[CLSA-2025:1758009836] Fix of 28 CVEs
Type:
security
Severity:
Important
Release date:
2025-09-16 08:04:00 UTC
Description:
* Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE- url: https://ubuntu.com/security/CVE-2021-34981 - Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails * CVE-url: https://ubuntu.com/security/CVE-2025-37797 - net_sched: hfsc: Fix a UAF vulnerability in class handling * CVE-url: https://ubuntu.com/security/CVE-2024-57996 // CVE-url: https://ubuntu.com/security/CVE-2025-37752 - net_sched: sch_sfq: move the limit validation * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-50202 // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: propagate directory read errors from nilfs_find_entry() * Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: Remove check for PageError - nilfs2: return the mapped address from nilfs_get_page() * CVE-url: https://ubuntu.com/security/CVE-2024-50202 - make ext2_get_page() and friends work without external serialization * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47345 - RDMA/cma: Fix rdma_resolve_route() memory leak * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53131 - nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53130 - nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint * CVE-url: https://ubuntu.com/security/CVE-2025-37798 - codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() * CVE-url: https://ubuntu.com/security/CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-57913 - usb: gadget: f_fs: Remove WARN_ON in functionfs_bind * CVE-url: https://ubuntu.com/security/CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-50195 - posix-clock: Fix missing timespec64 check in pc_clock_settime() * CVE-url: https://ubuntu.com/security/CVE-2024-50299 - sctp: properly validate chunk size in sctp_sf_ootb() * CVE-url: https://ubuntu.com/security/CVE-2024-41016 - ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2024-50287 - media: v4l2-tpg: prevent the risk of a division by zero * CVE-url: https://ubuntu.com/security/CVE-2024-49965 - ocfs2: remove unreasonable unlock in ocfs2_read_blocks * CVE-url: https://ubuntu.com/security/CVE-2024-50179 - ceph: remove the incorrect Fw reference check when dirtying pages * CVE-url: https://ubuntu.com/security/CVE-2024-40953 - KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() * CVE-url: https://ubuntu.com/security/CVE-2024-50290 - media: cx24116: prevent overflows on SNR calculus * CVE-url: https://ubuntu.com/security/CVE-2024-49877 - ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate * CVE-url: https://ubuntu.com/security/CVE-2024-50008 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() * CVE-url: https://ubuntu.com/security/CVE-2024-49959 - jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error * CVE-url: https://ubuntu.com/security/CVE-2024-49963 - mailbox: bcm2835: Fix timeout during suspend mode * CVE-url: https://ubuntu.com/security/CVE-2024-47709 - can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). * CVE-url: https://ubuntu.com/security/CVE-2025-21699 - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag * CVE-url: https://ubuntu.com/security/CVE-2025-21689 - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() * CVE-url: https://ubuntu.com/security/CVE-2024-53101 - fs: Fix uninitialized value issue in from_kuid and from_kgid
Updated packages:
  • linux-buildinfo-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:1b8c75c749cd6ad9a4a750919eabfcad30102d60
  • linux-buildinfo-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:b80a1dbfe5535e278bc88649e7f7ae4897d416f4
  • linux-cloud-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb
    sha:07cc4a508af1fb9865c0af7f037c01f95074a93c
  • linux-cloud-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:8416ccbe2eee479e2d3e2cbf8130df245009f04f
  • linux-cloud-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:f612a3c28991b332b2fad0eadcbd52508ecfc7a4
  • linux-cloud-tools-common_4.4.0-278.312_all.deb
    sha:d79cce0c0a53b3ef088254db9b7f965a0cbcdc0b
  • linux-doc_4.4.0-278.312_all.deb
    sha:01d1970c372dbf84bbe5e47e5183233c904e9d7d
  • linux-headers-4.4.0-278-tuxcare.els49_4.4.0-278.312_all.deb
    sha:050580ea704fa49249652298796c781f3eee5ca7
  • linux-headers-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:384cd4b6948e08c0bb6a7e8cf54ac14d3b3a0d51
  • linux-headers-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:68d6ec7fb8bca3ae5b205e686291d35374a19257
  • linux-image-unsigned-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:65406a7885d58bfed43f48ae631b5915c4b98e45
  • linux-image-unsigned-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:a9924df4a1ca89c2cc178b18478ed5659d9f4aaf
  • linux-libc-dev_4.4.0-278.312_amd64.deb
    sha:8d8bc53e8081018494c9d961f20ec2e9a17d3089
  • linux-modules-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:764c0c62a51aaa99a0f3158a227e7be2ac4bd624
  • linux-modules-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:bf713df713c2b07c424a64ea4ca66a015ab98e6d
  • linux-modules-extra-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:505ea488c34e264a36a61355834343e87cad39de
  • linux-source-4.4.0_4.4.0-278.312_all.deb
    sha:3bfb59be4f8dac1073ff85bd397e176b054f79a5
  • linux-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb
    sha:3a4412d4a52c81b3e889610dd7ab261a577c6412
  • linux-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
    sha:2e35d04b8d3a757ffef85ede0467577a5f742b3b
  • linux-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
    sha:55f19404a58123b7d90513fb6ecd05e5440bd31c
  • linux-tools-common_4.4.0-278.312_all.deb
    sha:53c2e779596727682ce47d354162397abba24c59
  • linux-tools-host_4.4.0-278.312_all.deb
    sha:6e8fcacafa328f3e89b9d8b126ef64c7b67b31d1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.