[CLSA-2026:1769610819] kernel: Fix of 39 CVEs
Type:
security
Severity:
Important
Release date:
2026-01-28 14:33:43 UTC
Description:
- Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times {CVE-2022-50419} - firewire: net: fix use after free in fwnet_finish_incoming_packet() {CVE-2023-53432} - wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} - wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380} - wifi: mac80211_hwsim: drop short frames {CVE-2023-53321} - wifi: cfg80211: Fix use after free for wext {CVE-2023-53153} - scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() {CVE-2022-50422} - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work {CVE-2025-39863} - NFSD: Protect against send buffer overflow in NFSv2 READ {CVE-2022-43945} - can: bcm: add locking for bcm_op runtime updates {CVE-2025-38004} - Squashfs: check return result of sb_min_blocksize {CVE-2025-38415} - scsi: qla2xxx: Wait for io return on terminate rport {CVE-2023-53322} - fs: fix UAF/GPF bug in nilfs_mdt_destroy {CVE-2022-2978} - ipv6: Fix infinite recursion in fib6_dump_done(). {CVE-2024-35886} - wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157} - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister(). {CVE-2025-38245} - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459} - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051} - spec: merge oraclelinux6els changes - ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} - ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917} - ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918} - ipvs: use explicitly signed chars - HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556} - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823} - xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900} - netlink: prevent potential spectre v1 gadgets {CVE-2023-53000} - mtd: inftlcore: Add error check for inftl_read_oob() {CVE-2025-37892} - igb: Do not free q_vector unless new one was allocated {CVE-2022-50252} - scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546} - net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907} - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870} - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258} - md-raid10: fix KASAN warning {CVE-2022-50211} - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882} - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} - crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373} - wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() {CVE-2024-58014} - isofs: Prevent the use of too small fid {CVE-2025-37780} - net: openvswitch: fix nested key length validation in the set() action {CVE-2025-37789} - partitions: mac: fix handling of bogus partition table {CVE-2025-21772}
Updated packages:
  • kernel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:ed0822a15d49c27aa16007e2f45b484a1036ca8989aa5c60ea29034cbf387613
  • kernel-abi-whitelists-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:00ec98f672ba4a839e0f9b43adaae88f092f0c7614088658422fc19468df14c9
  • kernel-debug-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:9ce6f1046cb0998827dfc38cb739e6f46e99e0c2f4447be08c548d3ed921717e
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.i686.rpm
    sha:c9211f646342706413e654d0e24bbb2e4dca4340a2fcc38b88c6cc516b19c8b0
  • kernel-debug-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:0bf618e8f79dc89bdc323166bc15fcc66a652ce7890d3b9329ba3d735966fafd
  • kernel-devel-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:9315470260a9ec7fcb222bef3874088c4c5bab7f7aeb2c3acc99e8d8594b1ad1
  • kernel-doc-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:8bd058c86c6351cd05d2bc2f65c9d5c4ff795b24e57a54deb3a8e6874d37fa2b
  • kernel-firmware-2.6.32-754.35.8.el6.tuxcare.els28.noarch.rpm
    sha:fa3801855a313d3da51b870553a05ed2116e3e37a1cf5de13f19cc437e0d99be
  • kernel-headers-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:29f379fe9a8a2880cf6318b6e22f77d8aae8cceae9277c6c0fc62b4100570ea2
  • perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:f0464cecdf00fe080b9a55436a00abe6804085b16cd664ac7d8a1692c792748e
  • python-perf-2.6.32-754.35.8.el6.tuxcare.els28.x86_64.rpm
    sha:9ddd63386b995fdbf46ec061e3c12893deca3d833118c11a0710fa5282897ef2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.