Release date:
2025-01-10 00:50:43 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2021-47466
- mm, slub: fix potential memoryleak in kmem_cache_open()
* CVE-url: https://ubuntu.com/security/CVE-2024-36968
- Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
* Bionic update: upstream stable patchset 2021-06-23 (LP: #1933375) // CVE-
url: https://ubuntu.com/security/CVE-2021-47118
- pid: take a reference when initializing `cad_pid`
* Bionic update: upstream stable patchset 2022-01-25 (LP: #1959033) // CVE-
url: https://ubuntu.com/security/CVE-2021-47086
- phonet/pep: refuse to enable an unbound pipe
* CVE-url: https://ubuntu.com/security/CVE-2023-52507
- nfc: nci: assert requested protocol is valid
* CVE-url: https://ubuntu.com/security/CVE-2024-44944
- netfilter: ctnetlink: use helper function to calculate expect ID
* CVE-url: https://ubuntu.com/security/CVE-2024-35861
- smb: client: fix potential UAF in cifs_debug_files_proc_show()
- smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
* CVE-url: https://ubuntu.com/security/CVE-2024-35863
- smb: client: fix potential UAF in smb2_is_valid_oplock_break()
* CVE-url: https://ubuntu.com/security/CVE-2024-35864
- smb: client: fix potential UAF in smb2_is_valid_lease_break()
* CVE-url: https://ubuntu.com/security/CVE-2024-35867
- smb: client: fix potential UAF in cifs_stats_proc_show()
* CVE-url: https://ubuntu.com/security/CVE-2024-35868
- smb: client: fix potential UAF in cifs_stats_proc_write()
* CVE-url: https://ubuntu.com/security/CVE-2024-35896
- netfilter: validate user input for expected length
* Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE-
url: https://ubuntu.com/security/CVE-2022-48695
- scsi: mpt3sas: Fix use-after-free warning
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47321
- watchdog: Fix possible use-after-free by calling del_timer_sync()
* Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE-
url: https://ubuntu.com/security/CVE-2021-47310
- net: ti: fix UAF in tlan_remove_one
* CVE-url: https://ubuntu.com/security/CVE-2024-27010
- net/sched: Fix mirred deadlock on device recursion
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47353
- udf: Fix NULL pointer dereference in udf_symlink function
* CVE-url: https://ubuntu.com/security/CVE-2024-26961
- mac802154: fix llsec key resources release in mac802154_llsec_key_del
* CVE-url: https://ubuntu.com/security/CVE-2024-26958
- NFS: Allow multiple commit requests in flight per file
- NFS: Fix up commit deadlocks
- nfs: fix UAF in direct writes
* CVE-url: https://ubuntu.com/security/CVE-2024-50115
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
* CVE-url: https://ubuntu.com/security/CVE-2024-50148
- Bluetooth: bnep: fix wild-memory-access in proto_unregister
* CVE-url: https://ubuntu.com/security/CVE-2024-40910
- ax25: Fix refcount imbalance on inbound connections
* CVE-url: https://ubuntu.com/security/CVE-2024-53057
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
* CVE-url: https://ubuntu.com/security/CVE-2024-36952
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
* CVE-url: https://ubuntu.com/security/CVE-2024-50142
- xfrm: validate new SA's prefixlen using SA family when sel.family is unset
* CVE-url: https://ubuntu.com/security/CVE-2024-50256
- netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
* CVE-url: https://ubuntu.com/security/CVE-2021-47501
- i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
* CVE-url: https://ubuntu.com/security/CVE-2023-52574
- team: fix null-ptr-deref when team device type is changed
* Bionic update: upstream stable patchset 2021-06-01 (LP: #1930472) // CVE-
url: https://ubuntu.com/security/CVE-2021-47055
- mtd: require write permissions for locking and badblock ioctls
* CVE-url: https://ubuntu.com/security/CVE-2023-52477
- usb: hub: Guard against accesses to uninitialized BOS descriptors
* CVE-url: https://ubuntu.com/security/CVE-2023-52475
- Input: powermate - fix use-after-free in powermate_config_complete
* CVE-url: https://ubuntu.com/security/CVE-2023-52531
- wifi: iwlwifi: mvm: Fix a memory corruption issue
Updated packages:
-
linux-buildinfo-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:292e4e4ef59c673934c7a8f7f9f32a861bebed33
-
linux-buildinfo-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:94814fe89db41eb6acd7f406a692fcd0bc56aa40
-
linux-cloud-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb
sha:46569a37d87c5224df42187eeb21fe7fc7bd38e4
-
linux-cloud-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:8e429be28c6c72c89b0d02f31cebde93a882e46e
-
linux-cloud-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:f17e8d994036035ade60cd5a5fe8909c4b3fb7ec
-
linux-cloud-tools-common_4.4.0-269.303_all.deb
sha:7493965ef183934fbb7263a3beb38aed8cf7d8f2
-
linux-cloud-tools-generic_4.4.0.269.303_amd64.deb
sha:4c01824bd500fefe5dbd55197817f20fe2590cc3
-
linux-cloud-tools-lowlatency_4.4.0.269.303_amd64.deb
sha:d5a2535d9d4d960ded94025128d924aa495d06fb
-
linux-crashdump_4.4.0.269.303_amd64.deb
sha:825d4929debae60800b1a3f7cad3667499427ebb
-
linux-doc_4.4.0-269.303_all.deb
sha:3332c2d779ff535fd62138a16766578c7d9858c4
-
linux-generic_4.4.0.269.303_amd64.deb
sha:1439552b47a2fbeb4b9c045223c9f7cdc9ab077a
-
linux-headers-4.4.0-269-tuxcare.els40_4.4.0-269.303_all.deb
sha:5d7c7c1f1be81670f173ad00698ce15000c3374a
-
linux-headers-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:67e52693fb0d703aaab18ed20b400531fbe38336
-
linux-headers-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:7fbc8e5ca96770b6d07d983f285fa2c081c32831
-
linux-headers-generic_4.4.0.269.303_amd64.deb
sha:4e84fbf93b1bf3b2d5c9b413c62adc80bf9e334a
-
linux-headers-lowlatency_4.4.0.269.303_amd64.deb
sha:d8fa1e45082d3bd55a96bf1e1d4322bd1b5a0ba1
-
linux-image-generic_4.4.0.269.303_amd64.deb
sha:e7d29628c6d8fc88fb63e46b14876057905830bc
-
linux-image-lowlatency_4.4.0.269.303_amd64.deb
sha:480aa77cd63b0b1272578a3535eee27890d941bb
-
linux-image-unsigned-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:dcf7586d772f83a485b146c677c18bf44d2c65ee
-
linux-image-unsigned-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:63527bc1382bd7ee3e701f979f9c5bc9b2ec8181
-
linux-libc-dev_4.4.0-269.303_amd64.deb
sha:26c2feae6c4081f1a7147607fb85d35580783cb3
-
linux-lowlatency_4.4.0.269.303_amd64.deb
sha:4ffa99ad373e97498d34003482d72ea8b0df4723
-
linux-modules-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:b95eef80fa5e37df0127cace82eab936faae1e96
-
linux-modules-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:9e00ba335bb9eac3b0bbe2d84e93119bbd790b99
-
linux-modules-extra-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:e2a10dd0e521c8b65d53444f7ddb6059e3d309bd
-
linux-source_4.4.0.269.303_all.deb
sha:e2209f2a915cfe6bae082217ae13440677c814c3
-
linux-source-4.4.0_4.4.0-269.303_all.deb
sha:ca3976c1cd03a4421904efacdc65595f565a62ce
-
linux-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb
sha:901ec400818d6f274b8050a80e89be6ee64562ed
-
linux-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
sha:5d8843116aae12269583a88a5bc445b6613b16b2
-
linux-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
sha:e332dd88cbcfc22428311640658554747516fd1e
-
linux-tools-common_4.4.0-269.303_all.deb
sha:8232a745654dac1325760a29647bd97f5b6e7ad7
-
linux-tools-generic_4.4.0.269.303_amd64.deb
sha:7d3a4d45b652c512414716fef25932cc2fee46c5
-
linux-tools-host_4.4.0-269.303_all.deb
sha:58bd0a31cf20765146de36f73746c5db9926a283
-
linux-tools-lowlatency_4.4.0.269.303_amd64.deb
sha:5ba04d8d1d634badde9769b62ff8951f93fa64b3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.