[CLSA-2024:1716271242] Fix of 48 CVEs
Type:
security
Severity:
None
Release date:
2024-05-21 06:00:46 UTC
Description:
[ Ubuntu: 4.15.0-228.239 ] * CVE-url: https://ubuntu.com/security/CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach * CVE-url: https://ubuntu.com/security/CVE-2023-52601 - jfs: Fix memleak in dbAdjCtl * CVE-url: https://ubuntu.com/security/CVE-2024-26801 - Bluetooth: Avoid potential use-after-free in hci_error_reset * CVE-url: https://ubuntu.com/security/CVE-2024-26805 - netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter * CVE-url: https://ubuntu.com/security/CVE-2024-26735 - ipv6: sr: fix possible use-after-free and null-ptr-deref * CVE-url: https://ubuntu.com/security/CVE-2023-52566 - nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() * CVE-url: https://ubuntu.com/security/CVE-2021-46981 - nbd: Fix NULL pointer in flush_workqueue * CVE-url: https://ubuntu.com/security/CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-url: https://ubuntu.com/security/CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-url: https://ubuntu.com/security/CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-url: https://ubuntu.com/security/CVE-2023-52524 - net: nfc: llcp: Add lock when modifying device list * CVE-url: https://ubuntu.com/security/CVE-2021-47173 - misc/uss720: fix memory leak in uss720_probe * CVE-url: https://ubuntu.com/security/CVE-2024-26910 - timers: Get rid of del_singleshot_timer_sync() - timers: Update kernel-doc for various functions - timers: Use del_timer_sync() even on UP - timers: Rename del_timer_sync() to timer_delete_sync() - timers: Rename del_timer() to timer_delete() - timers: Silently ignore timers with a NULL function - timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode - timers: Add shutdown mechanism to the internal functions - timers: Provide timer_shutdown[_sync]() - netfilter: ipset: fix performance regression in swap operation * CVE-url: https://ubuntu.com/security/CVE-2023-52595 - rt2x00: clear IV's on start to fix AP mode regression - wifi: rt2x00: restart beacon queue when hardware reset * CVE-url: https://ubuntu.com/security/CVE-2023-52617 - switchtec: Improve MRPC efficiency by enabling write combining - switchtec: Add MRPC DMA mode support - PCI: switchtec: Fix stdev_release() crash after surprise hot remove * CVE-url: https://ubuntu.com/security/CVE-2024-26696 - nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() * CVE-url: https://ubuntu.com/security/CVE-2024-26685 - nilfs2: fix potential bug in end_buffer_async_write * CVE-url: https://ubuntu.com/security/CVE-2024-26625 - llc: call sock_orphan() at release time * CVE-url: https://ubuntu.com/security/CVE-2023-52615 - hwrng: core - Fix page fault dead lock on mmap-ed hwrng * CVE-url: https://ubuntu.com/security/CVE-2023-52486 - drm: Don't unref the same fb many times by mistake due to deadlock handling * CVE-url: https://ubuntu.com/security/CVE-2024-26920 - tracing/trigger: Fix to return error if failed to alloc snapshot * CVE-url: https://ubuntu.com/security/CVE-2024-26697 - nilfs2: fix data corruption in dsync block recovery for small block sizes * CVE-url: https://ubuntu.com/security/CVE-2024-26679 - inet: read sk->sk_family once in inet_recv_error() * CVE-url: https://ubuntu.com/security/CVE-2023-52622 - ext4: remove unnecessary check from alloc_flex_gd() - ext4: avoid online resizing failures due to oversized flex bg * CVE-url: https://ubuntu.com/security/CVE-2024-26635 - llc: Drop support for ETH_P_TR_802_2. * CVE-url: https://ubuntu.com/security/CVE-2023-52594 - wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() * CVE-url: https://ubuntu.com/security/CVE-2023-52583 - ceph: fix deadlock or deadcode of misusing dget() * CVE-url: https://ubuntu.com/security/CVE-2024-26720 - mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again * CVE-url: https://ubuntu.com/security/CVE-2024-26825 - nfc: nci: free rx_data_reassembly skb on NCI device cleanup * CVE-url: https://ubuntu.com/security/CVE-2024-26671 - blk-mq: fix IO hang from sbitmap wakeup race * CVE-url: https://ubuntu.com/security/CVE-2024-26675 - ppp_async: limit MRU to 64K * CVE-url: https://ubuntu.com/security/CVE-2024-26663 - tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() * CVE-url: https://ubuntu.com/security/CVE-2023-52602 - jfs: fix slab-out-of-bounds Read in dtSearch * CVE-url: https://ubuntu.com/security/CVE-2024-26704 - ext4: fix double-free of blocks due to wrong extents moved_len * CVE-url: https://ubuntu.com/security/CVE-2023-52619 - pstore/ram: Fix crash when setting number of cpus to an odd number * CVE-url: https://ubuntu.com/security/CVE-2024-26636 - llc: make llc_ui_sendmsg() more robust against bonding changes * CVE-url: https://ubuntu.com/security/CVE-2023-52587 - IB/ipoib: Fix mcast list locking * CVE-url: https://ubuntu.com/security/CVE-2023-52601 // CVE-url: https://ubuntu.com/security/CVE-2023-52604 - jfs: fix array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2023-52604 - FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2023-52623 - SUNRPC: Fix a suspicious RCU usage warning * CVE-url: https://ubuntu.com/security/CVE-2023-52599 - jfs: fix array-index-out-of-bounds in diNewExt * CVE-url: https://ubuntu.com/security/CVE-2024-26884 - bpf: Fix hashtab overflow check on 32-bit arches * CVE-url: https://ubuntu.com/security/CVE-2024-26883 - bpf: Fix stackmap overflow check on 32-bit arches * CVE-url: https://ubuntu.com/security/CVE-2024-26882 - net: add atomic_long_t to net_device_stats fields - net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() * CVE-url: https://ubuntu.com/security/CVE-2024-26908 - x86/xen: Add some null pointer checking to smp.c * CVE-url: https://ubuntu.com/security/CVE-2024-26904 - btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve * CVE-url: https://ubuntu.com/security/CVE-2024-26903 - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security * CVE-url: https://ubuntu.com/security/CVE-2024-26901 - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak * CVE-url: https://ubuntu.com/security/CVE-2024-26898 - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
Updated packages:
  • linux-buildinfo-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:6cb9c119ce21ad555abd5658a132bb5644af784f
  • linux-buildinfo-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:c0e169db6f6df1a7ea99552df2ae6df7903f03ed
  • linux-cloud-tools-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:667142453267f516c17d8e3600fdd3c6326eecfe
  • linux-cloud-tools-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:8be034a27b08bf4391f293795d8131bbcce81bfa
  • linux-cloud-tools-generic-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:4037a1f9c484c619bb6260d65b54c03168927b7c
  • linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:c0b01d0eaf8ba4a85ed963b031795ab09964bdd2
  • linux-generic-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:e435107bdb100f8750eb1bd0050ccbc1de064d4e
  • linux-headers-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_all.deb
    sha:7471f008f3b1e02fa26fed3afb9b7402f0f213b8
  • linux-headers-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:2e68fd2a259c77c6a5b0d03e652b164e5e46bf49
  • linux-headers-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:9d7ac34a8945a94556c52e2b576f4bbb8a9480c5
  • linux-headers-generic-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:9c08833b0de8dfb47c286eea87201d2181af47dc
  • linux-headers-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:4d4e7597510cb2632bff5cfe4eb5d4ab1d76cd54
  • linux-hwe-cloud-tools-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_amd64.deb
    sha:9a4a9b1fad99e1a7eec956ab679156c1fe81552c
  • linux-hwe-tools-4.15.0-228-tuxcare.els26_4.15.0-228.239~16.04.1_amd64.deb
    sha:5a8216f5051e90534ea5cfbed331afd5e97df152
  • linux-image-generic-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:3ea20921e63500b49f45b08b7e3aff5ba90c8b0e
  • linux-image-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:69872cad0eed1a46436c05fe3996de8b0c6e0dbd
  • linux-image-unsigned-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:ffc88eb9676872bd418fff3ec1bb6074cf29e180
  • linux-image-unsigned-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:050a41e7f15722d5736b1fd7c77afa15df2d1819
  • linux-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:e50d7f35739a7194322651ec2990964f184d0990
  • linux-modules-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:1c1eca5277a2f86200d0db8a00ef66e22bffdee8
  • linux-modules-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:76d0c98ef332bf9179408b2b2e8a5d8d28f3b008
  • linux-modules-extra-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:533a606f2a8843442094cfb2ebf7d75e64ad0688
  • linux-source-4.15.0_4.15.0-228.239~16.04.1_all.deb
    sha:a17b12a703f2529e9742953cbad72c88338f7229
  • linux-tools-4.15.0-228-tuxcare.els26-generic_4.15.0-228.239~16.04.1_amd64.deb
    sha:5338e1d2e7a7a4646993f1f5a30cc22ef48c711e
  • linux-tools-4.15.0-228-tuxcare.els26-lowlatency_4.15.0-228.239~16.04.1_amd64.deb
    sha:17ec2c12a3a949c5776b279afd116604b0bee3a8
  • linux-tools-generic-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:e9cbd12a1d9be74a32068d81725abc56564f3ba8
  • linux-tools-lowlatency-hwe-16.04_4.15.0.228.163_amd64.deb
    sha:f56bb6f60c4d9b2fc6696d3c1d875ac12daed0a6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.