Release date:
2024-05-21 06:00:46 UTC
Description:
[ Ubuntu: 4.15.0-228.239 ]
* CVE-url: https://ubuntu.com/security/CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
* CVE-url: https://ubuntu.com/security/CVE-2023-52601
- jfs: Fix memleak in dbAdjCtl
* CVE-url: https://ubuntu.com/security/CVE-2024-26801
- Bluetooth: Avoid potential use-after-free in hci_error_reset
* CVE-url: https://ubuntu.com/security/CVE-2024-26805
- netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
* CVE-url: https://ubuntu.com/security/CVE-2024-26735
- ipv6: sr: fix possible use-after-free and null-ptr-deref
* CVE-url: https://ubuntu.com/security/CVE-2023-52566
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
* CVE-url: https://ubuntu.com/security/CVE-2021-46981
- nbd: Fix NULL pointer in flush_workqueue
* CVE-url: https://ubuntu.com/security/CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_write_control()
* CVE-url: https://ubuntu.com/security/CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-url: https://ubuntu.com/security/CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-url: https://ubuntu.com/security/CVE-2023-52524
- net: nfc: llcp: Add lock when modifying device list
* CVE-url: https://ubuntu.com/security/CVE-2021-47173
- misc/uss720: fix memory leak in uss720_probe
* CVE-url: https://ubuntu.com/security/CVE-2024-26910
- timers: Get rid of del_singleshot_timer_sync()
- timers: Update kernel-doc for various functions
- timers: Use del_timer_sync() even on UP
- timers: Rename del_timer_sync() to timer_delete_sync()
- timers: Rename del_timer() to timer_delete()
- timers: Silently ignore timers with a NULL function
- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode
- timers: Add shutdown mechanism to the internal functions
- timers: Provide timer_shutdown[_sync]()
- netfilter: ipset: fix performance regression in swap operation
* CVE-url: https://ubuntu.com/security/CVE-2023-52595
- rt2x00: clear IV's on start to fix AP mode regression
- wifi: rt2x00: restart beacon queue when hardware reset
* CVE-url: https://ubuntu.com/security/CVE-2023-52617
- switchtec: Improve MRPC efficiency by enabling write combining
- switchtec: Add MRPC DMA mode support
- PCI: switchtec: Fix stdev_release() crash after surprise hot remove
* CVE-url: https://ubuntu.com/security/CVE-2024-26696
- nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
* CVE-url: https://ubuntu.com/security/CVE-2024-26685
- nilfs2: fix potential bug in end_buffer_async_write
* CVE-url: https://ubuntu.com/security/CVE-2024-26625
- llc: call sock_orphan() at release time
* CVE-url: https://ubuntu.com/security/CVE-2023-52615
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng
* CVE-url: https://ubuntu.com/security/CVE-2023-52486
- drm: Don't unref the same fb many times by mistake due to deadlock handling
* CVE-url: https://ubuntu.com/security/CVE-2024-26920
- tracing/trigger: Fix to return error if failed to alloc snapshot
* CVE-url: https://ubuntu.com/security/CVE-2024-26697
- nilfs2: fix data corruption in dsync block recovery for small block sizes
* CVE-url: https://ubuntu.com/security/CVE-2024-26679
- inet: read sk->sk_family once in inet_recv_error()
* CVE-url: https://ubuntu.com/security/CVE-2023-52622
- ext4: remove unnecessary check from alloc_flex_gd()
- ext4: avoid online resizing failures due to oversized flex bg
* CVE-url: https://ubuntu.com/security/CVE-2024-26635
- llc: Drop support for ETH_P_TR_802_2.
* CVE-url: https://ubuntu.com/security/CVE-2023-52594
- wifi: ath9k: Fix potential array-index-out-of-bounds read in
ath9k_htc_txstatus()
* CVE-url: https://ubuntu.com/security/CVE-2023-52583
- ceph: fix deadlock or deadcode of misusing dget()
* CVE-url: https://ubuntu.com/security/CVE-2024-26720
- mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again
* CVE-url: https://ubuntu.com/security/CVE-2024-26825
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup
* CVE-url: https://ubuntu.com/security/CVE-2024-26671
- blk-mq: fix IO hang from sbitmap wakeup race
* CVE-url: https://ubuntu.com/security/CVE-2024-26675
- ppp_async: limit MRU to 64K
* CVE-url: https://ubuntu.com/security/CVE-2024-26663
- tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
* CVE-url: https://ubuntu.com/security/CVE-2023-52602
- jfs: fix slab-out-of-bounds Read in dtSearch
* CVE-url: https://ubuntu.com/security/CVE-2024-26704
- ext4: fix double-free of blocks due to wrong extents moved_len
* CVE-url: https://ubuntu.com/security/CVE-2023-52619
- pstore/ram: Fix crash when setting number of cpus to an odd number
* CVE-url: https://ubuntu.com/security/CVE-2024-26636
- llc: make llc_ui_sendmsg() more robust against bonding changes
* CVE-url: https://ubuntu.com/security/CVE-2023-52587
- IB/ipoib: Fix mcast list locking
* CVE-url: https://ubuntu.com/security/CVE-2023-52601 // CVE-url:
https://ubuntu.com/security/CVE-2023-52604
- jfs: fix array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2023-52604
- FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2023-52623
- SUNRPC: Fix a suspicious RCU usage warning
* CVE-url: https://ubuntu.com/security/CVE-2023-52599
- jfs: fix array-index-out-of-bounds in diNewExt
* CVE-url: https://ubuntu.com/security/CVE-2024-26884
- bpf: Fix hashtab overflow check on 32-bit arches
* CVE-url: https://ubuntu.com/security/CVE-2024-26883
- bpf: Fix stackmap overflow check on 32-bit arches
* CVE-url: https://ubuntu.com/security/CVE-2024-26882
- net: add atomic_long_t to net_device_stats fields
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
* CVE-url: https://ubuntu.com/security/CVE-2024-26908
- x86/xen: Add some null pointer checking to smp.c
* CVE-url: https://ubuntu.com/security/CVE-2024-26904
- btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve
* CVE-url: https://ubuntu.com/security/CVE-2024-26903
- Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
* CVE-url: https://ubuntu.com/security/CVE-2024-26901
- do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
* CVE-url: https://ubuntu.com/security/CVE-2024-26898
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
Updated packages:
-
linux-buildinfo-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:6cb9c119ce21ad555abd5658a132bb5644af784f
-
linux-buildinfo-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:c0e169db6f6df1a7ea99552df2ae6df7903f03ed
-
linux-cloud-tools-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:667142453267f516c17d8e3600fdd3c6326eecfe
-
linux-cloud-tools-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:8be034a27b08bf4391f293795d8131bbcce81bfa
-
linux-cloud-tools-generic-hwe-16.04_4.15.0.228.163_amd64.deb
sha:4037a1f9c484c619bb6260d65b54c03168927b7c
-
linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
sha:c0b01d0eaf8ba4a85ed963b031795ab09964bdd2
-
linux-generic-hwe-16.04_4.15.0.228.163_amd64.deb
sha:e435107bdb100f8750eb1bd0050ccbc1de064d4e
-
linux-headers-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_all.deb
sha:7471f008f3b1e02fa26fed3afb9b7402f0f213b8
-
linux-headers-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:2e68fd2a259c77c6a5b0d03e652b164e5e46bf49
-
linux-headers-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:9d7ac34a8945a94556c52e2b576f4bbb8a9480c5
-
linux-headers-generic-hwe-16.04_4.15.0.228.163_amd64.deb
sha:9c08833b0de8dfb47c286eea87201d2181af47dc
-
linux-headers-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
sha:4d4e7597510cb2632bff5cfe4eb5d4ab1d76cd54
-
linux-hwe-cloud-tools-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_amd64.deb
sha:9a4a9b1fad99e1a7eec956ab679156c1fe81552c
-
linux-hwe-tools-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_amd64.deb
sha:5a8216f5051e90534ea5cfbed331afd5e97df152
-
linux-image-generic-hwe-16.04_4.15.0.228.163_amd64.deb
sha:3ea20921e63500b49f45b08b7e3aff5ba90c8b0e
-
linux-image-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
sha:69872cad0eed1a46436c05fe3996de8b0c6e0dbd
-
linux-image-unsigned-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:ffc88eb9676872bd418fff3ec1bb6074cf29e180
-
linux-image-unsigned-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:050a41e7f15722d5736b1fd7c77afa15df2d1819
-
linux-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
sha:e50d7f35739a7194322651ec2990964f184d0990
-
linux-modules-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:1c1eca5277a2f86200d0db8a00ef66e22bffdee8
-
linux-modules-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:76d0c98ef332bf9179408b2b2e8a5d8d28f3b008
-
linux-modules-extra-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:533a606f2a8843442094cfb2ebf7d75e64ad0688
-
linux-source-4.15.0_4.15.0-228.239~16.04.1_all.deb
sha:a17b12a703f2529e9742953cbad72c88338f7229
-
linux-tools-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
sha:5338e1d2e7a7a4646993f1f5a30cc22ef48c711e
-
linux-tools-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
sha:17ec2c12a3a949c5776b279afd116604b0bee3a8
-
linux-tools-generic-hwe-16.04_4.15.0.228.163_amd64.deb
sha:e9cbd12a1d9be74a32068d81725abc56564f3ba8
-
linux-tools-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
sha:f56bb6f60c4d9b2fc6696d3c1d875ac12daed0a6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.