Release date:
2025-05-16 21:13:58 UTC
Description:
* Bionic update: upstream stable patchset 2022-04-13 (LP: #1968932) // CVE-
url: https://ubuntu.com/security/CVE-2022-23041
- xen/gnttab: fix gnttab_end_foreign_access() without page specified
* Bionic update: upstream stable patchset 2023-01-20 (LP: #2003596) // CVE-
url: https://ubuntu.com/security/CVE-2022-49850
- nilfs2: fix deadlock in nilfs_count_free_blocks()
* CVE-url: https://ubuntu.com/security/CVE-2024-42305
- ext4: check dot and dotdot of dx_root before making dir indexed
* CVE-url: https://ubuntu.com/security/CVE-2024-53168
- sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
* CVE-url: https://ubuntu.com/security/CVE-2024-26915
- drm/amdgpu: Add check to prevent IH overflow
- drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
* CVE-url: https://ubuntu.com/security/CVE-2024-56770
- net/sched: netem: account for backlog updates from child qdisc
- netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47587
- net: systemport: Add global locking for descriptor lifecycle
* Bionic update: upstream stable patchset 2021-06-01 (LP: #1930472) // CVE-
url: https://ubuntu.com/security/CVE-2021-46959
- spi: Fix use-after-free with devm_spi_alloc_*
* CVE-url: https://ubuntu.com/security/CVE-2024-26689
- ceph: prevent use-after-free in encode_cap_msg()
* CVE-url: https://ubuntu.com/security/CVE-2024-53066
- nfs: Fix KMSAN warning in decode_getfattr_attrs()
* CVE-url: https://ubuntu.com/security/CVE-2024-49944
- sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
* CVE-url: https://ubuntu.com/security/CVE-2024-50237
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
* CVE-url: https://ubuntu.com/security/CVE-2024-46780
- nilfs2: protect references to superblock parameters exposed in sysfs
* CVE-url: https://ubuntu.com/security/CVE-2024-53063
- media: dvbdev: prevent the risk of out of memory access
- media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set
* CVE-url: https://ubuntu.com/security/CVE-2021-47150
- net: fec: fix the potential memory leak in fec_enet_init()
* CVE-url: https://ubuntu.com/security/CVE-2024-53140
- netlink: terminate outstanding dump on socket close
* CVE-url: https://ubuntu.com/security/CVE-2025-21971
- net_sched: Prevent creation of classes with TC_H_ROOT
* CVE-url: https://ubuntu.com/security/CVE-2023-52572
- cifs: Fix UAF in cifs_demultiplex_thread()
* CVE-url: https://ubuntu.com/security/CVE-2025-37785
- ext4: fix OOB read when checking dotdot dir
* Bionic update: upstream stable patchset 2021-07-14 (LP: #1936231) // CVE-
url: https://ubuntu.com/security/CVE-2021-47277
- kvm: avoid speculation-based attacks from out-of-range memslot accesses
* CVE-url: https://ubuntu.com/security/CVE-2022-49740
- wifi: brcmfmac: Check the count value of channel spec to prevent out-of-
bounds reads
* Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE-
url: https://ubuntu.com/security/CVE-2022-49404
- RDMA/hfi1: Fix potential integer multiplication overflow errors
* Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237) // CVE-
url: https://ubuntu.com/security/CVE-2022-49757
- EDAC/highbank: Fix memory leak in highbank_mc_probe()
* Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE-
url: https://ubuntu.com/security/CVE-2022-49395
- um: Fix out-of-bounds read in LDT setup
* CVE-url: https://ubuntu.com/security/CVE-2022-49738
- f2fs: fix to do sanity check on summary info
- f2fs: should put a page when checking the summary info
- f2fs: fix to do sanity check on i_extra_isize in is_alive()
* CVE-url: https://ubuntu.com/security/
- ipv6: Define dscp_t and stop taking ECN bits into account in fib6-rules
* CVE-url: https://ubuntu.com/security/CVE-2025-21891
- ipvlan: ensure network headers are in skb linear part
* CVE-url: https://ubuntu.com/security/CVE-2025-21969
- Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
* CVE-url: https://ubuntu.com/security/CVE-2025-21957
- scsi: qla1280: Fix kernel oops when debug level > 2
* CVE-url: https://ubuntu.com/security/CVE-2025-21948
- HID: appleir: Fix potential NULL dereference at raw event handle
* Bionic update: upstream stable patchset 2023-04-05 (LP: #2015399) // CVE-
url: https://ubuntu.com/security/CVE-2023-52989
- firewire: fix memory leak for payload of request subaction to IEC 61883-1
FCP region
* Bionic update: upstream stable patchset 2023-04-05 (LP: #2015399) // CVE-
url: https://ubuntu.com/security/CVE-2023-52932
- mm/swapfile: add cond_resched() in get_swap_pages()
* Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237) // CVE-
url: https://ubuntu.com/security/CVE-2023-53015
- HID: betop: check shape of output reports
* Bionic update: upstream stable patchset 2023-03-03 (LP: #2009237) // CVE-
url: https://ubuntu.com/security/CVE-2023-52993
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
* CVE-url: https://ubuntu.com/security/CVE-2025-21912
- gpio: rcar: Use raw_spinlock to protect register access
* CVE-url: https://ubuntu.com/security/CVE-2025-21922
- ppp: Fix KMSAN uninit-value warning with bpf
* CVE-url: https://ubuntu.com/security/CVE-2025-21959
- netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in
insert_tree()
* Bionic update: upstream stable patchset 2023-04-05 (LP: #2015399) // CVE-
url: https://ubuntu.com/security/CVE-2023-52988
- ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()
* CVE-url: https://ubuntu.com/security/CVE-2025-21996
- drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
* CVE-url: https://ubuntu.com/security/CVE-2025-21917
- usb: renesas_usbhs: Flush the notify_hotplug_work
* CVE-url: https://ubuntu.com/security/CVE-2023-53001
- drm/drm_vma_manager: Add drm_vma_node_allow_once()
* CVE-url: https://ubuntu.com/security/CVE-2025-21920
- vlan: enforce underlying device type
* CVE-url: https://ubuntu.com/security/CVE-2025-21904
- caif_virtio: fix wrong pointer check in cfv_probe()
* Bionic update: upstream stable patchset 2021-06-23 (LP: #1933375) // CVE-
url: https://ubuntu.com/security/CVE-2021-47320
- net: caif: added cfserl_release function
- net: caif: add proper error handling
- net: caif: fix memory leak in caif_device_notify
* CVE-url: https://ubuntu.com/security/CVE-2021-47342
- ext4: fix memory leak in ext4_fill_super
- ext4: fix timer use-after-free on failed mount
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47320
- nfs: fix acl memory leak of posix_acl_create()
* Bionic update: upstream stable patchset 2022-01-14 (LP: #1957957) // CVE-
url: https://ubuntu.com/security/CVE-2021-47602
- mac80211: track only QoS data frames for admission control
* CVE-url: https://ubuntu.com/security/CVE-2021-47328
- scsi: iscsi: Fix conn use after free during resets
* CVE-url: https://ubuntu.com/security/CVE-2025-21702
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0
* CVE-url: https://ubuntu.com/security/CVE-2024-56658
- net: defer final 'struct net' free in netns dismantle
* CVE-url: https://ubuntu.com/security/CVE-2024-50265
- ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove()
* CVE-url: https://ubuntu.com/security/CVE-2024-46826
- ELF: fix kernel.randomize_va_space double read
* CVE-url: https://ubuntu.com/security/CVE-2025-21700
- net: sched: Disallow replacing of child qdisc from one parent to another
* CVE-url: https://ubuntu.com/security/CVE-2024-50167
- be2net: fix potential memory leak in be_xmit()
* CVE-url: https://ubuntu.com/security/CVE-2024-49952
- netfilter: nf_tables: prevent nf_skb_duplicated corruption
* CVE-url: https://ubuntu.com/security/CVE-2024-49948
- net: add more sanity checks to qdisc_pkt_len_init()
Updated packages:
-
linux-buildinfo-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:263d280628ecc3ed0b4c0bdaba73e1269f470f86
-
linux-buildinfo-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:c42ff08f1cc681bbfc6a1d97351a121373a39868
-
linux-cloud-tools-4.4.0-274-tuxcare.els45_4.4.0-274.308_amd64.deb
sha:dc773d34fa86347767141864cf6fa114678f20d5
-
linux-cloud-tools-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:6182fc5b568152c24ea2305c9589b50748f0b744
-
linux-cloud-tools-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:5f15641baca5d5fd70c20ac5dc42bc5450891ad5
-
linux-cloud-tools-common_4.4.0-274.308_all.deb
sha:0843505f03ffb16f45a2c458e6c9a243eea009a7
-
linux-cloud-tools-generic_4.4.0.274.308_amd64.deb
sha:dd257775d08a9a52bf6af10298a0467367cf8ecd
-
linux-cloud-tools-lowlatency_4.4.0.274.308_amd64.deb
sha:e899eebdd08419ae0150ad5c9edcde8e43d95cbb
-
linux-crashdump_4.4.0.274.308_amd64.deb
sha:6eda4e25432e9a9faf4429fe945134aacad6ed15
-
linux-doc_4.4.0-274.308_all.deb
sha:2cc68709f0748a5fbf4a5f1dc7e863cb97531c40
-
linux-generic_4.4.0.274.308_amd64.deb
sha:a9972696ab5954edca091ed5086dd8e9b07ed1ed
-
linux-headers-4.4.0-274-tuxcare.els45_4.4.0-274.308_all.deb
sha:aa8c52824dfbb8e7bd640ad576edd582dcc0cb6b
-
linux-headers-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:3ed3b3c69a48a45ffa74d231af1bf62b5ebf33b8
-
linux-headers-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:abccc39be47795250fb8b9afcc4c5fec2069abb6
-
linux-headers-generic_4.4.0.274.308_amd64.deb
sha:bb2b67cc106ac862d1a9b1735e715b66108be274
-
linux-headers-lowlatency_4.4.0.274.308_amd64.deb
sha:3b5fb3dc4d8baab663cf6d7eb21114107448ec22
-
linux-image-generic_4.4.0.274.308_amd64.deb
sha:f24c5599a779f93773661b753ccf3c56d8c194f0
-
linux-image-lowlatency_4.4.0.274.308_amd64.deb
sha:3513c38d1826c9df4291ad43d7006eda131e326c
-
linux-image-unsigned-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:42cadbdf0510484b4d84214be9b7e639d5dd746a
-
linux-image-unsigned-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:31d0fcec5bc69e95ea20aa55df808cae8406ed06
-
linux-libc-dev_4.4.0-274.308_amd64.deb
sha:e0261f9b1f8842d4a6badfa2da0d4826b89174ef
-
linux-lowlatency_4.4.0.274.308_amd64.deb
sha:99ef02417d1e312ead361ce81ca37dadccd1096d
-
linux-modules-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:bd78e5065f676cfce479b7ca8ca8cca9cfb2fad1
-
linux-modules-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:268014d47426b9263b6aa030f0c79d81d13d2297
-
linux-modules-extra-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:952cfe5aa9c2d3c46a4af74b036f58fad6edbdb5
-
linux-source_4.4.0.274.308_all.deb
sha:844a77d6ccc72a42365733e1ae94f6f09bb1d647
-
linux-source-4.4.0_4.4.0-274.308_all.deb
sha:74e247f1e04539b25ab062500501d2be46054651
-
linux-tools-4.4.0-274-tuxcare.els45_4.4.0-274.308_amd64.deb
sha:b1d84b20bdd99773d2399a9378d7fd13395103cf
-
linux-tools-4.4.0-274-tuxcare.els45-generic_4.4.0-274.308_amd64.deb
sha:22ac08ba45a8d17835daacf52090b1a8883d5be8
-
linux-tools-4.4.0-274-tuxcare.els45-lowlatency_4.4.0-274.308_amd64.deb
sha:73f7c655fbcbf20187df92e11b51483c1d76c42b
-
linux-tools-common_4.4.0-274.308_all.deb
sha:4dc4c19bcdc51ba4ca89efedf1439676c6f958c1
-
linux-tools-generic_4.4.0.274.308_amd64.deb
sha:d91a65995a88cb7d1b1a361ef46b44864228e063
-
linux-tools-host_4.4.0-274.308_all.deb
sha:8cd30ff2c9b58ebd4358b2a826c3ef71f38fc872
-
linux-tools-lowlatency_4.4.0.274.308_amd64.deb
sha:7a6a9778b93e36c468934573267aa708002de65a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.