Release date:
2025-06-19 17:24:04 UTC
Description:
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0 {CVE-2025-21702}
- xfs: add bounds checking to xlog_recover_process_data {CVE-2024-41014}
- netfilter: validate user input for expected length {CVE-2024-35896}
- nfs: fix UAF in direct writes {CVE-2024-26958}
- Squashfs: check the inode number is not the invalid value of zero {CVE-2024-26982}
- RDMA/srpt: Do not register event handler until srpt device is fully setup {CVE-2024-26872}
Updated packages:
-
bpftool-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:23a82a722988b15ab3f1aa2a12c0f951484cb516ff3cae4c69e2a443405702bc
-
kernel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:5a81535d57c56ea35b9aeaa1d0ab783223c56f7c21a08e0e3da2664925ee5cef
-
kernel-debug-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:f1fa80deae2ce67f86a50149105d04823885e9509fbf75b15278b76e8c27bc90
-
kernel-debug-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:6f1654eb27d01da046da79423228c3a3e457d730954f1a188eb28ac242033ba5
-
kernel-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:95cc336139742d471f3fcce876b4b16c71491b1da9555762b155c36daa17645e
-
kernel-headers-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:9d18548b28d21223b3fdba4280d3c69c74bc77f846be5283eb05c6222bc87456
-
kernel-tools-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:6412501458227266c1cc5e386d28b1fbce4398bff35c46eb8372fbef58b916df
-
kernel-tools-libs-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:578cebdac0a1e6296cb342bd7f5de7e3c78701aa433a0914aee0ca079e99b1ca
-
kernel-tools-libs-devel-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:badd860550395e240a0fe876fa1d9af92812e0412cb7197a2583a04cee54abb9
-
perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:ee47ea868dedfb871486a202e65e46cf50b68f889c65124432d98bd70347966a
-
python-perf-3.10.0-1160.119.1.el7.tuxcare.els21.x86_64.rpm
sha:395935a06197e491a7f8894bdb22cb1da16cd29438ed16879c266ab16807f546
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.