Release date:
2025-11-05 08:55:14 UTC
Description:
- ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}
- ext4: fix memory leak in ext4_fill_super
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}
- fix: virtio-net: Add validation for used length {CVE-2021-47352}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:51fb3a1f124259300a9fbb577284b8e5c7c6440b92e2833f2277e83012a6d2c0
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:d190ffd9906fa176bf5ac2994f8f8c249ae35fcf4ce7a550fac0d3578a167cdd
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:28aa896b7e78145ec98fb31ef01d97a01fdd70478364d7201961aada0705bd2e
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:f5aaa3b41b4926b39f1f3f41618409223d26d996bacad29a71eaff5da1632ec6
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:2a9ae5b413fa84513e7c03483010f67ffe0750c22134a8579c1639c19f4496d7
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:12c4b06ed915241ae49f3c79afb3700b0005aab63008560ba37be3e89cfb37ef
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:6274ce7bc47d6e5a25a9b9ab3061f1f1221084af130e33dcc4382effc9ee04d2
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:891d62faefcca6f7d83db3d3b5e12577790f68118a208d92aa40b66437464cc0
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:1fc72caa14f472ba018ae19438f25fc5829f3b64daa3e38713672eef04be9069
-
perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:e8dafd56387bf6a1f711f26136d461e3ae667d7689a9b0251452a7f03d117186
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:eba0eae66fee21cdb003efd4622a8d3141e35816c267381f50071e82946ec7d7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.