Release date:
2025-09-16 08:04:00 UTC
Description:
* Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE-
url: https://ubuntu.com/security/CVE-2021-34981
- Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
* CVE-url: https://ubuntu.com/security/CVE-2025-37797
- net_sched: hfsc: Fix a UAF vulnerability in class handling
* CVE-url: https://ubuntu.com/security/CVE-2024-57996 // CVE-url:
https://ubuntu.com/security/CVE-2025-37752
- net_sched: sch_sfq: move the limit validation
* Focal update: v5.4.285 upstream stable release (LP: #2089233) //
CVE-2024-50202 // CVE-url: https://ubuntu.com/security/CVE-2024-50202
- nilfs2: propagate directory read errors from nilfs_find_entry()
* Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url:
https://ubuntu.com/security/CVE-2024-50202
- nilfs2: Remove check for PageError
- nilfs2: return the mapped address from nilfs_get_page()
* CVE-url: https://ubuntu.com/security/CVE-2024-50202
- make ext2_get_page() and friends work without external serialization
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47345
- RDMA/cma: Fix rdma_resolve_route() memory leak
* Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url:
https://ubuntu.com/security/CVE-2024-53131
- nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint
* Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url:
https://ubuntu.com/security/CVE-2024-53130
- nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint
* CVE-url: https://ubuntu.com/security/CVE-2025-37798
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
* CVE-url: https://ubuntu.com/security/CVE-2025-21640
- sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
* CVE-url: https://ubuntu.com/security/CVE-2024-57913
- usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
* CVE-url: https://ubuntu.com/security/CVE-2025-21638
- sctp: sysctl: auth_enable: avoid using current->nsproxy
* CVE-url: https://ubuntu.com/security/CVE-2024-50195
- posix-clock: Fix missing timespec64 check in pc_clock_settime()
* CVE-url: https://ubuntu.com/security/CVE-2024-50299
- sctp: properly validate chunk size in sctp_sf_ootb()
* CVE-url: https://ubuntu.com/security/CVE-2024-41016
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
* CVE-url: https://ubuntu.com/security/CVE-2024-50287
- media: v4l2-tpg: prevent the risk of a division by zero
* CVE-url: https://ubuntu.com/security/CVE-2024-49965
- ocfs2: remove unreasonable unlock in ocfs2_read_blocks
* CVE-url: https://ubuntu.com/security/CVE-2024-50179
- ceph: remove the incorrect Fw reference check when dirtying pages
* CVE-url: https://ubuntu.com/security/CVE-2024-40953
- KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
* CVE-url: https://ubuntu.com/security/CVE-2024-50290
- media: cx24116: prevent overflows on SNR calculus
* CVE-url: https://ubuntu.com/security/CVE-2024-49877
- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate
* CVE-url: https://ubuntu.com/security/CVE-2024-50008
- wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_cmd_802_11_scan_ext()
* CVE-url: https://ubuntu.com/security/CVE-2024-49959
- jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
* CVE-url: https://ubuntu.com/security/CVE-2024-49963
- mailbox: bcm2835: Fix timeout during suspend mode
* CVE-url: https://ubuntu.com/security/CVE-2024-47709
- can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().
* CVE-url: https://ubuntu.com/security/CVE-2025-21699
- gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag
* CVE-url: https://ubuntu.com/security/CVE-2025-21689
- USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
* CVE-url: https://ubuntu.com/security/CVE-2024-53101
- fs: Fix uninitialized value issue in from_kuid and from_kgid
Updated packages:
-
linux-buildinfo-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:1b8c75c749cd6ad9a4a750919eabfcad30102d60
-
linux-buildinfo-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:b80a1dbfe5535e278bc88649e7f7ae4897d416f4
-
linux-cloud-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb
sha:07cc4a508af1fb9865c0af7f037c01f95074a93c
-
linux-cloud-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:8416ccbe2eee479e2d3e2cbf8130df245009f04f
-
linux-cloud-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:f612a3c28991b332b2fad0eadcbd52508ecfc7a4
-
linux-cloud-tools-common_4.4.0-278.312_all.deb
sha:d79cce0c0a53b3ef088254db9b7f965a0cbcdc0b
-
linux-doc_4.4.0-278.312_all.deb
sha:01d1970c372dbf84bbe5e47e5183233c904e9d7d
-
linux-headers-4.4.0-278-tuxcare.els49_4.4.0-278.312_all.deb
sha:050580ea704fa49249652298796c781f3eee5ca7
-
linux-headers-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:384cd4b6948e08c0bb6a7e8cf54ac14d3b3a0d51
-
linux-headers-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:68d6ec7fb8bca3ae5b205e686291d35374a19257
-
linux-image-unsigned-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:65406a7885d58bfed43f48ae631b5915c4b98e45
-
linux-image-unsigned-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:a9924df4a1ca89c2cc178b18478ed5659d9f4aaf
-
linux-libc-dev_4.4.0-278.312_amd64.deb
sha:8d8bc53e8081018494c9d961f20ec2e9a17d3089
-
linux-modules-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:764c0c62a51aaa99a0f3158a227e7be2ac4bd624
-
linux-modules-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:bf713df713c2b07c424a64ea4ca66a015ab98e6d
-
linux-modules-extra-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:505ea488c34e264a36a61355834343e87cad39de
-
linux-source-4.4.0_4.4.0-278.312_all.deb
sha:3bfb59be4f8dac1073ff85bd397e176b054f79a5
-
linux-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb
sha:3a4412d4a52c81b3e889610dd7ab261a577c6412
-
linux-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb
sha:2e35d04b8d3a757ffef85ede0467577a5f742b3b
-
linux-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb
sha:55f19404a58123b7d90513fb6ecd05e5440bd31c
-
linux-tools-common_4.4.0-278.312_all.deb
sha:53c2e779596727682ce47d354162397abba24c59
-
linux-tools-host_4.4.0-278.312_all.deb
sha:6e8fcacafa328f3e89b9d8b126ef64c7b67b31d1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.