[CLSA-2025:1736470237] Fix of 32 CVEs
Type:
security
Severity:
Important
Release date:
2025-01-10 00:50:43 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2021-47466 - mm, slub: fix potential memoryleak in kmem_cache_open() * CVE-url: https://ubuntu.com/security/CVE-2024-36968 - Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() * Bionic update: upstream stable patchset 2021-06-23 (LP: #1933375) // CVE- url: https://ubuntu.com/security/CVE-2021-47118 - pid: take a reference when initializing `cad_pid` * Bionic update: upstream stable patchset 2022-01-25 (LP: #1959033) // CVE- url: https://ubuntu.com/security/CVE-2021-47086 - phonet/pep: refuse to enable an unbound pipe * CVE-url: https://ubuntu.com/security/CVE-2023-52507 - nfc: nci: assert requested protocol is valid * CVE-url: https://ubuntu.com/security/CVE-2024-44944 - netfilter: ctnetlink: use helper function to calculate expect ID * CVE-url: https://ubuntu.com/security/CVE-2024-35861 - smb: client: fix potential UAF in cifs_debug_files_proc_show() - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() * CVE-url: https://ubuntu.com/security/CVE-2024-35863 - smb: client: fix potential UAF in smb2_is_valid_oplock_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35864 - smb: client: fix potential UAF in smb2_is_valid_lease_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35867 - smb: client: fix potential UAF in cifs_stats_proc_show() * CVE-url: https://ubuntu.com/security/CVE-2024-35868 - smb: client: fix potential UAF in cifs_stats_proc_write() * CVE-url: https://ubuntu.com/security/CVE-2024-35896 - netfilter: validate user input for expected length * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48695 - scsi: mpt3sas: Fix use-after-free warning * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47321 - watchdog: Fix possible use-after-free by calling del_timer_sync() * Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE- url: https://ubuntu.com/security/CVE-2021-47310 - net: ti: fix UAF in tlan_remove_one * CVE-url: https://ubuntu.com/security/CVE-2024-27010 - net/sched: Fix mirred deadlock on device recursion * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47353 - udf: Fix NULL pointer dereference in udf_symlink function * CVE-url: https://ubuntu.com/security/CVE-2024-26961 - mac802154: fix llsec key resources release in mac802154_llsec_key_del * CVE-url: https://ubuntu.com/security/CVE-2024-26958 - NFS: Allow multiple commit requests in flight per file - NFS: Fix up commit deadlocks - nfs: fix UAF in direct writes * CVE-url: https://ubuntu.com/security/CVE-2024-50115 - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory * CVE-url: https://ubuntu.com/security/CVE-2024-50148 - Bluetooth: bnep: fix wild-memory-access in proto_unregister * CVE-url: https://ubuntu.com/security/CVE-2024-40910 - ax25: Fix refcount imbalance on inbound connections * CVE-url: https://ubuntu.com/security/CVE-2024-53057 - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT * CVE-url: https://ubuntu.com/security/CVE-2024-36952 - scsi: lpfc: Move NPIV's transport unregistration to after resource clean up * CVE-url: https://ubuntu.com/security/CVE-2024-50142 - xfrm: validate new SA's prefixlen using SA family when sel.family is unset * CVE-url: https://ubuntu.com/security/CVE-2024-50256 - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() * CVE-url: https://ubuntu.com/security/CVE-2021-47501 - i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc * CVE-url: https://ubuntu.com/security/CVE-2023-52574 - team: fix null-ptr-deref when team device type is changed * Bionic update: upstream stable patchset 2021-06-01 (LP: #1930472) // CVE- url: https://ubuntu.com/security/CVE-2021-47055 - mtd: require write permissions for locking and badblock ioctls * CVE-url: https://ubuntu.com/security/CVE-2023-52477 - usb: hub: Guard against accesses to uninitialized BOS descriptors * CVE-url: https://ubuntu.com/security/CVE-2023-52475 - Input: powermate - fix use-after-free in powermate_config_complete * CVE-url: https://ubuntu.com/security/CVE-2023-52531 - wifi: iwlwifi: mvm: Fix a memory corruption issue
Updated packages:
  • linux-buildinfo-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:292e4e4ef59c673934c7a8f7f9f32a861bebed33
  • linux-buildinfo-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:94814fe89db41eb6acd7f406a692fcd0bc56aa40
  • linux-cloud-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb
    sha:46569a37d87c5224df42187eeb21fe7fc7bd38e4
  • linux-cloud-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:8e429be28c6c72c89b0d02f31cebde93a882e46e
  • linux-cloud-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:f17e8d994036035ade60cd5a5fe8909c4b3fb7ec
  • linux-cloud-tools-common_4.4.0-269.303_all.deb
    sha:7493965ef183934fbb7263a3beb38aed8cf7d8f2
  • linux-cloud-tools-generic_4.4.0.269.303_amd64.deb
    sha:4c01824bd500fefe5dbd55197817f20fe2590cc3
  • linux-cloud-tools-lowlatency_4.4.0.269.303_amd64.deb
    sha:d5a2535d9d4d960ded94025128d924aa495d06fb
  • linux-crashdump_4.4.0.269.303_amd64.deb
    sha:825d4929debae60800b1a3f7cad3667499427ebb
  • linux-doc_4.4.0-269.303_all.deb
    sha:3332c2d779ff535fd62138a16766578c7d9858c4
  • linux-generic_4.4.0.269.303_amd64.deb
    sha:1439552b47a2fbeb4b9c045223c9f7cdc9ab077a
  • linux-headers-4.4.0-269-tuxcare.els40_4.4.0-269.303_all.deb
    sha:5d7c7c1f1be81670f173ad00698ce15000c3374a
  • linux-headers-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:67e52693fb0d703aaab18ed20b400531fbe38336
  • linux-headers-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:7fbc8e5ca96770b6d07d983f285fa2c081c32831
  • linux-headers-generic_4.4.0.269.303_amd64.deb
    sha:4e84fbf93b1bf3b2d5c9b413c62adc80bf9e334a
  • linux-headers-lowlatency_4.4.0.269.303_amd64.deb
    sha:d8fa1e45082d3bd55a96bf1e1d4322bd1b5a0ba1
  • linux-image-generic_4.4.0.269.303_amd64.deb
    sha:e7d29628c6d8fc88fb63e46b14876057905830bc
  • linux-image-lowlatency_4.4.0.269.303_amd64.deb
    sha:480aa77cd63b0b1272578a3535eee27890d941bb
  • linux-image-unsigned-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:dcf7586d772f83a485b146c677c18bf44d2c65ee
  • linux-image-unsigned-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:63527bc1382bd7ee3e701f979f9c5bc9b2ec8181
  • linux-libc-dev_4.4.0-269.303_amd64.deb
    sha:26c2feae6c4081f1a7147607fb85d35580783cb3
  • linux-lowlatency_4.4.0.269.303_amd64.deb
    sha:4ffa99ad373e97498d34003482d72ea8b0df4723
  • linux-modules-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:b95eef80fa5e37df0127cace82eab936faae1e96
  • linux-modules-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:9e00ba335bb9eac3b0bbe2d84e93119bbd790b99
  • linux-modules-extra-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:e2a10dd0e521c8b65d53444f7ddb6059e3d309bd
  • linux-source_4.4.0.269.303_all.deb
    sha:e2209f2a915cfe6bae082217ae13440677c814c3
  • linux-source-4.4.0_4.4.0-269.303_all.deb
    sha:ca3976c1cd03a4421904efacdc65595f565a62ce
  • linux-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb
    sha:901ec400818d6f274b8050a80e89be6ee64562ed
  • linux-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb
    sha:5d8843116aae12269583a88a5bc445b6613b16b2
  • linux-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb
    sha:e332dd88cbcfc22428311640658554747516fd1e
  • linux-tools-common_4.4.0-269.303_all.deb
    sha:8232a745654dac1325760a29647bd97f5b6e7ad7
  • linux-tools-generic_4.4.0.269.303_amd64.deb
    sha:7d3a4d45b652c512414716fef25932cc2fee46c5
  • linux-tools-host_4.4.0-269.303_all.deb
    sha:58bd0a31cf20765146de36f73746c5db9926a283
  • linux-tools-lowlatency_4.4.0.269.303_amd64.deb
    sha:5ba04d8d1d634badde9769b62ff8951f93fa64b3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.