Release date:
2025-12-25 10:49:32 UTC
Description:
- xfrm: Duplicate SPI Handling {CVE-2025-39965}
- xfrm: state: use atomic_inc_not_zero to increment refcount
- padata: Fix pd UAF once and for all {CVE-2025-38584}
- padata: Remove broken queue flushing {CVE-2023-52854}
- padata: ensure padata_do_serial() runs on the correct CPU
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- vt: Clear selection before changing the font {CVE-2022-49948}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}
- net_sched: hfsc: Fix a UAF vulnerability in class handling
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:d68d0c3c80b3d305db3d9e3c7765fb5565feedc85fc5a80d2b6a173b38dc627a
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:48ca18148c7a0d9a7e453b980d341cd469aa406ea6cff7c2bd1f7a019b5b4dce
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:41d81d50490c94102ed469dd71380be5f7b0c3a2b67c1eeaaa1f7a8567c60ca1
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:bb977037ca3fdc579b22fa9bc5f41ce0f1fe4cef2a9e204af18d07da1bc9974e
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:cbf947dc97990f5483b2093f5f1639854db8945ab92e0d56515c7cd90973ab81
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:ce20c519b0eccf08d7002c0f89508c82d7178e35b407d7ac4df8cb75a0cc0092
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:ae883a296cc96b9715f7501387cf8628c63633c499ade8d80ff4e29d5ae245ee
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:cd35ebf5c5ace31b3204c1242a0f46e3166d6214b671b41f95ea138b67b49681
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:e19745049e307cd70c9a5c8ebdc5e360949992ddc435e12c4817f240d3b1b0b3
-
perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:92640a54e49bd67092456293c3801451f4c4dc6b7fe725309cc24b9e3140492f
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:5492813f49ce8119419c1927b21aa7b6b84efa70bf487bd4f6ea6958f7ec16eb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.