Release date:
2025-09-12 17:29:09 UTC
Description:
- x86/kvm: Disable kvmclock on all CPUs on shutdown {CVE-2021-47110}
- posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() {CVE-2025-38352}
- cifs: fix double free race when mount fails in cifs_get_root() {CVE-2022-48919}
- aio: mark AIO pseudo-fs noexec {CVE-2016-10044}
- cifs: potential buffer overflow in handling symlinks {CVE-2022-49058}
- NFSD: fix race between nfsd registration and exports_proc {CVE-2025-38232}
- nfsd: register pernet ops last, unregister first {CVE-2025-38232}
- net: atm: fix use after free in lec_send() {CVE-2025-22004}
- net: atlantic: fix aq_vec index out of range error {CVE-2022-50066}
- do_change_type(): refuse to operate on unmounted/not ours mounts {CVE-2025-38498}
- net: atm: fix /proc/net/atm/lec handling {CVE-2025-38180}
- net: atm: add lec_mutex {CVE-2025-38180}
- SUNRPC: make sure cache entry active before cache_show {CVE-2024-53174}
- scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() {CVE-2025-38399}
- scsi: target: Fix crash during SPEC_I_PT handling {CVE-2025-38399}
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race {CVE-2025-38085}
- drivers:md:fix a potential use-after-free bug {CVE-2022-50022}
- ext4: avoid resizing to a partial cluster size {CVE-2022-50020}
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() {CVE-2025-21928}
- net/sched: Abort __tc_modify_qdisc if parent class does not exist {CVE-2025-38457}
- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() {CVE-2022-49788}
- dlm: fix plock invalid read {CVE-2022-49407}
- net: usb: smsc75xx: Limit packet length to skb->len {CVE-2023-53125}
- scsi: libfc: Fix use after free in fc_exch_abts_resp() {CVE-2022-49114}
- crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}
- HID: core: Harden s32ton() against conversion to 0 bits {CVE-2025-38556}
- HID: core: ensure the allocated report buffer can contain the reserved report ID {CVE-2025-38495}
- ext4: Fix possible corruption when moving a directory {CVE-2023-53137}
- ceph: avoid putting the realm twice when decoding snaps fails {CVE-2022-49770}
- vsock/vmci: Clear the vmci transport packet properly when initializing it {CVE-2025-38403}
- HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}
- sch_hfsc: make hfsc_qlen_notify() idempotent {CVE-2025-38177}
- ext4: check dot and dotdot of dx_root before making dir indexed {CVE-2024-42305}
- ALSA: bcd2000: Fix a UAF bug on the error path of probing {CVE-2022-50229}
- dm ioctl: prevent potential spectre v1 gadget {CVE-2022-49122}
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too {CVE-2025-37823}
- md-raid10: fix KASAN warning {CVE-2022-50211}
- scsi: lpfc: Use memcpy() for BIOS version {CVE-2025-38332}
- ACPICA: Refuse to evaluate a method if arguments are missing {CVE-2025-38386}
- media: cxusb: no longer judge rbuf when the write fails {CVE-2025-38229}
- ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}
- ext4: fix off-by-one error in do_split {CVE-2025-23150}
- perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init {CVE-2025-37878}
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() {CVE-2025-38000}
- i40e: fix MMIO write access to an invalid page in i40e_clear_hw {CVE-2025-38200}
Updated packages:
-
bpftool-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:b0c63c0f32dbc3994c5e5565c661716a68b478d88776e8c6c04e2acbbf65eed5
-
kernel-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:349efadfac17a68ba1119292053e039bbe9400e04a251ae7d80e8aac995889ef
-
kernel-debug-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:2c957bbf2b1020034f8820bd8a3558d1c3fcb32ccbce36333ac8e8411abfeaed
-
kernel-debug-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:bcd6c150aa179c4b1e91a3c87128bc8fdc49ce53ba16b9b2f773cdd161bfa143
-
kernel-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:5f03240e890c3aae49d267195fa2e40ecacea1eeabbd42ddab0705f2d2184c8e
-
kernel-headers-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:b8c3c9c6f6ea9701a54e1d5a5b5ca61dc3ab3de79ec6c36506dff22d92c04b60
-
kernel-tools-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:3aa799f9e75fd9f40bc6d59e98008df5f057e453391b7a83c0f8dc11b2e73c7f
-
kernel-tools-libs-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:12be75a8db3d7dc0349cfa408a106282b5b38aaddb124951098d9e1edbd50632
-
kernel-tools-libs-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:cf837cd762ab171f958f1cd9c2a27c298ff5e664ea90ceeaf1698c5e95decaa4
-
perf-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:50296811686a6606407e5d8b793ec01024a39487f55f8be7c8b32b9d35e61146
-
python-perf-3.10.0-1160.119.1.0.5.el7.tuxcare.els24.x86_64.rpm
sha:c3a0e37dbd225e1855af16a6a3be92620ab4921918abcc7040c1ce82fb68521d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.