Release date:
2025-10-02 19:10:57 UTC
Description:
- ASoC: topology: Clean up route loading {CVE-2024-41069}
- ASoC: topology: Fix references to freed memory {CVE-2024-41069}
- drm/dp_mst: Fix MST sideband message body length check {CVE-2024-56616}
- Bluetooth: L2CAP: Fix not validating setsockopt user input {CVE-2024-35965}
- Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() {CVE-2024-35965}
- usb: cdc-acm: Check control transfer buffer size before access {CVE-2025-21704}
- igb: Fix potential invalid memory access in igb_init_module() {CVE-2024-52332}
- vfio/pci: Properly hide first-in-list PCIe extended capability {CVE-2024-53214}
- Bluetooth: RFCOMM: Fix not validating setsockopt user input {CVE-2024-35966}
- Bluetooth: SCO: Fix not validating setsockopt user input {CVE-2024-35966}
- media: stk1160: fix bounds checking in stk1160_copy_video() {CVE-2024-38621}
- inet: fully convert sk->sk_rx_dst to RCU rules {CVE-2021-47103}
- scsi: mpt3sas: Fix use-after-free warning {CVE-2022-48695}
- scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory {CVE-2024-40901}
- vmci: prevent speculation leaks by sanitizing event in event_deliver() {CVE-2024-39499}
- USB: core: Fix hang in usb_kill_urb by adding memory barriers {CVE-2022-48760}
- nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells {CVE-2021-47497}
- virtio-net: Add validation for used length {CVE-2021-47352}
- watchdog: Fix possible use-after-free by calling del_timer_sync() {CVE-2021-47321}
- scsi: qedi: Fix crash while reading debugfs attribute {CVE-2024-40978}
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids {CVE-2024-40929}
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal {CVE-2024-36921}
- mac802154: fix llsec key resources release in mac802154_llsec_key_del {CVE-2024-26961}
- platform/x86: wmi: Fix opening of char device {CVE-2023-52864}
- media: gspca: cpia1: shift-out-of-bounds in set_flicker {CVE-2023-52764}
- wifi: mac80211: fix potential key use-after-free {CVE-2023-52530}
- net: fix information leakage in /proc/net/ptype {CVE-2022-48757}
- crypto: qat - resolve race condition during AER recovery {CVE-2024-26974}
- perf/core: Bail out early if the request AUX area is out of bound {CVE-2023-52835}
- net: ti: fix UAF in tlan_remove_one {CVE-2021-47310}
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() {CVE-2023-52594}
- net: bridge: use DEV_STATS_INC() {CVE-2023-52578}
- net: add atomic_long_t to net_device_stats fields {CVE-2023-52578}
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() {CVE-2022-45884}
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend {CVE-2022-45885}
- xen/gntalloc: don't use gnttab_query_foreign_access() {CVE-2022-23039}
- xen/netfront: don't use gnttab_query_foreign_access() for mapped status {CVE-2022-23037}
- xen/grant-table: add gnttab_try_end_foreign_access() {CVE-2022-23038}
- ovl: fail on invalid uid/gid mapping at copy up {CVE-2023-0386}
- ALSA: oss: Fix PCM OSS buffer allocation overflow {CVE-2022-49292}
Updated packages:
-
bpftool-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:9010034a9786c1ae295688c7b4903a33432cb80ed0975e968140cea79ec14615
-
kernel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:7cccede6ccb68947b64663a21d706f63b6100f7017c18d80e9d0e815f026e566
-
kernel-debug-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:10c7ffb54ff322ba7fed358d1714e157be8155bcc86903dfd984a873c6c33f97
-
kernel-debug-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:3aa6ee2bd5998acfe8c7644b517b1388586d44991bd98b8c16766b9a80db0e28
-
kernel-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:0cf1480536253528ac4156e3f9efe26dc37ab6f10a5d141aadfe6810fef3c183
-
kernel-headers-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:0b2235e9231206dbf7f37da699ffef2c57bd7e022b0df237a9fa0f3b5b77739b
-
kernel-tools-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:3798beed89b188d186afe7fda88a42528231d9c29d08e644a7e8b4971471b878
-
kernel-tools-libs-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:828fd5a62b9cf8cbbd51015632c596d2feeb066d55bc12faad7c37e004fe5c25
-
kernel-tools-libs-devel-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:5bb5b64f24ece1a99da6db2ed79811d84c3d34c0db5c515777102b19310cd1ef
-
perf-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:58941d21ce7c1a147d0f9fe796a2d0117c1d2a354987e65ba22abbf3bdcd1662
-
python-perf-3.10.0-1160.137.1.el7.tuxcare.els25.x86_64.rpm
sha:63f215b8db6f940065469730e348625ea48a3e098db34af6ccb69fe9df0e7c71
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.