Release date:
2025-12-25 10:54:09 UTC
Description:
- xfrm: Duplicate SPI Handling {CVE-2025-39965}
- xfrm: state: use atomic_inc_not_zero to increment refcount
- padata: Fix pd UAF once and for all {CVE-2025-38584}
- padata: Remove broken queue flushing {CVE-2023-52854}
- padata: ensure padata_do_serial() runs on the correct CPU
- Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() {CVE-2022-50408}
- sctp: linearize cloned gso packets in sctp_rcv {CVE-2025-38718}
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() {CVE-2023-53365}
- Bluetooth: L2CAP: Fix user-after-free {CVE-2022-50386}
- Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put {CVE-2022-3640}
- ipvs: fix WARNING in ip_vs_app_net_cleanup() {CVE-2022-49917}
- ipvs: fix WARNING in __ip_vs_cleanup_batch() {CVE-2022-49918}
- ipvs: use explicitly signed chars
- vt: Clear selection before changing the font {CVE-2022-49948}
- fs: prevent out-of-bounds array speculation when closing a file descriptor {CVE-2023-53117}
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref() {CVE-2022-48900}
- netlink: prevent potential spectre v1 gadgets {CVE-2023-53000}
- igb: Do not free q_vector unless new one was allocated {CVE-2022-50252}
- scsi: target: Fix WRITE_SAME No Data Buffer crash {CVE-2022-21546}
- net: mdio: fix undefined behavior in bit shift for __mdiobus_register {CVE-2022-49907}
- dm raid: fix address sanitizer warning in raid_status {CVE-2022-50084}
- dm raid: fix address sanitizer warning in raid_resume {CVE-2022-50085}
- capabilities: fix undefined behavior in bit shift for CAP_TO_MASK {CVE-2022-49870}
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() {CVE-2022-50258}
- usb: xhci: Fix isochronous Ring Underrun/Overrun event handling {CVE-2025-37882}
- Bluetooth: hci_core: Fix use-after-free in vhci_flush() {CVE-2025-38250}
- ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control {CVE-2025-39751}
- jbd2: remove wrong sb->s_sequence check {CVE-2025-37839}
- net_sched: hfsc: Fix a UAF vulnerability in class handling
- crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}
Updated packages:
-
bpftool-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:4c671b611f37bb602d4c30526bd52a2aa70b60bbce8d5982c54f8dd15bceb508
-
kernel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:8d997e64944a60f8cb471ba08aae18810d09ed7a4c23d6ce2c821a872072ee08
-
kernel-debug-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:d83c015f1d692e0e78e19b18316fba37f84fe1e04acce167079308ff2f5ecd58
-
kernel-debug-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:3a1ef6a2667f072a8bf9a290c8cdbcaad6901656e86cf6080bc19dbe8e905c6b
-
kernel-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:a35607e04b438a23cba0894c28f7c72ded7e84d99021ed6da1edbe06fe8fc532
-
kernel-headers-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:d7fe2f78edcff1d7eb168fe53f4cd56e7122c6cafb30568e1d91a5d41c06e3c5
-
kernel-tools-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:06f34408df7499d00ff0795bde1dd7bce6664714c96f3a6cfe9024fad47857e0
-
kernel-tools-libs-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:a63200cd9fa78d39b052bde62c36d8ac20616d24efefb8b4ff6fc1ba0e322f22
-
kernel-tools-libs-devel-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:36ba87986a4c92bea99c7f718e3ff04cc658ca9304f035fd224f88d07a7f7849
-
perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:8ff09a1d66b0b4a024974e7158eefcd05a3e15893fae8d2a3f90eca11a16f8cf
-
python-perf-3.10.0-1160.139.1.el7.tuxcare.els3.x86_64.rpm
sha:8a5937c699b5f94efd31a9ab78245f3af6704f36c7ef0d2597f52ee3dba50493
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.