Release date:
2025-11-04 08:27:32 UTC
Description:
- ext4: fix possible UAF when remounting r/o a mmp-protected file system {CVE-2021-47342}
- ext4: fix memory leak in ext4_fill_super
- net: defer final 'struct net' free in netns dismantle {CVE-2024-56658}
- net/sched: sch_qfq: Fix race condition on qfq_aggregate {CVE-2025-38477}
- ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() {CVE-2022-48701}
- fix: virtio-net: Add validation for used length {CVE-2021-47352}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:87a8e1628eac9153c4e34b36c6726d5587de40ffcc13c76a892af49512cda643
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:21d788c3b761aaab098510c5e307f98771485a1751859cc5e8fca079f4e6100e
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:80a1582afab10549a9b49cf21442a3bc831c5b16f0360b9f1de162ba9db63101
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:a85de6ff808fb434219b39c037b383b78809e956b059ad0b5601a684ed15f8a0
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:7e6777b21988a419922de0186d0b7bab670a5e572720bb6fe60b111b0ec787db
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:94292ca800ffbb6106621e1480f57ee4cee9000d38478f286e87d75b03e0ca99
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:5f672c14c3280938772f6f00b7be83947000116a30159e522de22a51d7571d65
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:e42b699655be5bcb8cf4792295d27c12b8f307d9ba638e3deeaf930935eff17d
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:c1f543ac351ef6b6ea98ab0b6bd9004fda01b6b8a0f819bd23901e9009b90c7c
-
perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:efb166ddcbb8ce03c851e9cdd46fca1366463c68c34cffbb31ec06070c2fc501
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els2.x86_64.rpm
sha:ca58e2d8dbd252983fff938a3dd5f9ee1c39b05e0d5b66be1c43970f813b88bc
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.