Release date:
2026-01-28 14:33:43 UTC
Description:
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419}
- firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}
- wifi: mac80211_hwsim: drop short frames {CVE-2023-53321}
- wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422}
- wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863}
- NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945}
- can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004}
- Squashfs: check return result of sb_min_blocksize {CVE-2025-38415}
- scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322}
- fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978}
- ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886}
- wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}
- atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245}
- atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}
- smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}
- spec: merge oraclelinux6els changes
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
- wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014}
- isofs: Prevent the use of too small fid {CVE-2025-37780}
- net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789}
- partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
Updated packages:
-
kernel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:ed0822a15d49c27aa16007e2f45b484a1036ca8989aa5c60ea29034cbf387613
-
kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:00ec98f672ba4a839e0f9b43adaae88f092f0c7614088658422fc19468df14c9
-
kernel-debug-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:9ce6f1046cb0998827dfc38cb739e6f46e99e0c2f4447be08c548d3ed921717e
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.i686.rpm
sha:c9211f646342706413e654d0e24bbb2e4dca4340a2fcc38b88c6cc516b19c8b0
-
kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:0bf618e8f79dc89bdc323166bc15fcc66a652ce7890d3b9329ba3d735966fafd
-
kernel-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:9315470260a9ec7fcb222bef3874088c4c5bab7f7aeb2c3acc99e8d8594b1ad1
-
kernel-doc-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:8bd058c86c6351cd05d2bc2f65c9d5c4ff795b24e57a54deb3a8e6874d37fa2b
-
kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
sha:fa3801855a313d3da51b870553a05ed2116e3e37a1cf5de13f19cc437e0d99be
-
kernel-headers-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:29f379fe9a8a2880cf6318b6e22f77d8aae8cceae9277c6c0fc62b4100570ea2
-
perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:f0464cecdf00fe080b9a55436a00abe6804085b16cd664ac7d8a1692c792748e
-
python-perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
sha:9ddd63386b995fdbf46ec061e3c12893deca3d833118c11a0710fa5282897ef2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.