[CLSA-2025:1750176020] kernel: Fix of 6 CVEs
Type:
security
Severity:
Important
Release date:
2025-06-17 16:00:25 UTC
Description:
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0 {CVE-2025-21702} - xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014} - netfilter: validate user input for expected length {CVE-2024-35896} - nfs: fix UAF in direct writes {CVE-2024-26958} - Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982} - RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
Updated packages:
  • bpftool-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:3ab5bf2d1b1c87a0c44e4696903b94dfe7955437271a4311b30fb5a03bd16e0f
  • kernel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:05abeae66d5430c72d6b715219f575f5542c371b159f46117b0192915b806d3b
  • kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:c240cd0dfd329ec63d1788bed8f8280dea600af322e018af4a600600069a0daa
  • kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:7148e193f38f1614698a05e4bbeea1e2023a140e207fafa5577fd8e323582eac
  • kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:406e09f344aa0efdb2800513cb41302590b72b1e56cf1f65d0dd4a32258b0c5d
  • kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:799cc396b5865b88c37f971559ce257bcb9e461a0e3eab81b3ed31cfee180911
  • kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:65134a0dd2b1b99308466c07daf6744fef11c2d8ac40fb5bc49b90123480388a
  • kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:56ff02d4af1ae6ad7e1156839d220de411ede0c6092c6a742db2657e676a2aa6
  • kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:4a1d816d0c69370895407309bef2a6d06134c648b38bd4f638233b2a76b7b7ca
  • perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:c9d4f84bdb6323e6bc05f1f9f72eb32336011dc421b68163d455b290fdefb526
  • python-perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
    sha:4da41b83e6e210369abec3efab0fa918d4515bb80cf0c2c8c2de7123bc8e19e1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.