:b0286f8be3129ec44c837841b401927e16e607b01489f0ca5e42c1f92a2deff4
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els21.i686.rpm
    sha:f51e1f018ffa1ebd377eca60945fd94c6147a9182e66ec3eeebffbabb49b7803
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:4f99f52737d4dfcc8463c60fdff1de41e70cd235b07af8a141af7032de7644c2
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:34795a8561337b2e9970c5063690ca6308d63a24ed84cdc8276b2f878a8b7d0d
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:6a5929620ee29f42bfcb81dd1f4b02374fcba349d676b62ee6c7551f1903dc50
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els21.noarch.rpm
    sha:47acf7d2851fd75a7711a895181a04a66fbca3a05f26b38a17e81247777a43ef
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:58d5f3344f05c20482ba101cccc97b771f46ff4030052b4e5671ac92c1ba45c2
  • perf-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:ef89379666b169d2dfa10f1f1ed2c5f95a2b367044a6244f51d8ea31dd47ba76
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els21.x86_64.rpm
    sha:3231ec2ed855cd293054a6471a709d11ea365cf213acaa38ce2709b388001e90
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.