[CLSA-2025:1759432250] kernel: Fix of 36 CVEs
Type:
security
Severity:
Important
Release date:
2025-10-02 19:10:57 UTC
Description:
- ASoC: topology: Clean up route loading {CVE-2024-41069} - ASoC: topology: Fix references to freed memory {CVE-2024-41069} - drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616} - Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965} - Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() {CVE-2024-35965} - usb: cdc-acm: Check control transfer buffer size before access {CVE-2025-21704} - igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332} - vfio/pci: Properly hide first-in-list PCIe extended capability {CVE-2024-53214} - Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966} - Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35966} - media: stk1160: fix bounds checking in stk1160_copy_video() {CVE-2024-38621} - inet: fully convert sk->sk_rx_dst to RCU rules {CVE-2021-47103} - scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695} - scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901} - vmci: prevent speculation leaks by sanitizing event in event_deliver() {CVE-2024-39499} - USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760} - nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells {CVE-2021-47497} - virtio-net: Add validation for used length {CVE-2021-47352} - watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321} - scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978} - wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929} - wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921} - mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961} - platform/x86: wmi: Fix opening of char device {CVE-2023-52864} - media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764} - wifi: mac80211: fix potential key use-after-free {CVE-2023-52530} - net: fix information leakage in /proc/net/ptype {CVE-2022-48757} - crypto: qat - resolve race condition during AER recovery {CVE-2024-26974} - perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835} - net: ti: fix UAF in tlan_remove_one {CVE-2021-47310} - wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594} - net: bridge: use DEV_STATS_INC() {CVE-2023-52578} - net: add atomic_long_t to net_device_stats fields {CVE-2023-52578} - media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884} - media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885} - xen/gntalloc: don't use gnttab_query_foreign_access() {CVE-2022-23039} - xen/netfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23037} - xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038} - ovl: fail on invalid uid/gid mapping at copy up {CVE-2023-0386} - ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292}
Updated packages:
  • bpftool-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:9010034a9786c1ae295688c7b4903a33432cb80ed0975e968140cea79ec14615
  • kernel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:7cccede6ccb68947b64663a21d706f63b6100f7017c18d80e9d0e815f026e566
  • kernel-debug-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:10c7ffb54ff322ba7fed358d1714e157be8155bcc86903dfd984a873c6c33f97
  • kernel-debug-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:3aa6ee2bd5998acfe8c7644b517b1388586d44991bd98b8c16766b9a80db0e28
  • kernel-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:0cf1480536253528ac4156e3f9efe26dc37ab6f10a5d141aadfe6810fef3c183
  • kernel-headers-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:0b2235e9231206dbf7f37da699ffef2c57bd7e022b0df237a9fa0f3b5b77739b
  • kernel-tools-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:3798beed89b188d186afe7fda88a42528231d9c29d08e644a7e8b4971471b878
  • kernel-tools-libs-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:828fd5a62b9cf8cbbd51015632c596d2feeb066d55bc12faad7c37e004fe5c25
  • kernel-tools-libs-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:5bb5b64f24ece1a99da6db2ed79811d84c3d34c0db5c515777102b19310cd1ef
  • perf-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:58941d21ce7c1a147d0f9fe796a2d0117c1d2a354987e65ba22abbf3bdcd1662
  • python-perf-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
    sha:63f215b8db6f940065469730e348625ea48a3e098db34af6ccb69fe9df0e7c71
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.