[CLSA-2025:1744713316] Fix of 50 CVEs
Type:
security
Severity:
Important
Release date:
2025-04-15 10:35:21 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-26872 - RDMA/srpt: Do not register event handler until srpt device is fully setup * CVE-url: https://ubuntu.com/security/CVE-2024-53179 - smb: client: fix use-after-free of signing key * CVE-url: https://ubuntu.com/security/CVE-2021-47357 - atm: iphase: fix possible use-after-free in ia_module_exit() * Bionic update: upstream stable patchset 2022-11-15 (LP: #1996650) // CVE- url: https://ubuntu.com/security/CVE-2021-47103 - inet: fully convert sk->sk_rx_dst to RCU rules * CVE-url: https://ubuntu.com/security/CVE-2025-21858 - geneve: Fix use-after-free in geneve_find_dev(). * CVE-url: https://ubuntu.com/security/CVE-2024-36921 - wifi: iwlwifi: mvm: guard against invalid STA ID on removal * Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE- url: https://ubuntu.com/security/CVE-2022-49478 - media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init * CVE-url: https://ubuntu.com/security/CVE-2023-52621 - bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers * CVE-url: https://ubuntu.com/security/CVE-2025-21855 - ibmvnic: Don't reference skb after sending to VIOS * CVE-url: https://ubuntu.com/security/CVE-2021-47110 - x86/kvm: Disable kvmclock on all CPUs on shutdown * CVE-url: https://ubuntu.com/security/CVE-2024-57980 - media: uvcvideo: Fix double free in error path * CVE-url: https://ubuntu.com/security/CVE-2025-21718 - net: rose: fix timer races against user threads * CVE-url: https://ubuntu.com/security/CVE-2025-21735 - NFC: nci: Add bounds checking in nci_hci_create_pipe() * CVE-url: https://ubuntu.com/security/CVE-2023-52805 - jfs: fix array-index-out-of-bounds in diAlloc * CVE-url: https://ubuntu.com/security/CVE-2023-52847 - media: bttv: fix use after free error due to btv->timeout timer * CVE-url: https://ubuntu.com/security/CVE-2024-41014 - xfs: add bounds checking to xlog_recover_process_data * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48702 - ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48701 - ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() * CVE-url: https://ubuntu.com/security/CVE-2024-26982 - Squashfs: check the inode number is not the invalid value of zero * CVE-url: https://ubuntu.com/security/CVE-2024-56548 - hfsplus: don't query the device logical block size multiple times * CVE-url: https://ubuntu.com/security/CVE-2024-57850 - jffs2: Prevent rtime decompress memory corruption * CVE-url: https://ubuntu.com/security/CVE-2024-49982 - aoe: fix the potential use-after-free problem in more places * CVE-url: https://ubuntu.com/security/CVE-2025-21687 - vfio/platform: check the bounds of read/write syscalls * CVE-url: https://ubuntu.com/security/CVE-2024-56539 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() * CVE-url: https://ubuntu.com/security/CVE-2024-53680 - ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() * CVE-url: https://ubuntu.com/security/CVE-2024-56630 - ocfs2: free inode when ocfs2_get_init_inode() fails * CVE-url: https://ubuntu.com/security/CVE-2024-53184 - um: ubd: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-57884 - mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() * CVE-url: https://ubuntu.com/security/CVE-2024-56597 - jfs: fix shift-out-of-bounds in dbSplit * CVE-url: https://ubuntu.com/security/CVE-2025-21664 - dm thin: make get_first_thin use rcu-safe list first function * CVE-url: https://ubuntu.com/security/CVE-2024-56594 - drm/amdgpu: set the right AMDGPU sg segment limitation * CVE-url: https://ubuntu.com/security/CVE-2024-52332 - igb: Fix potential invalid memory access in igb_init_module() * CVE-url: https://ubuntu.com/security/CVE-2024-53172 - ubi: fastmap: Fix duplicate slab cache names while attaching * CVE-url: https://ubuntu.com/security/CVE-2024-56532 - ALSA: us122l: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53183 - um: net: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-57948 - mac802154: check local interfaces before deleting sdata list * CVE-url: https://ubuntu.com/security/CVE-2024-57904 - iio: adc: at91: call input_free_device() on allocated iio_dev * CVE-url: https://ubuntu.com/security/CVE-2024-56637 - netfilter: ipset: Hold module reference while requesting a module * CVE-url: https://ubuntu.com/security/CVE-2024-53214 - vfio/pci: Properly hide first-in-list PCIe extended capability * CVE-url: https://ubuntu.com/security/CVE-2024-56700 - media: wl128x: Fix atomicity violation in fmc_send_cmd() * CVE-url: https://ubuntu.com/security/CVE-2024-56531 - ALSA: caiaq: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53194 - PCI: Fix use-after-free of slot->bus on hot remove * CVE-url: https://ubuntu.com/security/CVE-2024-56619 - nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2021-47636 - ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE- url: https://ubuntu.com/security/CVE-2022-49058 - cifs: potential buffer overflow in handling symlinks * CVE-url: https://ubuntu.com/security/CVE-2024-5317 - nfsd: make sure exp active before svc_export_show * CVE-url: https://ubuntu.com/security/CVE-2024-53174 - SUNRPC: make sure cache entry active before cache_show * CVE-url: https://ubuntu.com/security/CVE-2021-47219 - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() * CVE-url: https://ubuntu.com/security/CVE-2024-50269 - usb: musb: sunxi: Fix accessing an released usb phy * CVE-url: https://ubuntu.com/security/CVE-2024-57908 - iio: imu: kmx61: fix information leak in triggered buffer
Updated packages:
  • linux-buildinfo-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:882f7a6c63a6a772f64cc20c9c1acac176f27a05
  • linux-buildinfo-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:9320a3cbbd857fbb6ab408c13ec0b4d517efdd0f
  • linux-cloud-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb
    sha:d8706e0e459c3fc9e062223bcbf0a517807cdf4c
  • linux-cloud-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:f41c87658e4b959f29fa549c7b996c1d01e64a94
  • linux-cloud-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:99d6e61a3b685d212df0ad260ef2bb484211bc11
  • linux-cloud-tools-common_4.4.0-273.307_all.deb
    sha:b68a3df6296ff316ef6f448fc3238669c7211d71
  • linux-cloud-tools-generic_4.4.0.273.307_amd64.deb
    sha:42e9d0e1d35cadcb7de14ab7aa8b0a88153081d9
  • linux-cloud-tools-lowlatency_4.4.0.273.307_amd64.deb
    sha:9c74cbb174f65b83dbfeb5d2c4db506c0758d679
  • linux-crashdump_4.4.0.273.307_amd64.deb
    sha:3698a5b31b3ce3ba4fc34c66fb557f1321d277a2
  • linux-doc_4.4.0-273.307_all.deb
    sha:25c34748775b01ef2cee0aaf79ba1bf892b5c36a
  • linux-generic_4.4.0.273.307_amd64.deb
    sha:e6a972ee245c288beb1d4209a824ba9321d4802f
  • linux-headers-4.4.0-273-tuxcare.els44_4.4.0-273.307_all.deb
    sha:ea78aed96ab70fefcfe367a91d4af715d9a9e67a
  • linux-headers-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:d6d83e0023bd8f89af78ade646e2a7fdc52cf5ca
  • linux-headers-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:13368f7441a366cb119951ea4e2f6aacc7abd729
  • linux-headers-generic_4.4.0.273.307_amd64.deb
    sha:50110fea3683c55d4711071bd2ac9b1e18157d73
  • linux-headers-lowlatency_4.4.0.273.307_amd64.deb
    sha:a38281858fc5d1b18830cb39a280456e618ba041
  • linux-image-generic_4.4.0.273.307_amd64.deb
    sha:443e3259b2e9bd224b95f11931cbc869b9a91e90
  • linux-image-lowlatency_4.4.0.273.307_amd64.deb
    sha:969984a9c379a4ee1d862599e3f583121626cd00
  • linux-image-unsigned-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:8d1f56d8552803b44514e0fa78bda24dc70f8281
  • linux-image-unsigned-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:db8e8f709e9c35e251a2d5ef3f4a1b005d0797c0
  • linux-libc-dev_4.4.0-273.307_amd64.deb
    sha:743a3b0b6fe96ca108e175c0d26dcf2f6a02b445
  • linux-lowlatency_4.4.0.273.307_amd64.deb
    sha:962ffa962cc4efc6208eefee4cd6147438eb8ace
  • linux-modules-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:06edd0ad4ec4292e6f8c7a19f099577b1dcab944
  • linux-modules-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:00eb201a9474565ace3084bb6403297a154db925
  • linux-modules-extra-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:9d1599a59d1e9122b7c938908c683ad093f7986a
  • linux-source_4.4.0.273.307_all.deb
    sha:48b3ce44e19fc86987c926b2db9dc0d65a788efb
  • linux-source-4.4.0_4.4.0-273.307_all.deb
    sha:b0ae9d8d92232475993e932d4a8e75b1f4b31b4a
  • linux-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb
    sha:ddaab3cb470610b46028971f28172fb66d953e28
  • linux-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb
    sha:b245f42d56a50e8d96644e0b93c79c5a2adad50c
  • linux-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb
    sha:99b93d1fd37a760952b67e77707adab6a5cf9883
  • linux-tools-common_4.4.0-273.307_all.deb
    sha:3865d46e1f417bed9a344e4e4b0ec8c2bc42efa4
  • linux-tools-generic_4.4.0.273.307_amd64.deb
    sha:b54b956815c29141243fd1ebb69658c9fe64f70c
  • linux-tools-host_4.4.0-273.307_all.deb
    sha:a9668f5b98e91c943ee0b52ba51bc78564e2d27f
  • linux-tools-lowlatency_4.4.0.273.307_amd64.deb
    sha:64984ab3abc35dc412ba5248e8e93db184d0795d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.