[CLSA-2024:1706624410] Fix of 12 CVEs
Type:
security
Severity:
None
Release date:
2024-01-30 14:34:51 UTC
Description:
[ Ubuntu: 4.15.0-223.234 ] * Jammy update: v5.15.140 upstream stable release (LP: #2050038) // CVE-url: https://ubuntu.com/security/CVE-2024-0607 - netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() * CVE-url: https://ubuntu.com/security/CVE-2024-0607 - netfilter: nf_tables: Introduce new 64-bit helper register functions * Focal update: Focal update: v5.4.235 upstream stable release (LP: #2017706) // CVE-url: https://ubuntu.com/security/CVE-2023-1079 - HID: asus: Remove check for same LED brightness on set - HID: asus: use spinlock to protect concurrent accesses - HID: asus: use spinlock to safely schedule workers * CVE-url: https://ubuntu.com/security/CVE-2022-36402 - drm/vmwgfx: Add SM4_1 flag - drm/vmwgfx: Add support for SVGA3dCmdDefineGBSurface_v3 - drm/vmwgfx: Add CAP2 support in vmwgfx - drm/vmwgfx: Bump version patchlevel and date - drm/vmwgfx: Expose SM4_1 param to user space - drm/vmwgfx: Update the device headers - drm/vmwgfx: Fix shader stage validation * CVE-url: https://ubuntu.com/security/CVE-2024-0639 - sctp: fix potential deadlock on &net->sctp.addr_wq_lock * CVE-url: https://ubuntu.com/security/CVE-2023-6915 - ida: Fix crash in ida_free when the bitmap is empty * CVE-url: https://ubuntu.com/security/CVE-2023-6040 - netfilter: nf_tables: Reject tables of unsupported family * CVE-url: https://ubuntu.com/security/CVE-2023-51780 - atm: Fix Use-After-Free in do_vcc_ioctl * CVE-url: https://ubuntu.com/security/CVE-2023-51782 - net/rose: Fix Use-After-Free in rose_ioctl * CVE-url: https://ubuntu.com/security/CVE-2023-51781 - appletalk: Fix Use-After-Free in atalk_ioctl * CVE-url: https://ubuntu.com/security/CVE-2024-0340 - vhost: use kzalloc() instead of kmalloc() followed by memset() * CVE-2023-51779 // CVE-url: https://ubuntu.com/security/CVE-2023-51779 - Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg * Jammy update: v5.15.135 upstream stable release (LP: #2045809) // CVE-url: https://ubuntu.com/security/CVE-2023-34324 - xen/events: replace evtchn_rwlock with RCU * Miscellaneous upstream changes - drm/vmwgfx: Use enum to represent graphics context capabilities
Updated packages:
  • linux-buildinfo-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:134a72716935ffec03842ed8f5974839ede2fbb2
  • linux-buildinfo-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:93a7673a02e7d6a774427e54d93bde8e5d2df9ac
  • linux-cloud-tools-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:28760b556f656ce9aaff344175c9cbe450b05e69
  • linux-cloud-tools-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:741235f3b80cac4e5defe972128fd07d30412f6a
  • linux-cloud-tools-generic-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:05a5285ec010ff3a257390a34777f53639b725cd
  • linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:acac369271e0d96fe8ce07fc415a0299ae07700f
  • linux-generic-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:2d7a263bd2670ba38f07387a4a29ca090300a333
  • linux-headers-4.15.0-223-tuxcare.els21_4.15.0-223.234~16.04.1_all.deb
    sha:2263f2c4c81681b534512860ec91dfd57df950de
  • linux-headers-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:360ed33a6b7af35977125cb4bb3bee9aa831be56
  • linux-headers-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:bd3f5ebd9c9c6d3edd2d44d4873cd29e9549f2ca
  • linux-headers-generic-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:0ed318905ec5e0fc902537a7115eeb89d8ef4886
  • linux-headers-lowlatency-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:f04cdc2ccfd9d0104acb69a9133a769ebfe44d93
  • linux-hwe-cloud-tools-4.15.0-223-tuxcare.els21_4.15.0-223.234~16.04.1_amd64.deb
    sha:626d59f68ade2955d26242c44553da9b58be4173
  • linux-hwe-tools-4.15.0-223-tuxcare.els21_4.15.0-223.234~16.04.1_amd64.deb
    sha:49ee3eb36992d9922806210b2b00a31e86b06124
  • linux-image-generic-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:7cbe246f404343a6b8a4dd3b599527542e345517
  • linux-image-lowlatency-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:a3aef60131ab9d453e16f4622286ea3f818e5c27
  • linux-image-unsigned-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:c61c5834c7608272741324843005f69ae4981bc4
  • linux-image-unsigned-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:e3cdb380a1a4b75714f763ba0055ac170920563a
  • linux-lowlatency-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:74a253e602a6faee733d54be0cda7b34d635e326
  • linux-modules-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:dc367ba3e0090540b86a619a31970306a29bf51c
  • linux-modules-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:9fd8a5e95dbfca18a7661b1d3eb2f05b26217922
  • linux-modules-extra-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:e25d5137cee9fe9acfc9e26e7dc30269c22c2685
  • linux-source-4.15.0_4.15.0-223.234~16.04.1_all.deb
    sha:94e89574ad7569bb7b8e8f77d5fce0dc699d2be2
  • linux-tools-4.15.0-223-tuxcare.els21-generic_4.15.0-223.234~16.04.1_amd64.deb
    sha:cfba385028b8cb2912c57e2b3b4b883ecf4de60b
  • linux-tools-4.15.0-223-tuxcare.els21-lowlatency_4.15.0-223.234~16.04.1_amd64.deb
    sha:6927d7873b0c19cd40276b63bf44fc1a9dbfce68
  • linux-tools-generic-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:c37c31c0a63b5e8691eed999b88afcd850020146
  • linux-tools-lowlatency-hwe-16.04_4.15.0.223.158_amd64.deb
    sha:d76c92dae4fba28e1c174e6288d466b43df48171
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.