[CLSA-2024:1716980992] Fix of 17 CVEs
Type:
security
Severity:
None
Release date:
2024-05-29 11:09:55 UTC
Description:
[ Ubuntu: 4.15.0-229.240 ] * CVE-url: https://ubuntu.com/security/CVE-2022-48673 - net/smc: Fix possible access to freed memory in link clear * CVE-url: https://ubuntu.com/security/CVE-2024-35997 - HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up * CVE-url: https://ubuntu.com/security/CVE-2023-52752 - smb: client: fix use-after-free bug in cifs_debug_data_proc_show() * CVE-url: https://ubuntu.com/security/CVE-2022-48687 - ipv6: sr: fix out-of-bounds read when setting HMAC data. * CVE-url: https://ubuntu.com/security/CVE-2024-27013 - tun: limit printing rate when illegal packet received by tun dev * CVE-url: https://ubuntu.com/security/CVE-2024-27019 - netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() * CVE-url: https://ubuntu.com/security/CVE-2023-52809 - scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() * CVE-url: https://ubuntu.com/security/CVE-2024-26934 - USB: core: Fix deadlock in usb_deauthorize_interface() * CVE-url: https://ubuntu.com/security/CVE-2024-35978 - Bluetooth: Fix memory leak in hci_req_sync_complete() * CVE-url: https://ubuntu.com/security/CVE-2023-52753 - drm/amd/display: Avoid NULL dereference of timing generator * CVE-url: https://ubuntu.com/security/CVE-2023-52806 - ALSA: hda: Fix possible null-ptr-deref when assigning a stream * CVE-url: https://ubuntu.com/security/CVE-2024-35984 - i2c: smbus: fix NULL function pointer dereference * CVE-url: https://ubuntu.com/security/CVE-2023-52817 - drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL * CVE-url: https://ubuntu.com/security/CVE-2024-27020 - netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() * CVE-url: https://ubuntu.com/security/CVE-2024-35982 - batman-adv: Avoid infinite loop trying to resize local TT * CVE-url: https://ubuntu.com/security/CVE-2024-26929 - scsi: qla2xxx: Fix double free of fcport * CVE-url: https://ubuntu.com/security/CVE-2023-52802 - iio: adc: stm32-adc: harden against NULL pointer deref in stm32_adc_probe()
Updated packages:
  • linux-buildinfo-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:af37395f3575a23e2ce8d2427bb615c1ecd76060
  • linux-buildinfo-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:ddaa8566daeb03c271d187f3dbc78d6c897f48d1
  • linux-cloud-tools-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:48e3d036096c4233265a85df77aace4fe078d4f7
  • linux-cloud-tools-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:1c06112606bd9cc960d42f42a825ed73870adeb2
  • linux-cloud-tools-generic-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:fb3508f455f480bdb9a14d7c93bade804593f59a
  • linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:ea284ab37462fcda5afe09741481fec2321f8de3
  • linux-generic-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:0e8f20943ec9589a158fac76822f1e723fcd53f6
  • linux-headers-4.15.0-229-tuxcare.els27_4.15.0-229.240~16.04.1_all.deb
    sha:24e4893aa29e100b3dd8b2302b811edd3ea3ffb0
  • linux-headers-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:c7db9f0be131bf9837527bf6750b383e287d36fb
  • linux-headers-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:03f3a06af725b38234706eb1f186eb8a631c915d
  • linux-headers-generic-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:5f26c23c0377cc535a5ad1c26ef92f2025156847
  • linux-headers-lowlatency-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:a298e3d8f441f744270ebd05baa4ffb3afc41f97
  • linux-hwe-cloud-tools-4.15.0-229-tuxcare.els27_4.15.0-229.240~16.04.1_amd64.deb
    sha:fc12bac82f91191b5f05f40a69509d00939b93a0
  • linux-hwe-tools-4.15.0-229-tuxcare.els27_4.15.0-229.240~16.04.1_amd64.deb
    sha:d32dafc21e00fdd0aea8c44ab6ac616644cdb193
  • linux-image-generic-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:f7a3111ed281eca2d3a9bb6872d0bee52945efc2
  • linux-image-lowlatency-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:e9806dd48c000ad81d96165d254949455a4e827e
  • linux-image-unsigned-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:a02e213b87817968ebf946623b8b267d3935412b
  • linux-image-unsigned-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:61758b4e1830b87a14390cf8b664fe89530e63a3
  • linux-lowlatency-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:6eb87a12c33ea5b95f3380666090377067bca847
  • linux-modules-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:c8e6c32d7da0a795b8e6289443d94b7fc9082f01
  • linux-modules-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:a5e89dda69f1e962a01b733d6398010876864055
  • linux-modules-extra-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:411c9294ddd4c513a161d2c11becc02a8aed1441
  • linux-source-4.15.0_4.15.0-229.240~16.04.1_all.deb
    sha:b674d4c352c21c476ce0859bab5dc47d01c67ad1
  • linux-tools-4.15.0-229-tuxcare.els27-generic_4.15.0-229.240~16.04.1_amd64.deb
    sha:9575e07484eea2c839713001f8295951f43f5b59
  • linux-tools-4.15.0-229-tuxcare.els27-lowlatency_4.15.0-229.240~16.04.1_amd64.deb
    sha:f6c81dd24f6c2496343965fe7b90071c7b6c1afe
  • linux-tools-generic-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:825df4d669142fb6cde14caccaaab8a6064ca2c1
  • linux-tools-lowlatency-hwe-16.04_4.15.0.229.164_amd64.deb
    sha:15b888622cc4c55413dbe43815d38b20b397095a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.