[CLSA-2025:1757699693] kernel-uek: Fix of 16 CVEs
Type:
security
Severity:
Important
Release date:
2025-09-12 17:54:59 UTC
Description:
- Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg {CVE-2024-21803} - net: defer final 'struct net' free in netns dismantle {CVE-2024-56658} - netfilter: validate user input for expected length {CVE-2024-35896} - drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' {CVE-2024-56608} - smb: client: fix UAF in async decryption {CVE-2024-50047} - drm/amdgpu: fix usage slab after free {CVE-2024-56551} - nvme: avoid double free special payload {CVE-2024-41073} - xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014} - net/sched: act_mirred: don't override retval if we already lost the skb {CVE-2024-26739} - ext4: fix timer use-after-free on failed mount {CVE-2024-49960} - smb: client: fix potential UAF in cifs_stats_proc_show() {CVE-2024-35867} - smb: client: fix potential UAF in cifs_debug_files_proc_show() {CVE-2024-26928} - RDMA/mlx5: Fix fortify source warning while accessing Eth segment {CVE-2024-26907} - stddef: Introduce DECLARE_FLEX_ARRAY() helper - nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() {CVE-2025-21927} - net_sched: sch_sfq: move the limit validation {CVE-2024-57996} - net_sched: sch_sfq: use a temporary work area for validating configuration - net_sched: sch_sfq: don't allow 1 packet limit {CVE-2024-57996} - net_sched: sch_sfq: handle bigger packets - net_sched: sch_sfq: annotate data-races around q->perturb_period - squashfs: fix memory leak in squashfs_fill_super - netfilter: nf_tables: adjust lockdep assertions handling - Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" - ASoC: ops: dynamically allocate struct snd_ctl_elem_value - KVM: x86: use array_index_nospec with indices that come from guest - KVM: APIC: add helper func to remove duplicate code in kvm_pv_send_ipi - rds: Fix NULL ptr deref in xas_start - mm: make page_mapped_in_vma() hugetlb walk aware - mm/rmap: Fix handling of hugetlbfs pages in page_vma_mapped_walk - net_sched: sch_sfq: move the limit validation {CVE-2025-37752} - net_sched: sch_sfq: use a temporary work area for validating configuration - net_sched: sch_sfq: don't allow 1 packet limit {CVE-2024-57996} - net_sched: sch_sfq: handle bigger packets - net_sched: sch_sfq: annotate data-races around q->perturb_period - squashfs: fix memory leak in squashfs_fill_super - netfilter: nf_tables: adjust lockdep assertions handling - Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" - ASoC: ops: dynamically allocate struct snd_ctl_elem_value - KVM: x86: use array_index_nospec with indices that come from guest - KVM: APIC: add helper func to remove duplicate code in kvm_pv_send_ipi - rds: Fix NULL ptr deref in xas_start - mm: make page_mapped_in_vma() hugetlb walk aware - mm/rmap: Fix handling of hugetlbfs pages in page_vma_mapped_walk
Updated packages:
  • bpftool-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:42248b04fa174573772f15f752eb27417b0c7cac4defb046a78c88731bbe027f
  • kernel-uek-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:b6bc564d53a5b72e7c510ea4a9c629230f7fbb05951a568b20ea950332c3e736
  • kernel-uek-container-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:e64413cc95490d6a0659c636031ef3daa152551473a1c93b0812433e2f8e0b8b
  • kernel-uek-container-debug-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:54aabb9fe77c44acb1a63c805823d9a0af2736e1e5be4d1dad48b4120712aeea
  • kernel-uek-debug-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:be632571dd9a6fa603aeee1dcdbcc357e202e57879da78af691c04df794f1d01
  • kernel-uek-debug-devel-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:b7936276b44f6fd9d0d2c746712f8e30842baa458e76a5877f63900db23d24e9
  • kernel-uek-devel-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:15cae7db44107567a115b4d941597ff850927072cac0efdeeceec4a88009befd
  • kernel-uek-headers-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:a5801b16ddfcbd7dd49e133f91bdd66fd269c02c587a28ac66a899e9cc410dec
  • kernel-uek-tools-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:a3bef48afa763a532ec8aa0e12b48f95aaa465a993f544fe9f6a2c7fcedd3b85
  • perf-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:ad0221951898d1ea8474be4bd70180bb940c43f1c025492e23a040a65465364f
  • python-perf-5.4.17-2136.338.4.2.el7uek.tuxcare.els3.x86_64.rpm
    sha:7c9db8360a330b09b7098fdc14c0ff3e31214336f96fc2232f8c197067c2c951
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.