[CLSA-2025:1766617167] kernel: Fix of 27 CVEs
Type:
security
Severity:
Important
Release date:
2025-12-24 22:59:31 UTC
Description:
- xfrm: Duplicate SPI Handling {CVE-2025-39965} - xfrm: state: use atomic_inc_not_zero to increment refcount - padata: Fix pd UAF once and for all {CVE-2025-38584} - padata: Remove broken queue flushing {CVE-2023-52854} - padata: ensure padata_do_serial() runs on the correct CPU - Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305} - wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408} - sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718} - ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365} - Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386} - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640} - ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917} - ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918} - ipvs: use explicitly signed chars - vt: Clear selection before changing the font {CVE-2022-49948} - fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117} - xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900} - netlink: prevent potential spectre v1 gadgets {CVE-2023-53000} - igb: Do not free q_vector unless new one was allocated {CVE-2022-50252} - scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546} - net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907} - dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084} - dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085} - capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870} - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258} - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882} - Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250} - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751} - jbd2: remove wrong sb->s_sequence check {CVE-2025-37839} - net_sched: hfsc: Fix a UAF vulnerability in class handling - crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
Updated packages:
  • bpftool-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:588dae0dd24ffcc327b99e7e71a05e7fc488b3b32eb18adba9e0f2ac515b55eb
  • kernel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:19ed29f7780385d8cff743ea6cf777d0404f9b43c830b0d293dd54da1ed1e88a
  • kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:d23b3136dcdff29b4eec802e3bb57ad0de3c877048963444eb63ef3aa0544322
  • kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:532a0f32af39fd96f44b5c3fb43ce4ece1bcddfdd29a6847fa5b273b7990325a
  • kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:7cc5ab4ebd870d3607a478a9426762cebc695c348cd77a796216a280c6fea2bd
  • kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:7b5107ab66d81df943951b6a2c9a6b3a9e937d3491422809fea608cc6122ed62
  • kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:879830865dec6bd1c4b4ba2302942d14dd07c69fdebc9288f777b9b660d05b63
  • kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:9e7249b9fd07c12213672d955f1b2dc37cecf9594deeb3891733334fb5112588
  • kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:365580f43d9ae7abaf453cfb18c596dd512bbba16122d078f69f1df6ab4ab66e
  • perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:866c6a0625f4389c28dc8e135c1644202e64d5ed45be416ae649bc1797454369
  • python-perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
    sha:8359ef3a61bd22d6f399bbda39e05ae9c459053c6ab4014896a6565396354673
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.