Release date:
2026-05-14 19:27:09 UTC
Description:
- fix: "vsock: Ignore signal/timeout on connect() if already established {CVE-2025-40248}"
- gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622}
- ALSA: 6fire: fix use-after-free on disconnect {CVE-2026-31581}
- nfnetlink_osf: validate individual option lengths in fingerprints {CVE-2026-23397}
- netfilter: nfnetlink_osf: avoid OOB read {CVE-2026-23397}
- Squashfs: check metadata block offset is within range {CVE-2026-23388}
- scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() {CVE-2026-23216}
- can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak {CVE-2026-23108}
- net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag {CVE-2026-23105}
- ALSA: ctxfi: Fix potential OOB access in audio mixer handling {CVE-2026-23076}
- net: usb: pegasus: fix memory leak in update_eth_regs_async() {CVE-2026-23021}
- ipv4: ip_gre: make ipgre_header() robust {CVE-2026-23011}
- libceph: make decode_pool() more resilient against corrupted osdmaps {CVE-2025-71116}
- via_wdt: fix critical boot hang due to unnamed resource allocation {CVE-2025-71114}
- hwmon: (w83791d) Convert macros to functions to avoid TOCTOU {CVE-2025-71111}
- Bluetooth: btusb: revert use of devm_kzalloc in btusb {CVE-2025-71082}
- Revert "fbdev: bitblit: bound-check glyph index in bit_putcs* {CVE-2025-40322}"
- driver core: fix potential null-ptr-deref in device_add() {CVE-2023-54321}
- btrfs: output extra debug info if we failed to find an inline backref {CVE-2023-53672}
- ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}
- netfilter: conntrack: Avoid nf_ct_helper_hash uses after free {CVE-2023-53619}
- ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587}
- net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb {CVE-2023-53548}
- udf: Do not bother merging very long extents {CVE-2023-53506}
- lib: cpu_rmap: Fix potential use-after-free in irq_cpu_rmap_release(CVE-2023-53484)
- lib: cpu_rmap: Avoid use after free on rmap->obj array entries {CVE-2023-53484}
- ext4: remove a BUG_ON in ext4_mb_release_group_pa() {CVE-2023-53450}
- md/raid10: fix wrong setting of max_corr_read_errors {CVE-2023-53313}
- platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]() {CVE-2022-50521}
- binfmt_misc: fix shift-out-of-bounds in check_special_flags {CVE-2022-50497}
- ntb_netdev: Use dev_kfree_skb_any() in interrupt context {CVE-2022-50476}
- i2c: ismt: use correct length when copy buffer {CVE-2022-50394}
- misc: tifm: fix possible memory leak in tifm_7xx1_switch_media() {CVE-2022-50349}
- ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS {CVE-2022-50315}
- ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network {CVE-2022-49865}
- KVM: x86/mmu: make apf token non-zero to fix bug {CVE-2022-48943}
- kvm: avoid speculation-based attacks from out-of-range memslot accesses {CVE-2021-47277}
- scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() {CVE-2021-47219}
- scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() {CVE-2021-47191}
- USB: core: Add routines for endpoint checks in old drivers
- xen: sync some headers with xen tree
- squashfs: fix memory leak in squashfs_fill_super {CVE-2025-38415}
- pptp: fix pptp_xmit() error path {CVE-2025-38574}
- Revert "net/sched: sch_hfsc: Ensure inner classes have fsc curve" {CVE-2023-4623}
Updated packages:
-
bpftool-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:da2511e97e29e3e6a6d874f993f09688b525d90cf317525c344ce6d3e0f58b61
-
kernel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:07fa0e61aab6725bf182499da95a03febccee86d02a3a8ff9c8108adbc8e6694
-
kernel-debug-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:d8fb684c1bc1ce780c2ac0f923707b017132bb8682e302991e2b8000f9d1060b
-
kernel-debug-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:2d67e38b6c763f3dfa0fa4cb0e1483a4079e483ead2c395ea4c5f2b7df84d047
-
kernel-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:f57bb4fd475942ea95ccf3125a6cbac1399a651234fb026842e8ea109850391c
-
kernel-headers-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:1c5525ff992493d31380c6f6adbc592d0ec647d6c810e8302b009b959f5c8f59
-
kernel-tools-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:68b7747c962cb297b3b12bf2fd07f4c82706ebd7d3652c8f0d808ed107231d91
-
kernel-tools-libs-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:3ffa67d19ab33c699f5663cbdd2d9229748c72d6eb03cc30236110056b500a59
-
kernel-tools-libs-devel-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:2b64043df92b7c83d01e12094bee95042ded3c093a0ba831a69113f973393001
-
perf-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:06cb06fe576ac852079762cb93c7cdf125b0ec86bfe3f47ee3b13726dead8c45
-
python-perf-3.10.0-1160.144.1.el7.tuxcare.els5.x86_64.rpm
sha:8dd381ec6682d2f91bcc6ddf8751309c01c58a3c0c371c04e0a0564e46ab0346
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.