Release date:
2025-04-15 10:35:21 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-26872
- RDMA/srpt: Do not register event handler until srpt device is fully setup
* CVE-url: https://ubuntu.com/security/CVE-2024-53179
- smb: client: fix use-after-free of signing key
* CVE-url: https://ubuntu.com/security/CVE-2021-47357
- atm: iphase: fix possible use-after-free in ia_module_exit()
* Bionic update: upstream stable patchset 2022-11-15 (LP: #1996650) // CVE-
url: https://ubuntu.com/security/CVE-2021-47103
- inet: fully convert sk->sk_rx_dst to RCU rules
* CVE-url: https://ubuntu.com/security/CVE-2025-21858
- geneve: Fix use-after-free in geneve_find_dev().
* CVE-url: https://ubuntu.com/security/CVE-2024-36921
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal
* Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE-
url: https://ubuntu.com/security/CVE-2022-49478
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init
* CVE-url: https://ubuntu.com/security/CVE-2023-52621
- bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
* CVE-url: https://ubuntu.com/security/CVE-2025-21855
- ibmvnic: Don't reference skb after sending to VIOS
* CVE-url: https://ubuntu.com/security/CVE-2021-47110
- x86/kvm: Disable kvmclock on all CPUs on shutdown
* CVE-url: https://ubuntu.com/security/CVE-2024-57980
- media: uvcvideo: Fix double free in error path
* CVE-url: https://ubuntu.com/security/CVE-2025-21718
- net: rose: fix timer races against user threads
* CVE-url: https://ubuntu.com/security/CVE-2025-21735
- NFC: nci: Add bounds checking in nci_hci_create_pipe()
* CVE-url: https://ubuntu.com/security/CVE-2023-52805
- jfs: fix array-index-out-of-bounds in diAlloc
* CVE-url: https://ubuntu.com/security/CVE-2023-52847
- media: bttv: fix use after free error due to btv->timeout timer
* CVE-url: https://ubuntu.com/security/CVE-2024-41014
- xfs: add bounds checking to xlog_recover_process_data
* Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE-
url: https://ubuntu.com/security/CVE-2022-48702
- ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()
* Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE-
url: https://ubuntu.com/security/CVE-2022-48701
- ALSA: usb-audio: Fix an out-of-bounds bug in
__snd_usb_parse_audio_interface()
* CVE-url: https://ubuntu.com/security/CVE-2024-26982
- Squashfs: check the inode number is not the invalid value of zero
* CVE-url: https://ubuntu.com/security/CVE-2024-56548
- hfsplus: don't query the device logical block size multiple times
* CVE-url: https://ubuntu.com/security/CVE-2024-57850
- jffs2: Prevent rtime decompress memory corruption
* CVE-url: https://ubuntu.com/security/CVE-2024-49982
- aoe: fix the potential use-after-free problem in more places
* CVE-url: https://ubuntu.com/security/CVE-2025-21687
- vfio/platform: check the bounds of read/write syscalls
* CVE-url: https://ubuntu.com/security/CVE-2024-56539
- wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan()
* CVE-url: https://ubuntu.com/security/CVE-2024-53680
- ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()
* CVE-url: https://ubuntu.com/security/CVE-2024-56630
- ocfs2: free inode when ocfs2_get_init_inode() fails
* CVE-url: https://ubuntu.com/security/CVE-2024-53184
- um: ubd: Do not use drvdata in release
* CVE-url: https://ubuntu.com/security/CVE-2024-57884
- mm: vmscan: account for free pages to prevent infinite Loop in
throttle_direct_reclaim()
* CVE-url: https://ubuntu.com/security/CVE-2024-56597
- jfs: fix shift-out-of-bounds in dbSplit
* CVE-url: https://ubuntu.com/security/CVE-2025-21664
- dm thin: make get_first_thin use rcu-safe list first function
* CVE-url: https://ubuntu.com/security/CVE-2024-56594
- drm/amdgpu: set the right AMDGPU sg segment limitation
* CVE-url: https://ubuntu.com/security/CVE-2024-52332
- igb: Fix potential invalid memory access in igb_init_module()
* CVE-url: https://ubuntu.com/security/CVE-2024-53172
- ubi: fastmap: Fix duplicate slab cache names while attaching
* CVE-url: https://ubuntu.com/security/CVE-2024-56532
- ALSA: us122l: Use snd_card_free_when_closed() at disconnection
* CVE-url: https://ubuntu.com/security/CVE-2024-53183
- um: net: Do not use drvdata in release
* CVE-url: https://ubuntu.com/security/CVE-2024-57948
- mac802154: check local interfaces before deleting sdata list
* CVE-url: https://ubuntu.com/security/CVE-2024-57904
- iio: adc: at91: call input_free_device() on allocated iio_dev
* CVE-url: https://ubuntu.com/security/CVE-2024-56637
- netfilter: ipset: Hold module reference while requesting a module
* CVE-url: https://ubuntu.com/security/CVE-2024-53214
- vfio/pci: Properly hide first-in-list PCIe extended capability
* CVE-url: https://ubuntu.com/security/CVE-2024-56700
- media: wl128x: Fix atomicity violation in fmc_send_cmd()
* CVE-url: https://ubuntu.com/security/CVE-2024-56531
- ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
* CVE-url: https://ubuntu.com/security/CVE-2024-53194
- PCI: Fix use-after-free of slot->bus on hot remove
* CVE-url: https://ubuntu.com/security/CVE-2024-56619
- nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
* CVE-url: https://ubuntu.com/security/CVE-2021-47636
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
* Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE-
url: https://ubuntu.com/security/CVE-2022-49058
- cifs: potential buffer overflow in handling symlinks
* CVE-url: https://ubuntu.com/security/CVE-2024-5317
- nfsd: make sure exp active before svc_export_show
* CVE-url: https://ubuntu.com/security/CVE-2024-53174
- SUNRPC: make sure cache entry active before cache_show
* CVE-url: https://ubuntu.com/security/CVE-2021-47219
- scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
* CVE-url: https://ubuntu.com/security/CVE-2024-50269
- usb: musb: sunxi: Fix accessing an released usb phy
* CVE-url: https://ubuntu.com/security/CVE-2024-57908
- iio: imu: kmx61: fix information leak in triggered buffer
Updated packages:
-
linux-buildinfo-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:882f7a6c63a6a772f64cc20c9c1acac176f27a05
-
linux-buildinfo-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:9320a3cbbd857fbb6ab408c13ec0b4d517efdd0f
-
linux-cloud-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb
sha:d8706e0e459c3fc9e062223bcbf0a517807cdf4c
-
linux-cloud-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:f41c87658e4b959f29fa549c7b996c1d01e64a94
-
linux-cloud-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:99d6e61a3b685d212df0ad260ef2bb484211bc11
-
linux-cloud-tools-common_4.4.0-273.307_all.deb
sha:b68a3df6296ff316ef6f448fc3238669c7211d71
-
linux-cloud-tools-generic_4.4.0.273.307_amd64.deb
sha:42e9d0e1d35cadcb7de14ab7aa8b0a88153081d9
-
linux-cloud-tools-lowlatency_4.4.0.273.307_amd64.deb
sha:9c74cbb174f65b83dbfeb5d2c4db506c0758d679
-
linux-crashdump_4.4.0.273.307_amd64.deb
sha:3698a5b31b3ce3ba4fc34c66fb557f1321d277a2
-
linux-doc_4.4.0-273.307_all.deb
sha:25c34748775b01ef2cee0aaf79ba1bf892b5c36a
-
linux-generic_4.4.0.273.307_amd64.deb
sha:e6a972ee245c288beb1d4209a824ba9321d4802f
-
linux-headers-4.4.0-273-tuxcare.els44_4.4.0-273.307_all.deb
sha:ea78aed96ab70fefcfe367a91d4af715d9a9e67a
-
linux-headers-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:d6d83e0023bd8f89af78ade646e2a7fdc52cf5ca
-
linux-headers-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:13368f7441a366cb119951ea4e2f6aacc7abd729
-
linux-headers-generic_4.4.0.273.307_amd64.deb
sha:50110fea3683c55d4711071bd2ac9b1e18157d73
-
linux-headers-lowlatency_4.4.0.273.307_amd64.deb
sha:a38281858fc5d1b18830cb39a280456e618ba041
-
linux-image-generic_4.4.0.273.307_amd64.deb
sha:443e3259b2e9bd224b95f11931cbc869b9a91e90
-
linux-image-lowlatency_4.4.0.273.307_amd64.deb
sha:969984a9c379a4ee1d862599e3f583121626cd00
-
linux-image-unsigned-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:8d1f56d8552803b44514e0fa78bda24dc70f8281
-
linux-image-unsigned-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:db8e8f709e9c35e251a2d5ef3f4a1b005d0797c0
-
linux-libc-dev_4.4.0-273.307_amd64.deb
sha:743a3b0b6fe96ca108e175c0d26dcf2f6a02b445
-
linux-lowlatency_4.4.0.273.307_amd64.deb
sha:962ffa962cc4efc6208eefee4cd6147438eb8ace
-
linux-modules-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:06edd0ad4ec4292e6f8c7a19f099577b1dcab944
-
linux-modules-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:00eb201a9474565ace3084bb6403297a154db925
-
linux-modules-extra-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:9d1599a59d1e9122b7c938908c683ad093f7986a
-
linux-source_4.4.0.273.307_all.deb
sha:48b3ce44e19fc86987c926b2db9dc0d65a788efb
-
linux-source-4.4.0_4.4.0-273.307_all.deb
sha:b0ae9d8d92232475993e932d4a8e75b1f4b31b4a
-
linux-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb
sha:ddaab3cb470610b46028971f28172fb66d953e28
-
linux-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
sha:b245f42d56a50e8d96644e0b93c79c5a2adad50c
-
linux-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
sha:99b93d1fd37a760952b67e77707adab6a5cf9883
-
linux-tools-common_4.4.0-273.307_all.deb
sha:3865d46e1f417bed9a344e4e4b0ec8c2bc42efa4
-
linux-tools-generic_4.4.0.273.307_amd64.deb
sha:b54b956815c29141243fd1ebb69658c9fe64f70c
-
linux-tools-host_4.4.0-273.307_all.deb
sha:a9668f5b98e91c943ee0b52ba51bc78564e2d27f
-
linux-tools-lowlatency_4.4.0.273.307_amd64.deb
sha:64984ab3abc35dc412ba5248e8e93db184d0795d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.