Release date:
2025-06-17 14:02:04 UTC
Description:
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0 {CVE-2025-21702}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- netfilter: validate user input for expected length {CVE-2024-35896}
- nfs: fix UAF in direct writes {CVE-2024-26958}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
Updated packages:
-
bpftool-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:cb1149e69c1c71c79da21af8899c07014dc09bd6ce6e3e023c7243aa3df81602
-
kernel-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:0fdb4abca950bab215d1b2103aadacdb18700ae07a7a5a17a058bf30d5dc44b5
-
kernel-debug-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:638aabfb9120c7003d900c447de68f95b7ce78c2899b527876fb33f75bf3dbde
-
kernel-debug-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:c9a4963dcf0f838cea144e1899edec69504a1629397b1cbdf12f80284ec1e431
-
kernel-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:75c6604a1acf71c30ce06fc5cfa676f1b28e8eb93e1b9ed29d69b6404d1c7017
-
kernel-headers-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:b1aa3361d7ddc7a1a7be0ea0ce0674383b3476f138f026886c46949c18c742c9
-
kernel-tools-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:8ec9aa90a4352ac717d30d6025b611351471afff50f2ee2e27308af6127b15ee
-
kernel-tools-libs-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:586e4254f62cf0fd4d85925087d1003a858440c33d22b941a02280525e7395de
-
kernel-tools-libs-devel-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:06f63c956e3edda53587559395e95ca9bd7c707d9063f46bed71ad3781790ad0
-
perf-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:ebe790e9132c40aec0df64ea6de7858524ffb211f2085783e0c05e011e5ee0c8
-
python-perf-3.10.0-1160.119.1.0.5.el7.tuxcare.els21.x86_64.rpm
sha:d6d1271b3dcfa6d69e113fdaee7872aa0e042823325cd1ec8687b1e7a4769e79
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.