[CLSA-2025:1760983231] Fix of 25 CVEs
Type:
security
Severity:
Important
Release date:
2025-10-20 18:00:35 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-41069 - ASoC: topology: Fix references to freed memory - ASoC: topology: Do not assign fields that are already set - ASoC: topology: Clean up route loading * Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE- url: https://ubuntu.com/security/CVE-2021-47149 - net: fujitsu: fix potential null-ptr-deref * CVE-url: https://ubuntu.com/security/CVE-2024-35849 - btrfs: fix information leak in btrfs_ioctl_logical_to_ino() * CVE-url: https://ubuntu.com/security/CVE-2025-38618 - vsock: Do not allow binding to VMADDR_PORT_ANY * CVE-url: https://ubuntu.com/security/CVE-2025-38617 - net/packet: fix a race in packet_set_ring() and packet_notifier() * CVE-url: https://ubuntu.com/security/CVE-2025-21796 - nfsd: clear acl_access/acl_default after releasing them * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47319 - virtio-blk: Fix memory leak among suspend/resume procedure * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-49924 // CVE-url: https://ubuntu.com/security/CVE-2024-49924 - fbdev: pxafb: Fix possible use after free in pxafb_task() * CVE-url: https://ubuntu.com/security/CVE-2022-48827 - NFSD: Fix the behavior of READ near OFFSET_MAX * Bionic update: upstream stable patchset 2022-03-04 (LP: #1963717) // CVE- url: https://ubuntu.com/security/CVE-2022-48737 - ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() - ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() * Focal update: v5.4.261 upstream stable release (LP: #2049049) // CVE-url: https://ubuntu.com/security/CVE-2023-52868 - thermal: core: prevent potential string overflow * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE- url: https://ubuntu.com/security/CVE-2021-47633 - ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 * CVE-url: https://ubuntu.com/security/CVE-2021-47391 - RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests * Bionic update: upstream stable patchset 2021-12-03 (LP: #1953202) // CVE- url: https://ubuntu.com/security/CVE-2021-47475 - comedi: vmk80xx: fix transfer-buffer overflows - comedi: vmk80xx: fix bulk-buffer overflow - comedi: vmk80xx: fix bulk and interrupt message timeouts * Bionic update: upstream stable patchset 2021-11-12 (LP: #1950816) // CVE- url: https://ubuntu.com/security/CVE-2021-47497 - nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells * CVE-2024-35965 // CVE-url: https://ubuntu.com/security/CVE-2024-35965 - Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt() - Bluetooth: L2CAP: Fix not validating setsockopt user input * CVE-url: https://ubuntu.com/security/CVE-2024-56616 - drm/dp_mst: Fix MST sideband message body length check * Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE- url: https://ubuntu.com/security/CVE-2022-49407 - dlm: fix plock invalid read * Focal update: v5.4.188 upstream stable release (LP: #1971496) // CVE-url: https://ubuntu.com/security/CVE-2022-49292 - ALSA: oss: Fix PCM OSS buffer allocation overflow * Focal update: v5.4.262 upstream stable release (LP: #2049069) // CVE-url: https://ubuntu.com/security/CVE-2023-52835 - perf/core: Bail out early if the request AUX area is out of bound * Focal update: v5.4.262 upstream stable release (LP: #2049069) // CVE-url: https://ubuntu.com/security/CVE-2023-52764 - media: gspca: cpia1: shift-out-of-bounds in set_flicker * CVE-2024-35966 // CVE-url: https://ubuntu.com/security/CVE-2024-35966 - Bluetooth: RFCOMM: Fix not validating setsockopt user input * CVE-2024-35967 // CVE-url: https://ubuntu.com/security/CVE-2024-35966 - Bluetooth: SCO: Fix not validating setsockopt user input * Focal update: v5.4.291 upstream stable release (LP: #2106002) // CVE-2025-21704 // CVE-url: https://ubuntu.com/security/CVE-2025-21704 - usb: cdc-acm: Check control transfer buffer size before access * CVE-url: https://ubuntu.com/security/CVE-2025-21704 - cdc-acm: reassemble fragmented notifications * CVE-url: https://ubuntu.com/security/CVE-2025-37798 - sch_drr: make drr_qlen_notify() idempotent - sch_htb: make htb_qlen_notify() idempotent - sch_hfsc: make hfsc_qlen_notify() idempotent - sch_qfq: make qfq_qlen_notify() idempotent
Updated packages:
  • linux-buildinfo-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:e5ff42fd08ed64596ca3992b52ce8d06c3852a11
  • linux-buildinfo-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:6b411013f9d962906430b9ea0490ad7373701e92
  • linux-cloud-tools-4.4.0-279-tuxcare.els50_4.4.0-279.313_amd64.deb
    sha:cfbc40b58129e2e895ae82ce2ef8eff785aacdf2
  • linux-cloud-tools-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:2b2856fc6e3c963a23b0e5e0f17f2255f0f885a1
  • linux-cloud-tools-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:ace067095900f6fddb4d9e59a74bba88fd545126
  • linux-cloud-tools-common_4.4.0-279.313_all.deb
    sha:d1285118653fd61a35d56aa4105be76aeb7e16ac
  • linux-cloud-tools-generic_4.4.0.279.313_amd64.deb
    sha:63fbeed75619b2a3bc92b7f8b4beb78121277d26
  • linux-cloud-tools-lowlatency_4.4.0.279.313_amd64.deb
    sha:bc8405f8babf00d5c6efcd1363680c290a40d106
  • linux-crashdump_4.4.0.279.313_amd64.deb
    sha:86b36d150b2bf58bb8af9912e885b7d4f19bd8b7
  • linux-doc_4.4.0-279.313_all.deb
    sha:1532a29d84359f09221bf98efb5382a6dafc0b14
  • linux-generic_4.4.0.279.313_amd64.deb
    sha:425ad7a1fa3ab09e9f9d1b883ecb21c4b4b13c88
  • linux-headers-4.4.0-279-tuxcare.els50_4.4.0-279.313_all.deb
    sha:71644ec738e537b029edc0f2e208a656c97a22c7
  • linux-headers-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:4018d57941ccf5337f5116b30f99ea2ae0a824a7
  • linux-headers-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:a136b786ce7643d3c636070b4fd350c5594d06a3
  • linux-headers-generic_4.4.0.279.313_amd64.deb
    sha:4c38ee599a51990ba252ffe296da011d4158524f
  • linux-headers-lowlatency_4.4.0.279.313_amd64.deb
    sha:01bff5971cc19efff61bc2056a9854c2953f5aa6
  • linux-image-generic_4.4.0.279.313_amd64.deb
    sha:cfc7e3aecb33e2c0ee35f8b18936223903b7689e
  • linux-image-lowlatency_4.4.0.279.313_amd64.deb
    sha:ceaf9238c9ef1680f4c7d89cc31ac74525954099
  • linux-image-unsigned-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:5e4c4ec72331bee155f36d85c1d0c11869ca6fd3
  • linux-image-unsigned-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:683670e1f6ad0fefa35935002704018143878ce1
  • linux-libc-dev_4.4.0-279.313_amd64.deb
    sha:50dce930c59863df5eedbd1dd7443d054aed2982
  • linux-lowlatency_4.4.0.279.313_amd64.deb
    sha:a974c293eac1afadded50233af99060d1ecdc663
  • linux-modules-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:eb220628a98c84e7935a00200066547492bac107
  • linux-modules-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:ee2b3402f41d04e778b9f74891e68398ec88e72c
  • linux-modules-extra-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:8878ab0c64808324d5549783f8aaf659ee2030f3
  • linux-source_4.4.0.279.313_all.deb
    sha:0e9f42e4151453302c69748da08cf0e4bd3276ae
  • linux-source-4.4.0_4.4.0-279.313_all.deb
    sha:2f7ecbc107282a88d38fcafa3547ad449b15399a
  • linux-tools-4.4.0-279-tuxcare.els50_4.4.0-279.313_amd64.deb
    sha:f0daaf48f8ecbbd882bccf2c10c94f6caa895492
  • linux-tools-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
    sha:606448fad687a009467d08ca560c4629ac4ab787
  • linux-tools-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
    sha:51c345a5725897095e003db141d13e64781ab611
  • linux-tools-common_4.4.0-279.313_all.deb
    sha:00ea72caf6f5b0b5362c46dd373d6cd0898fa79d
  • linux-tools-generic_4.4.0.279.313_amd64.deb
    sha:b8e1a6ea7ad5066bc4cc6a73f261f1b9354da40f
  • linux-tools-host_4.4.0-279.313_all.deb
    sha:3dceabf40af3d702fb3e51d456c1bbd2cf9e0ab0
  • linux-tools-lowlatency_4.4.0.279.313_amd64.deb
    sha:f119028a1b2882c7942bdd6403764fb4e5f98e21
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.