Release date:
2025-12-24 22:59:31 UTC
Description:
- xfrm: Duplicate SPI Handling {CVE-2025-39965}
- xfrm: state: use atomic_inc_not_zero to increment refcount
- padata: Fix pd UAF once and for all {CVE-2025-38584}
- padata: Remove broken queue flushing {CVE-2023-52854}
- padata: ensure padata_do_serial() runs on the correct CPU
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- vt: Clear selection before changing the font {CVE-2022-49948}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}
- net_sched: hfsc: Fix a UAF vulnerability in class handling
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:588dae0dd24ffcc327b99e7e71a05e7fc488b3b32eb18adba9e0f2ac515b55eb
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:19ed29f7780385d8cff743ea6cf777d0404f9b43c830b0d293dd54da1ed1e88a
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:d23b3136dcdff29b4eec802e3bb57ad0de3c877048963444eb63ef3aa0544322
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:532a0f32af39fd96f44b5c3fb43ce4ece1bcddfdd29a6847fa5b273b7990325a
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:7cc5ab4ebd870d3607a478a9426762cebc695c348cd77a796216a280c6fea2bd
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:7b5107ab66d81df943951b6a2c9a6b3a9e937d3491422809fea608cc6122ed62
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:879830865dec6bd1c4b4ba2302942d14dd07c69fdebc9288f777b9b660d05b63
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:9e7249b9fd07c12213672d955f1b2dc37cecf9594deeb3891733334fb5112588
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:365580f43d9ae7abaf453cfb18c596dd512bbba16122d078f69f1df6ab4ab66e
-
perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:866c6a0625f4389c28dc8e135c1644202e64d5ed45be416ae649bc1797454369
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:8359ef3a61bd22d6f399bbda39e05ae9c459053c6ab4014896a6565396354673
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.