Release date:
2025-11-05 17:35:07 UTC
Description:
- ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}
- ext4: fix memory leak in ext4_fill_super
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}
- fix: virtio-net: Add validation for used length {CVE-2021-47352}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:7b37ee02e98b87d0a82e1866278644a0e3885dece6a900e2b6e233042fcea11a
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:32c4d56c4219aa7f6b5bec71e9834765b990acacbc277fabf567dd7b3ae7849a
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:47a830e01119042db338320a422ce68668241b9f44ef34a480757745312155a0
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:ab5e6bd2da839cd88cb00c3dbb74bdc3b78c3d2d9322961475d0112a50e38357
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:60cba14b1c7694dc499b6991ceed37ff039616ed1469c3525ea9bdb476633ea4
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:5ec175b91e616d710762f7447e2b351d79cbfc4bab0527715830ddf438c4077c
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:71f7cc0b05b8f64591d34ccc85595ac273c6fa8d9b8325c119579a6bdd9af4a0
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:5f9f1286440f501e3fb76f4a7dac8dd0512d7a58f06524e36faf2eab17564fd0
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:e05bdeb0d54b16833cdf5627b1b1eaf44ee0638759401745dd6e3015d396f97b
-
perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:1b4680729f12093ed820547ecc894b627531f2987a4250235f77d1f52450c8fc
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:8ac5941dc85fc02438646e4b915b1c79c385b4831c2d2115d315292bd39673e1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.