[CLSA-2025:1740075135] kernel: Fix of 4 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-20 18:12:22 UTC
Description:
- media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format {CVE-2024-53104} - ALSA: 6fire: Release resources at card release {CVE-2024-53239} - btrfs: fix information leak in btrfs_ioctl_logical_to_ino() {CVE-2024-35849} - btrfs: fix use-after-free when COWing tree bock and tracing is enabled {CVE-2024-56759}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:c7d5e6635b927c8a5233d3695c4e88ed06407de9deba15cd3dd37ed8cb0d9e68
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:4fb8da3b2d9ffa5c8027011a9f43abca386fad93ec13bbdc3bb6ba1026f7836b
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:8a0baef9649bcb6b30fceb160bf28bf423f142037eef4ca19ceccd6c4a3b5f9b
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:fcf6cb1841b6d77ae7bb44d5c5ec9fa19362a6a388127cfcb48ae8a630b7a8bb
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:9839891592e213eaef385a82d5e432051723b029bcbeefcbd9fa859483a4a7b2
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:be821a09624a163ec8ca2fd573468e9f130e6d22afbee59a76f132735eadb433
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:02abdfb6580a740939a289e35166d1ab5c2a3dad9000ba4e2f48c8e98765509b
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:19905f7f44d801e46a1be4bdd810a00c924745b4d85326939683a66bcb5aaea2
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:41d53dbaaaae72f33822388533bdc6ce0a5e15c9484442dc9c79874c718ba882
  • perf-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:af7dc2343b9e1816f26164ef50da061806c7e33bc745181375272ebd895d970a
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els16.x86_64.rpm
    sha:f0bd9e2f5c85e0af3cbc2c3cdad8e6e4eb9f18b15ff734e57c90782e037aaaca
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.