Release date:
2025-09-15 18:54:17 UTC
Description:
- inet: fully convert sk->sk_rx_dst to RCU rules {CVE-2021-47103}
- ALSA: usb-audio: Fix out of bounds reads when finding clock sources {CVE-2024-53150}
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}
- can: peak_usb: fix use after free bugs {CVE-2021-47670}
- wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds {CVE-2025-38159}
- RDMA/rxe: Fix error unwind in rxe_create_qp() {CVE-2022-50127}
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200}
- udp: Fix memory accounting leak. {CVE-2025-22058}
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50083}
- ext4: correct the misjudgment in ext4_iget_extra_inode {CVE-2022-50083}
- ext4: correct max_inline_xattr_value_size computing {CVE-2022-50083}
- ext4: fix use-after-free in ext4_xattr_set_entry {CVE-2022-50083}
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h {CVE-2022-50083}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- net_sched: ets: Fix double list add in class with netem as child qdisc {CVE-2025-38085}
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race {CVE-2025-38085}
- padata: fix UAF in padata_reorder {CVE-2025-21727}
- net/sched: Always pass notifications when child class becomes empty {CVE-2025-38350}
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() {CVE-2025-38177}
- sch_ets: make est_qlen_notify() idempotent {CVE-2025-38177}
- sch_qfq: make qfq_qlen_notify() idempotent {CVE-2025-38177}
- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}
- sch_drr: make drr_qlen_notify() idempotent {CVE-2025-38177}
- sch_htb: make htb_qlen_notify() idempotent {CVE-2025-38177}
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() {CVE-2025-38000}
- mptcp: do not queue data on closed subflows {CVE-2022-50070}
- mptcp: export mptcp_subflow_active {CVE-2022-50070}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- tipc: Fix use-after-free in tipc_conn_close(). {CVE-2025-38464}
- RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction {CVE-2025-38211}
- scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332}
- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}
- ext4: avoid resizing to a partial cluster size {CVE-2022-50020}
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc {CVE-2025-37890}
- net: tipc: fix refcount warning in tipc_aead_encrypt {CVE-2025-38273}
- ice: xsk: prohibit usage of non-balanced queue id {CVE-2022-50003}
- net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done {CVE-2025-38052}
- virtio-gpu: fix a missing check to avoid NULL dereference {CVE-2022-50181}
- usb: xhci_plat_remove: avoid NULL dereference {CVE-2022-50133}
- ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot {CVE-2022-50015}
- netfilter: nft_tproxy: restrict to prerouting hook {CVE-2022-50001}
- scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq {CVE-2022-49986}
- ath11k: fix netdev open race {CVE-2022-50187}
Updated packages:
-
bpftool-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:26cfe439bbf6ad5eb9330d7a55fd65553273fd1b721dc142e3ee26fd31f2cc48
-
kernel-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:bbb7cdb0b898c05b36d0f667003a2a5673a31dac8ec639b59c1aeb121f52ece3
-
kernel-core-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:2239c71ddf18e0fc49e615b3884c0ba9827a35e845b90d659e93c285c62075fa
-
kernel-cross-headers-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:7c7196c4a7dfef3ecf6e53a489c56637ff3f37a8eae75d966c0c600daea993b3
-
kernel-debug-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:d338ca1c3b65052eb7fd43790e62657979ee558736420b2562fa11857f460610
-
kernel-debug-core-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:2a30fd90c5a389899b27f96b51437c6dd952c77052809274ab251bed81f6546e
-
kernel-debug-devel-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:34aa00a0c3e122e9202b9415a0a26616c0e7d5d679c68e0de9329d7a6663301b
-
kernel-debug-modules-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:ebbdd450be7234d8e5782a24eb8fee1fa6bac59dde36957831c38671ca56bf2a
-
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:4ab1ead685f12bf9ba4d13262982722ef8a41638a8d4efe985225277d4960144
-
kernel-debug-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:c748eefa87cda4bef52773e8f388fbcaf75430cb14025c6c9655bb8b09c276bc
-
kernel-devel-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:f4c9fd5b70c1ad7d9e60930a7419d22a8b0f63857725a35fee959f32b21fbe02
-
kernel-headers-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:62b8e545ee37a5a8147b7420681b8a8825951709ddc4e53a967451a6aae061b5
-
kernel-ipaclones-internal-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:7ee09085746f0ff261c7d5c31f8914d0a7a5afe209b5b875d5cd05e405531b07
-
kernel-modules-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:99acb5270617c29592c4a2bb5938a161dccecb5b5a52c71e3f6ee698d085c97d
-
kernel-modules-extra-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:700cd3e99c650bfe8b273af715f82bab814e849e49789d204322318c1a3477dd
-
kernel-modules-internal-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:4ce021e4cb763c6995d956aa85f22eb586d5d2059dd1351828728e6fc4f2be3d
-
kernel-selftests-internal-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:ce954008d177ca64f7fc10a959b977ffb01bde40ff95d86377f0303e57a30650
-
kernel-tools-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:322cc388698e5327ccf63c12e140c5fe9cfa18cfc2a217f545da3e0bd769b1ad
-
kernel-tools-libs-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:3e125d64ff131b2b9f1455ea7a1733e3bf6ccd4022466eb2659661acb69340e4
-
kernel-tools-libs-devel-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:8a590fa6d175b8ffed0b54f896e28e15d4da9b2947ddfa557d9bafc5fb71202e
-
perf-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:5590cc6e8f548f31ef9b490fafced0d1c8f45da9b733c6563f5d0073a8e70691
-
python3-perf-4.18.0-348.7.1.el8_5.tuxcare.els31.x86_64.rpm
sha:a0daef3641d8abc54e18c8de1e727386d34770f1108ea9adde0fff855978e766
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.