Release date:
2025-02-07 19:43:04 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-38553/CVE-2024-38597
- netpoll: make ndo_poll_controller() optional
- bonding: use netpoll_poll_dev() helper
- netpoll: do not test NAPI_STATE_SCHED in poll_one_napi()
* CVE-url: https://ubuntu.com/security/CVE-2024-38597
- eth: sungem: remove .ndo_poll_controller to avoid deadlocks
* CVE-url: https://ubuntu.com/security/CVE-2024-38553
- net: fec: remove .ndo_poll_controller to avoid deadlocks
* CVE-url: https://ubuntu.com/security/CVE-2024-41066
- ibmvnic: Add tx check to prevent skb leak
* CVE-url: https://ubuntu.com/security/CVE-2024-40982
- ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
* CVE-url: https://ubuntu.com/security/CVE-2024-50154
- tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
* CVE-url: https://ubuntu.com/security/CVE-2024-56595
- jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2024-57896
- btrfs: fix hang during unmount when stopping a space reclaim worker
- btrfs: wait for fixup workers before stopping cleaner kthread during umount
- btrfs: flush delalloc workers queue before stopping cleaner kthread during
unmount
* CVE-url: https://ubuntu.com/security/CVE-2024-56598
- jfs: array-index-out-of-bounds fix in dtReadFirst
* CVE-url: https://ubuntu.com/security/CVE-2024-56596
- jfs: fix array-index-out-of-bounds in jfs_readdir
* Bionic update: upstream stable patchset 2022-01-25 (LP: #1959033) // CVE-
url: https://ubuntu.com/security/CVE-2021-47485
- IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
* CVE-url: https://ubuntu.com/security/CVE-2024-56602
- net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-56601
- net: inet: do not leave a dangling sk pointer in inet_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-56600
- sock: struct proto hash function may error
- net: inet6: do not leave a dangling sk pointer in inet6_create()
* CVE-url: https://ubuntu.com/security/CVE-2023-52818
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7
* CVE-url: https://ubuntu.com/security/CVE-2024-35887
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer
* Bionic update: upstream stable patchset 2021-11-02 (LP: #1949512) // CVE-
url: https://ubuntu.com/security/CVE-2021-47404
- HID: betop: fix slab-out-of-bounds Write in betop_probe
* Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE-
url: https://ubuntu.com/security/CVE-2021-47254
- gfs2: Fix use-after-free in gfs2_glock_shrink_scan
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47506
- nfsd: fix use-after-free due to delegation race
* CVE-url: https://ubuntu.com/security/CVE-2024-56606
- af_packet: avoid erroring out after sock_init_data() in packet_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53141
- netfilter: ipset: add missing range check in bitmap_ip_uadt
* Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE-
url: https://ubuntu.com/security/CVE-2021-47280
- drm: Fix use-after-free read in drm_getunique()
* Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE-
url: https://ubuntu.com/security/CVE-2021-47235
- net: ethernet: fix potential use-after-free in ec_bhf_remove
* Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE-
url: https://ubuntu.com/security/CVE-2021-47309
- net: validate lwtstate->data before returning from skb_tunnel_info()
* Bionic update: upstream stable patchset 2022-01-06 (LP: #1956614) // CVE-
url: https://ubuntu.com/security/CVE-2021-47549
- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
* CVE-url: https://ubuntu.com/security/CVE-2024-53165
- sh: intc: Fix use-after-free bug in register_intc_controller()
* CVE-url: https://ubuntu.com/security/CVE-2024-56603
- net: af_can: do not leave a dangling sk pointer in can_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53173
- NFSv4.0: Fix a use-after-free problem in the asynchronous open()
* Bionic update: upstream stable patchset 2022-01-11 (LP: #1957113) // CVE-
url: https://ubuntu.com/security/CVE-2021-47500
- iio: mma8452: Fix trigger reference couting
* CVE-url: https://ubuntu.com/security/CVE-2024-26996
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error
* Bionic update: upstream stable patchset 2021-12-03 (LP: #1953202) // CVE-
url: https://ubuntu.com/security/CVE-2021-47483
- regmap: Fix possible double-free in regcache_rbtree_exit()
* CVE-url: https://ubuntu.com/security/CVE-2024-56650
- netfilter: x_tables: fix LED ID check in led_tg_check()
* CVE-url: https://ubuntu.com/security/CVE-2024-53227
- scsi: bfa: Fix use-after-free in bfad_im_module_exit()
* CVE-url: https://ubuntu.com/security/CVE-2024-53155
- ocfs2: fix uninitialized value in ocfs2_file_read_iter()
* CVE-url: https://ubuntu.com/security/CVE-2024-56605
- Bluetooth: L2CAP: do not leave dangling sk pointer on error in
l2cap_sock_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53156
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
* CVE-url: https://ubuntu.com/security/CVE-2023-52741
- cifs: Fix use-after-free in rdata->read_into_pages()
* CVE-url: https://ubuntu.com/security/CVE-2024-56759
- btrfs: fix use-after-free when COWing tree bock and tracing is enabled
* CVE-url: https://ubuntu.com/security/CVE-2024-56604
- Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
* CVE-url: https://ubuntu.com/security/CVE-2024-53142
- initramfs: avoid filename buffer overrun
* CVE-url: https://ubuntu.com/security/CVE-2024-56631
- scsi: sg: Fix slab-use-after-free read in sg_release()
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47334
- misc/libmasm/module: Fix two use after free in ibmasm_init_one
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47355
- atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
* Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE-
url: https://ubuntu.com/security/CVE-2021-47245
- netfilter: synproxy: Fix out of bounds when parsing TCP options
* CVE-url: https://ubuntu.com/security/CVE-2021-47191
- scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
* Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE-
url: https://ubuntu.com/security/CVE-2021-47288
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
* CVE-url: https://ubuntu.com/security/CVE-2023-52478
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
* CVE-url: https://ubuntu.com/security/CVE-2024-36924
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
* CVE-url: https://ubuntu.com/security/CVE-2023-52476
- perf/x86/lbr: Filter vsyscall addresses
* CVE-url: https://ubuntu.com/security/CVE-2023-52488
- regmap: Add regmap_noinc_read API
- regmap: Add regmap_noinc_write API
- serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO
Updated packages:
-
linux-buildinfo-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:8bfbf4f9289c8cdff97cb8dd8472a0e2d3beed4a
-
linux-buildinfo-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:04ad03c2ad50ff0bf05c3c1fe5c1b11fd47d50a3
-
linux-cloud-tools-4.4.0-270-tuxcare.els41_4.4.0-270.304_amd64.deb
sha:b108430cc8df8ea9c6d729a8fa196590a1f1aa24
-
linux-cloud-tools-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:e69bddc664c62c5b5a8c63d5ded35bf882b7a72b
-
linux-cloud-tools-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:182ad906f74bd16d2e968e7b1a9d3d5553085743
-
linux-cloud-tools-common_4.4.0-270.304_all.deb
sha:f45e75f6fbc7f4e45b2b44f14e9a0b2136fddf3f
-
linux-cloud-tools-generic_4.4.0.270.304_amd64.deb
sha:20acc0dce2ed77d94f68f20675861b467c148e0c
-
linux-cloud-tools-lowlatency_4.4.0.270.304_amd64.deb
sha:d0dada35c17224ad7f8a3da67808d80ac4f5cb9d
-
linux-crashdump_4.4.0.270.304_amd64.deb
sha:e96cf7fba9088e33d5ecf8f12ff9a2100f8495b9
-
linux-doc_4.4.0-270.304_all.deb
sha:c611933660042d02e151bdb76bce1bc29d78e9e1
-
linux-generic_4.4.0.270.304_amd64.deb
sha:5c919ea32b8cebe8d7f0762d96f0c38c9003e1ae
-
linux-headers-4.4.0-270-tuxcare.els41_4.4.0-270.304_all.deb
sha:0a6db06a19c7c762a2683b63153082f82b804053
-
linux-headers-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:e41f1fe830d473a6c3421b1cc325028a96a27cb4
-
linux-headers-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:cee71e644fea8a02f241857dfc671f35228688e7
-
linux-headers-generic_4.4.0.270.304_amd64.deb
sha:401c18e44d735dd5268d3b9c7bad9187703e723a
-
linux-headers-lowlatency_4.4.0.270.304_amd64.deb
sha:50f5c7d36a5c308130099ff63f2e5177d3f1ea42
-
linux-image-generic_4.4.0.270.304_amd64.deb
sha:28efd66ca4d45e3e08e92aa7e3ebf5ac8e76e9e7
-
linux-image-lowlatency_4.4.0.270.304_amd64.deb
sha:37977649b655537e69580b40a4ac8386598ca283
-
linux-image-unsigned-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:a376ea582fa9ed1fc0145b4c5c48f99218df3fd4
-
linux-image-unsigned-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:90b43f339279e98f2920000792d9252408ba7158
-
linux-libc-dev_4.4.0-270.304_amd64.deb
sha:47f5414aeacf8430790fe85eaf8cbbecfb61107f
-
linux-lowlatency_4.4.0.270.304_amd64.deb
sha:5c97804eb378ef46a076703c371a7531232d94e0
-
linux-modules-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:6087f8f2363b8d7825d2aea4c33982c3bb0d75be
-
linux-modules-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:fbe8d00fbddc178f169fa3a239cef5767857a454
-
linux-modules-extra-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:7fa4112067dfabf0167b909afa5eee4b3360994c
-
linux-source_4.4.0.270.304_all.deb
sha:7cd81d5dd9b2958ccfeb42457cff8c7dbbc34d24
-
linux-source-4.4.0_4.4.0-270.304_all.deb
sha:07ee6d656a8994afda05864131df7ef2348414b9
-
linux-tools-4.4.0-270-tuxcare.els41_4.4.0-270.304_amd64.deb
sha:9952cabcf5804c8a81f3a9b61d2b75dfcf2c0f59
-
linux-tools-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
sha:bf11e4422661ef32a5d27395d33b8563029c799f
-
linux-tools-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
sha:7e8508851d0070e46ad2178102d6426250328144
-
linux-tools-common_4.4.0-270.304_all.deb
sha:c2268e7a424f0cfb58b32ecdf5962ad560e71fbd
-
linux-tools-generic_4.4.0.270.304_amd64.deb
sha:535b3f5c2c3e8acf191a8ad6aac004a759772ed4
-
linux-tools-host_4.4.0-270.304_all.deb
sha:27b9d7141ece9b8e297c504dc3706ab7d6cf52b6
-
linux-tools-lowlatency_4.4.0.270.304_amd64.deb
sha:27fbfd1af475e214a3acbdd9d1821f9b7f0807c6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.