Release date:
2024-10-01 20:53:25 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-26752
- l2tp: pass correct message length to ip6_append_data
* CVE-url: https://ubuntu.com/security/CVE-2023-52527
- ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
* CVE-url: https://ubuntu.com/security/CVE-2024-43882
- exec: Fix ToCToU between perm check and set-uid/gid usage
* CVE-url: https://ubuntu.com/security/CVE-2022-48943
- KVM: x86/mmu: make apf token non-zero to fix bug
* CVE-url: https://ubuntu.com/security/CVE-2024-38630
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger
* CVE-url: https://ubuntu.com/security/CVE-2024-44987
- ipv6: prevent UAF in ip6_send_skb()
* Bionic update: upstream stable patchset 2022-03-04 (LP: #1963717) // CVE-
url: https://ubuntu.com/security/CVE-2022-48742
- rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
* CVE-url: https://ubuntu.com/security/CVE-2024-44940
- fou: remove warn in gue_gro_receive on unsupported protocol
* CVE-url: https://ubuntu.com/security/CVE-2024-41059
- hfsplus: fix uninit-value in copy_name
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47576
- scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
* CVE-url: https://ubuntu.com/security/CVE-2024-46673
- scsi: aacraid: Fix double-free on probe failure
* CVE-url: https://ubuntu.com/security/CVE-2024-42271
- net/iucv: fix use after free in iucv_sock_close()
* Bionic update: upstream stable patchset 2022-04-13 (LP: #1968932) // CVE-
url: https://ubuntu.com/security/CVE-2022-48919
- cifs: fix double free race when mount fails in cifs_get_root()
* CVE-url: https://ubuntu.com/security/CVE-2024-43858
- jfs: Fix array-index-out-of-bounds in diFree
* CVE-url: https://ubuntu.com/security/CVE-2024-41071
- wifi: mac80211: Avoid address calculations via out of bounds array indexing
* CVE-url: https://ubuntu.com/security/CVE-2024-42301
- dev/parport: fix the array out-of-bounds risk
* CVE-url: https://ubuntu.com/security/CVE-2024-46674
- usb: dwc3: st: fix probed platform device ref count on probe error path
* CVE-url: https://ubuntu.com/security/CVE-2024-43900
- media: xc2028: avoid use-after-free in load_firmware_cb()
* CVE-url: https://ubuntu.com/security/CVE-2024-42284
- tipc: Return non-zero value from tipc_udp_addr2str() on error
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47589
- igbvf: fix double free in `igbvf_probe`
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47600
- dm btree remove: fix use after free in rebalance_children()
* CVE-url: https://ubuntu.com/security/CVE-2024-44998
- atm: idt77252: prevent use after free in dequeue_rx()
* CVE-url: https://ubuntu.com/security/CVE-2024-42280
- mISDN: Fix a use after free in hfcmulti_tx()
* CVE-url: https://ubuntu.com/security/CVE-2024-42094
- net/iucv: Avoid explicit cpumask var allocation on stack
* CVE-url: https://ubuntu.com/security/CVE-2024-39499
- vmci: prevent speculation leaks by sanitizing event in event_deliver()
* CVE-url: https://ubuntu.com/security/CVE-2024-42105
- nilfs2: fix inode number range checks
* CVE-url: https://ubuntu.com/security/CVE-2024-40988
- drm/radeon: fix UBSAN warning in kv_dpm.c
* CVE-url: https://ubuntu.com/security/CVE-2024-40916
- drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found
* CVE-url: https://ubuntu.com/security/CVE-2024-40904
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
* CVE-url: https://ubuntu.com/security/CVE-2024-42106
- inet_diag: Initialize pad field in struct inet_diag_req_v2
* CVE-url: https://ubuntu.com/security/CVE-2024-42145
- IB/core: Implement a limit on UMAD receive List
* CVE-url: https://ubuntu.com/security/CVE-2024-40932
- drm/exynos/vidi: fix memory leak in .get_modes()
* CVE-url: https://ubuntu.com/security/CVE-2024-41006
- netrom: Fix a memory leak in nr_heartbeat_expiry()
* CVE-url: https://ubuntu.com/security/CVE-2024-40943
- ocfs2: fix races between hole punching and AIO+DIO
* CVE-url: https://ubuntu.com/security/CVE-2024-36894
- usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete
* CVE-url: https://ubuntu.com/security/CVE-2024-42115
- jffs2: Fix potential illegal address access in jffs2_free_inode
* CVE-url: https://ubuntu.com/security/CVE-2024-41035
- USB: core: Fix duplicate endpoint bug by clearing reserved bits in the
descriptor
* CVE-url: https://ubuntu.com/security/CVE-2024-41097
- usb: atm: cxacru: fix endpoint checking in cxacru_bind()
* CVE-url: https://ubuntu.com/security/CVE-2024-39501
- drivers: core: synchronize really_probe() and dev_uevent()
* CVE-url: https://ubuntu.com/security/CVE-2024-40984
- ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is
fine."
* CVE-url: https://ubuntu.com/security/CVE-2024-40987
- drm/amdgpu: fix UBSAN warning in kv_dpm.c
* CVE-url: https://ubuntu.com/security/CVE-2024-42097
- ALSA: emux: improve patch ioctl data validation
* CVE-url: https://ubuntu.com/security/CVE-2024-42090
- pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
* CVE-url: https://ubuntu.com/security/CVE-2024-40942
- wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects
* CVE-url: https://ubuntu.com/security/CVE-2024-40981
- batman-adv: bypass empty buckets in batadv_purge_orig_ref()
* CVE-url: https://ubuntu.com/security/CVE-2024-40959
- xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
* CVE-url: https://ubuntu.com/security/CVE-2024-42089
- ASoC: fsl-asoc-card: set priv->pdev before using it
* CVE-url: https://ubuntu.com/security/CVE-2024-42101
- drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
* CVE-url: https://ubuntu.com/security/CVE-2024-40980
- drop_monitor: replace spin_lock by raw_spin_lock
* CVE-url: https://ubuntu.com/security/CVE-2024-42084
- ftruncate: pass a signed offset
* CVE-url: https://ubuntu.com/security/CVE-2024-42096
- x86: stop playing stack games in profile_pc()
* CVE-url: https://ubuntu.com/security/CVE-2024-38619
- usb-storage: alauda: Check whether the media is initialized
* CVE-url: https://ubuntu.com/security/CVE-2024-42102
- mm: avoid overflows in dirty throttling logic
* CVE-url: https://ubuntu.com/security/CVE-2024-41044
- ppp: reject claimed-as-LCP but actually malformed packets
* Bionic update: upstream stable patchset 2022-02-11 (LP: #1960681) // CVE-
url: https://ubuntu.com/security/CVE-2024-41044
- ppp: ensure minimum packet size in ppp_write()
* CVE-url: https://ubuntu.com/security/CVE-2024-40905
- ipv6: fix possible race in __fib6_drop_pcpu_from()
* CVE-url: https://ubuntu.com/security/CVE-2023-52803
- SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
* CVE-url: https://ubuntu.com/security/CVE-2024-42104
- nilfs2: add missing check for inode numbers on directory entries
* CVE-url: https://ubuntu.com/security/CVE-2024-42148
- bnx2x: Fix multiple UBSAN array-index-out-of-bounds
* CVE-url: https://ubuntu.com/security/CVE-2024-41046
- net: ethernet: lantiq_etop: fix double free in detach
* CVE-url: https://ubuntu.com/security/CVE-2024-38538
- net: bridge: xmit: make sure we have at least eth header len bytes
Updated packages:
-
linux-buildinfo-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:af03b1ada1b561f670082623d5d0f33ac1ad395d
-
linux-buildinfo-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:7391d951707cd49b7ea536c518f2e57c82b9186a
-
linux-cloud-tools-4.4.0-265-tuxcare.els36_4.4.0-265.299_amd64.deb
sha:6266fbfc99a6e26b82519a32728a4d1363c6bd29
-
linux-cloud-tools-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:5a0a5d971bc16de57c6345814387418d06763e38
-
linux-cloud-tools-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:9aad94b4cdbba79c391bd68a4daf243d82ade190
-
linux-cloud-tools-common_4.4.0-265.299_all.deb
sha:edaefbbc0bd389cc59e85e0b43a95bf1f7fc17a8
-
linux-cloud-tools-generic_4.4.0.265.299_amd64.deb
sha:a202777494e2777fe69882ff5e3c5e4720ebd8c6
-
linux-cloud-tools-lowlatency_4.4.0.265.299_amd64.deb
sha:ed12710ccee379f941efd626967303c4433896f1
-
linux-crashdump_4.4.0.265.299_amd64.deb
sha:aad20816756ab20f428ff6f38027d2f122bdd027
-
linux-doc_4.4.0-265.299_all.deb
sha:9548c0f288962d07cf6433910915d544b966bf4f
-
linux-generic_4.4.0.265.299_amd64.deb
sha:1e9d045db810227f8e1ebad1e6fd7c2b8a6680fe
-
linux-headers-4.4.0-265-tuxcare.els36_4.4.0-265.299_all.deb
sha:650d37e0a21a6217a7f2e2a61493e2a8e03c24c8
-
linux-headers-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:6c9be63ee66539cab9ac11c248426002a7f98eb3
-
linux-headers-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:230aebbb1e402c756ce9153f3f04d439756c51e4
-
linux-headers-generic_4.4.0.265.299_amd64.deb
sha:0f39443810d1452fd4a8ede831fed60192d5c77e
-
linux-headers-lowlatency_4.4.0.265.299_amd64.deb
sha:f665b2f04a4dc1a8652a4b339fb12bab7ea3ff35
-
linux-image-generic_4.4.0.265.299_amd64.deb
sha:f943352053861f5b8c252a6c8b317eaba9d37403
-
linux-image-lowlatency_4.4.0.265.299_amd64.deb
sha:24a5a332e0656716588ec75cc096131ca751e0d2
-
linux-image-unsigned-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:c279f0523e8a86d741af68b0c44ee368fada1fe0
-
linux-image-unsigned-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:7375f5469646b6e33b4be36fd29c10f2af1e7dc0
-
linux-libc-dev_4.4.0-265.299_amd64.deb
sha:69f6b554d1e8de095e6f2dbbfb8c1eda1292dc4b
-
linux-lowlatency_4.4.0.265.299_amd64.deb
sha:0e15a6a12bcbe19268d84ccaea668018526d7831
-
linux-modules-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:833b90437ee56634162987d2340c0e7b835c0158
-
linux-modules-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:9af7b1a0f9f97ffaeba8a0fe34751ee80b270f36
-
linux-modules-extra-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:a3d9aafb1e6e01ac1a13c38455e7a4ee380841c2
-
linux-source_4.4.0.265.299_all.deb
sha:1b17260d64c6150f7eb6f4d1baab32d26e1958d5
-
linux-source-4.4.0_4.4.0-265.299_all.deb
sha:63ee38d39755b66765f0d7aa5f05d1599c358798
-
linux-tools-4.4.0-265-tuxcare.els36_4.4.0-265.299_amd64.deb
sha:67c6d6628706a19446eb45ef585b588d80afd232
-
linux-tools-4.4.0-265-tuxcare.els36-generic_4.4.0-265.299_amd64.deb
sha:8ff44c7b6f0da9fc33489ba8b8ab44ef8c5e5bf0
-
linux-tools-4.4.0-265-tuxcare.els36-lowlatency_4.4.0-265.299_amd64.deb
sha:c129e3d525a74269dc0c9d78b7eeb94158da40a5
-
linux-tools-common_4.4.0-265.299_all.deb
sha:e237f2b902afce921c8b9392c3c76c8070024332
-
linux-tools-generic_4.4.0.265.299_amd64.deb
sha:2ca82c500cc82c37919117e66af86ccf3c0efb7b
-
linux-tools-host_4.4.0-265.299_all.deb
sha:80f2d0270a674f515ad3dd7574a9b55882c4f647
-
linux-tools-lowlatency_4.4.0.265.299_amd64.deb
sha:7ee6c03ec5710e6fdc64e182df509f3d800da448
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.