[CLSA-2025:1738957378] Fix of 49 CVEs
Type:
security
Severity:
Important
Release date:
2025-02-07 19:43:04 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-38553/CVE-2024-38597 - netpoll: make ndo_poll_controller() optional - bonding: use netpoll_poll_dev() helper - netpoll: do not test NAPI_STATE_SCHED in poll_one_napi() * CVE-url: https://ubuntu.com/security/CVE-2024-38597 - eth: sungem: remove .ndo_poll_controller to avoid deadlocks * CVE-url: https://ubuntu.com/security/CVE-2024-38553 - net: fec: remove .ndo_poll_controller to avoid deadlocks * CVE-url: https://ubuntu.com/security/CVE-2024-41066 - ibmvnic: Add tx check to prevent skb leak * CVE-url: https://ubuntu.com/security/CVE-2024-40982 - ssb: Fix potential NULL pointer dereference in ssb_device_uevent() * CVE-url: https://ubuntu.com/security/CVE-2024-50154 - tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). * CVE-url: https://ubuntu.com/security/CVE-2024-56595 - jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2024-57896 - btrfs: fix hang during unmount when stopping a space reclaim worker - btrfs: wait for fixup workers before stopping cleaner kthread during umount - btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount * CVE-url: https://ubuntu.com/security/CVE-2024-56598 - jfs: array-index-out-of-bounds fix in dtReadFirst * CVE-url: https://ubuntu.com/security/CVE-2024-56596 - jfs: fix array-index-out-of-bounds in jfs_readdir * Bionic update: upstream stable patchset 2022-01-25 (LP: #1959033) // CVE- url: https://ubuntu.com/security/CVE-2021-47485 - IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields * CVE-url: https://ubuntu.com/security/CVE-2024-56602 - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() * CVE-url: https://ubuntu.com/security/CVE-2024-56601 - net: inet: do not leave a dangling sk pointer in inet_create() * CVE-url: https://ubuntu.com/security/CVE-2024-56600 - sock: struct proto hash function may error - net: inet6: do not leave a dangling sk pointer in inet6_create() * CVE-url: https://ubuntu.com/security/CVE-2023-52818 - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 * CVE-url: https://ubuntu.com/security/CVE-2024-35887 - ax25: fix use-after-free bugs caused by ax25_ds_del_timer * Bionic update: upstream stable patchset 2021-11-02 (LP: #1949512) // CVE- url: https://ubuntu.com/security/CVE-2021-47404 - HID: betop: fix slab-out-of-bounds Write in betop_probe * Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE- url: https://ubuntu.com/security/CVE-2021-47254 - gfs2: Fix use-after-free in gfs2_glock_shrink_scan * Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE- url: https://ubuntu.com/security/CVE-2021-47506 - nfsd: fix use-after-free due to delegation race * CVE-url: https://ubuntu.com/security/CVE-2024-56606 - af_packet: avoid erroring out after sock_init_data() in packet_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53141 - netfilter: ipset: add missing range check in bitmap_ip_uadt * Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE- url: https://ubuntu.com/security/CVE-2021-47280 - drm: Fix use-after-free read in drm_getunique() * Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE- url: https://ubuntu.com/security/CVE-2021-47235 - net: ethernet: fix potential use-after-free in ec_bhf_remove * Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE- url: https://ubuntu.com/security/CVE-2021-47309 - net: validate lwtstate->data before returning from skb_tunnel_info() * Bionic update: upstream stable patchset 2022-01-06 (LP: #1956614) // CVE- url: https://ubuntu.com/security/CVE-2021-47549 - sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl * CVE-url: https://ubuntu.com/security/CVE-2024-53165 - sh: intc: Fix use-after-free bug in register_intc_controller() * CVE-url: https://ubuntu.com/security/CVE-2024-56603 - net: af_can: do not leave a dangling sk pointer in can_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53173 - NFSv4.0: Fix a use-after-free problem in the asynchronous open() * Bionic update: upstream stable patchset 2022-01-11 (LP: #1957113) // CVE- url: https://ubuntu.com/security/CVE-2021-47500 - iio: mma8452: Fix trigger reference couting * CVE-url: https://ubuntu.com/security/CVE-2024-26996 - usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error * Bionic update: upstream stable patchset 2021-12-03 (LP: #1953202) // CVE- url: https://ubuntu.com/security/CVE-2021-47483 - regmap: Fix possible double-free in regcache_rbtree_exit() * CVE-url: https://ubuntu.com/security/CVE-2024-56650 - netfilter: x_tables: fix LED ID check in led_tg_check() * CVE-url: https://ubuntu.com/security/CVE-2024-53227 - scsi: bfa: Fix use-after-free in bfad_im_module_exit() * CVE-url: https://ubuntu.com/security/CVE-2024-53155 - ocfs2: fix uninitialized value in ocfs2_file_read_iter() * CVE-url: https://ubuntu.com/security/CVE-2024-56605 - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53156 - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() * CVE-url: https://ubuntu.com/security/CVE-2023-52741 - cifs: Fix use-after-free in rdata->read_into_pages() * CVE-url: https://ubuntu.com/security/CVE-2024-56759 - btrfs: fix use-after-free when COWing tree bock and tracing is enabled * CVE-url: https://ubuntu.com/security/CVE-2024-56604 - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() * CVE-url: https://ubuntu.com/security/CVE-2024-53142 - initramfs: avoid filename buffer overrun * CVE-url: https://ubuntu.com/security/CVE-2024-56631 - scsi: sg: Fix slab-use-after-free read in sg_release() * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47334 - misc/libmasm/module: Fix two use after free in ibmasm_init_one * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47355 - atm: nicstar: Fix possible use-after-free in nicstar_cleanup() * Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE- url: https://ubuntu.com/security/CVE-2021-47245 - netfilter: synproxy: Fix out of bounds when parsing TCP options * CVE-url: https://ubuntu.com/security/CVE-2021-47191 - scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() * Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE- url: https://ubuntu.com/security/CVE-2021-47288 - media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() * CVE-url: https://ubuntu.com/security/CVE-2023-52478 - HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect * CVE-url: https://ubuntu.com/security/CVE-2024-36924 - scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() * CVE-url: https://ubuntu.com/security/CVE-2023-52476 - perf/x86/lbr: Filter vsyscall addresses * CVE-url: https://ubuntu.com/security/CVE-2023-52488 - regmap: Add regmap_noinc_read API - regmap: Add regmap_noinc_write API - serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO
Updated packages:
  • linux-buildinfo-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:8bfbf4f9289c8cdff97cb8dd8472a0e2d3beed4a
  • linux-buildinfo-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:04ad03c2ad50ff0bf05c3c1fe5c1b11fd47d50a3
  • linux-cloud-tools-4.4.0-270-tuxcare.els41_4.4.0-270.304_amd64.deb
    sha:b108430cc8df8ea9c6d729a8fa196590a1f1aa24
  • linux-cloud-tools-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:e69bddc664c62c5b5a8c63d5ded35bf882b7a72b
  • linux-cloud-tools-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:182ad906f74bd16d2e968e7b1a9d3d5553085743
  • linux-cloud-tools-common_4.4.0-270.304_all.deb
    sha:f45e75f6fbc7f4e45b2b44f14e9a0b2136fddf3f
  • linux-cloud-tools-generic_4.4.0.270.304_amd64.deb
    sha:20acc0dce2ed77d94f68f20675861b467c148e0c
  • linux-cloud-tools-lowlatency_4.4.0.270.304_amd64.deb
    sha:d0dada35c17224ad7f8a3da67808d80ac4f5cb9d
  • linux-crashdump_4.4.0.270.304_amd64.deb
    sha:e96cf7fba9088e33d5ecf8f12ff9a2100f8495b9
  • linux-doc_4.4.0-270.304_all.deb
    sha:c611933660042d02e151bdb76bce1bc29d78e9e1
  • linux-generic_4.4.0.270.304_amd64.deb
    sha:5c919ea32b8cebe8d7f0762d96f0c38c9003e1ae
  • linux-headers-4.4.0-270-tuxcare.els41_4.4.0-270.304_all.deb
    sha:0a6db06a19c7c762a2683b63153082f82b804053
  • linux-headers-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:e41f1fe830d473a6c3421b1cc325028a96a27cb4
  • linux-headers-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:cee71e644fea8a02f241857dfc671f35228688e7
  • linux-headers-generic_4.4.0.270.304_amd64.deb
    sha:401c18e44d735dd5268d3b9c7bad9187703e723a
  • linux-headers-lowlatency_4.4.0.270.304_amd64.deb
    sha:50f5c7d36a5c308130099ff63f2e5177d3f1ea42
  • linux-image-generic_4.4.0.270.304_amd64.deb
    sha:28efd66ca4d45e3e08e92aa7e3ebf5ac8e76e9e7
  • linux-image-lowlatency_4.4.0.270.304_amd64.deb
    sha:37977649b655537e69580b40a4ac8386598ca283
  • linux-image-unsigned-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:a376ea582fa9ed1fc0145b4c5c48f99218df3fd4
  • linux-image-unsigned-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:90b43f339279e98f2920000792d9252408ba7158
  • linux-libc-dev_4.4.0-270.304_amd64.deb
    sha:47f5414aeacf8430790fe85eaf8cbbecfb61107f
  • linux-lowlatency_4.4.0.270.304_amd64.deb
    sha:5c97804eb378ef46a076703c371a7531232d94e0
  • linux-modules-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:6087f8f2363b8d7825d2aea4c33982c3bb0d75be
  • linux-modules-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:fbe8d00fbddc178f169fa3a239cef5767857a454
  • linux-modules-extra-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:7fa4112067dfabf0167b909afa5eee4b3360994c
  • linux-source_4.4.0.270.304_all.deb
    sha:7cd81d5dd9b2958ccfeb42457cff8c7dbbc34d24
  • linux-source-4.4.0_4.4.0-270.304_all.deb
    sha:07ee6d656a8994afda05864131df7ef2348414b9
  • linux-tools-4.4.0-270-tuxcare.els41_4.4.0-270.304_amd64.deb
    sha:9952cabcf5804c8a81f3a9b61d2b75dfcf2c0f59
  • linux-tools-4.4.0-270-tuxcare.els41-generic_4.4.0-270.304_amd64.deb
    sha:bf11e4422661ef32a5d27395d33b8563029c799f
  • linux-tools-4.4.0-270-tuxcare.els41-lowlatency_4.4.0-270.304_amd64.deb
    sha:7e8508851d0070e46ad2178102d6426250328144
  • linux-tools-common_4.4.0-270.304_all.deb
    sha:c2268e7a424f0cfb58b32ecdf5962ad560e71fbd
  • linux-tools-generic_4.4.0.270.304_amd64.deb
    sha:535b3f5c2c3e8acf191a8ad6aac004a759772ed4
  • linux-tools-host_4.4.0-270.304_all.deb
    sha:27b9d7141ece9b8e297c504dc3706ab7d6cf52b6
  • linux-tools-lowlatency_4.4.0.270.304_amd64.deb
    sha:27fbfd1af475e214a3acbdd9d1821f9b7f0807c6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.