[CLSA-2025:1750172760] kernel: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2025-06-17 15:06:05 UTC
Description:
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init {CVE-2022-49478} - x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110} - cifs: fix potential double free during failed mount {CVE-2022-49541} - drm/amd/pm: fix double free in si_parse_power_table() {CVE-2022-49530}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:3bf40a361d77820a14cac1a93944b620e76f2df6af3ad15c499c4b3a52187b62
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:d2c12c70a18a08c71b6c636c6777abfb1bd192a8a94888b51974178ebe4af9bc
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:570323c81de7bdc3d3158e0b8b91816459fb97a83f9c3eb63495e38307aeb357
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els23.i686.rpm
    sha:827a7650edf1386a2e5943c5c7bc5587994f55a3b9d1e1dde03a72bc7fef0704
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:e40554874bc1ea587db6aec097acb98d9c9f39fa22d0e8fd7dbe95b2c4854366
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:4082688edf859a75b3a481bf2882a7e0b2b2ef5ead62e654c7832bf420bb196a
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:78c4cf5d03dafd503e9bcf7b73dc020e696e9245a6dd2081e8d49035f04d5fce
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els23.noarch.rpm
    sha:a6a296a43eaf7121a891afb203199dc06165ec85da5903398a97a57b7f352fd0
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:e8e260bb6baaa9e0fb448504e2f5a0a0286259cfd1eb71fa7c3a19370ced6da4
  • perf-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:9e6cafdc9fce555eef007651c7343696c4227f6c53024d4ce2d236d0f053786e
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els23.x86_64.rpm
    sha:e10b0d9712cf244aa298f1953002c2bf40b3de143d5319e9ffacbc4490535407
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.