Release date:
2025-10-20 18:00:35 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-41069
- ASoC: topology: Fix references to freed memory
- ASoC: topology: Do not assign fields that are already set
- ASoC: topology: Clean up route loading
* Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE-
url: https://ubuntu.com/security/CVE-2021-47149
- net: fujitsu: fix potential null-ptr-deref
* CVE-url: https://ubuntu.com/security/CVE-2024-35849
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
* CVE-url: https://ubuntu.com/security/CVE-2025-38618
- vsock: Do not allow binding to VMADDR_PORT_ANY
* CVE-url: https://ubuntu.com/security/CVE-2025-38617
- net/packet: fix a race in packet_set_ring() and packet_notifier()
* CVE-url: https://ubuntu.com/security/CVE-2025-21796
- nfsd: clear acl_access/acl_default after releasing them
* Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE-
url: https://ubuntu.com/security/CVE-2021-47319
- virtio-blk: Fix memory leak among suspend/resume procedure
* Focal update: v5.4.285 upstream stable release (LP: #2089233) //
CVE-2024-49924 // CVE-url: https://ubuntu.com/security/CVE-2024-49924
- fbdev: pxafb: Fix possible use after free in pxafb_task()
* CVE-url: https://ubuntu.com/security/CVE-2022-48827
- NFSD: Fix the behavior of READ near OFFSET_MAX
* Bionic update: upstream stable patchset 2022-03-04 (LP: #1963717) // CVE-
url: https://ubuntu.com/security/CVE-2022-48737
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
* Focal update: v5.4.261 upstream stable release (LP: #2049049) // CVE-url:
https://ubuntu.com/security/CVE-2023-52868
- thermal: core: prevent potential string overflow
* Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE-
url: https://ubuntu.com/security/CVE-2021-47633
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
* CVE-url: https://ubuntu.com/security/CVE-2021-47391
- RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests
* Bionic update: upstream stable patchset 2021-12-03 (LP: #1953202) // CVE-
url: https://ubuntu.com/security/CVE-2021-47475
- comedi: vmk80xx: fix transfer-buffer overflows
- comedi: vmk80xx: fix bulk-buffer overflow
- comedi: vmk80xx: fix bulk and interrupt message timeouts
* Bionic update: upstream stable patchset 2021-11-12 (LP: #1950816) // CVE-
url: https://ubuntu.com/security/CVE-2021-47497
- nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
* CVE-2024-35965 // CVE-url: https://ubuntu.com/security/CVE-2024-35965
- Bluetooth: L2CAP: uninitialized variables in l2cap_sock_setsockopt()
- Bluetooth: L2CAP: Fix not validating setsockopt user input
* CVE-url: https://ubuntu.com/security/CVE-2024-56616
- drm/dp_mst: Fix MST sideband message body length check
* Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE-
url: https://ubuntu.com/security/CVE-2022-49407
- dlm: fix plock invalid read
* Focal update: v5.4.188 upstream stable release (LP: #1971496) // CVE-url:
https://ubuntu.com/security/CVE-2022-49292
- ALSA: oss: Fix PCM OSS buffer allocation overflow
* Focal update: v5.4.262 upstream stable release (LP: #2049069) // CVE-url:
https://ubuntu.com/security/CVE-2023-52835
- perf/core: Bail out early if the request AUX area is out of bound
* Focal update: v5.4.262 upstream stable release (LP: #2049069) // CVE-url:
https://ubuntu.com/security/CVE-2023-52764
- media: gspca: cpia1: shift-out-of-bounds in set_flicker
* CVE-2024-35966 // CVE-url: https://ubuntu.com/security/CVE-2024-35966
- Bluetooth: RFCOMM: Fix not validating setsockopt user input
* CVE-2024-35967 // CVE-url: https://ubuntu.com/security/CVE-2024-35966
- Bluetooth: SCO: Fix not validating setsockopt user input
* Focal update: v5.4.291 upstream stable release (LP: #2106002) //
CVE-2025-21704 // CVE-url: https://ubuntu.com/security/CVE-2025-21704
- usb: cdc-acm: Check control transfer buffer size before access
* CVE-url: https://ubuntu.com/security/CVE-2025-21704
- cdc-acm: reassemble fragmented notifications
* CVE-url: https://ubuntu.com/security/CVE-2025-37798
- sch_drr: make drr_qlen_notify() idempotent
- sch_htb: make htb_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
Updated packages:
-
linux-buildinfo-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:e5ff42fd08ed64596ca3992b52ce8d06c3852a11
-
linux-buildinfo-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:6b411013f9d962906430b9ea0490ad7373701e92
-
linux-cloud-tools-4.4.0-279-tuxcare.els50_4.4.0-279.313_amd64.deb
sha:cfbc40b58129e2e895ae82ce2ef8eff785aacdf2
-
linux-cloud-tools-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:2b2856fc6e3c963a23b0e5e0f17f2255f0f885a1
-
linux-cloud-tools-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:ace067095900f6fddb4d9e59a74bba88fd545126
-
linux-cloud-tools-common_4.4.0-279.313_all.deb
sha:d1285118653fd61a35d56aa4105be76aeb7e16ac
-
linux-cloud-tools-generic_4.4.0.279.313_amd64.deb
sha:63fbeed75619b2a3bc92b7f8b4beb78121277d26
-
linux-cloud-tools-lowlatency_4.4.0.279.313_amd64.deb
sha:bc8405f8babf00d5c6efcd1363680c290a40d106
-
linux-crashdump_4.4.0.279.313_amd64.deb
sha:86b36d150b2bf58bb8af9912e885b7d4f19bd8b7
-
linux-doc_4.4.0-279.313_all.deb
sha:1532a29d84359f09221bf98efb5382a6dafc0b14
-
linux-generic_4.4.0.279.313_amd64.deb
sha:425ad7a1fa3ab09e9f9d1b883ecb21c4b4b13c88
-
linux-headers-4.4.0-279-tuxcare.els50_4.4.0-279.313_all.deb
sha:71644ec738e537b029edc0f2e208a656c97a22c7
-
linux-headers-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:4018d57941ccf5337f5116b30f99ea2ae0a824a7
-
linux-headers-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:a136b786ce7643d3c636070b4fd350c5594d06a3
-
linux-headers-generic_4.4.0.279.313_amd64.deb
sha:4c38ee599a51990ba252ffe296da011d4158524f
-
linux-headers-lowlatency_4.4.0.279.313_amd64.deb
sha:01bff5971cc19efff61bc2056a9854c2953f5aa6
-
linux-image-generic_4.4.0.279.313_amd64.deb
sha:cfc7e3aecb33e2c0ee35f8b18936223903b7689e
-
linux-image-lowlatency_4.4.0.279.313_amd64.deb
sha:ceaf9238c9ef1680f4c7d89cc31ac74525954099
-
linux-image-unsigned-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:5e4c4ec72331bee155f36d85c1d0c11869ca6fd3
-
linux-image-unsigned-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:683670e1f6ad0fefa35935002704018143878ce1
-
linux-libc-dev_4.4.0-279.313_amd64.deb
sha:50dce930c59863df5eedbd1dd7443d054aed2982
-
linux-lowlatency_4.4.0.279.313_amd64.deb
sha:a974c293eac1afadded50233af99060d1ecdc663
-
linux-modules-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:eb220628a98c84e7935a00200066547492bac107
-
linux-modules-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:ee2b3402f41d04e778b9f74891e68398ec88e72c
-
linux-modules-extra-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:8878ab0c64808324d5549783f8aaf659ee2030f3
-
linux-source_4.4.0.279.313_all.deb
sha:0e9f42e4151453302c69748da08cf0e4bd3276ae
-
linux-source-4.4.0_4.4.0-279.313_all.deb
sha:2f7ecbc107282a88d38fcafa3547ad449b15399a
-
linux-tools-4.4.0-279-tuxcare.els50_4.4.0-279.313_amd64.deb
sha:f0daaf48f8ecbbd882bccf2c10c94f6caa895492
-
linux-tools-4.4.0-279-tuxcare.els50-generic_4.4.0-279.313_amd64.deb
sha:606448fad687a009467d08ca560c4629ac4ab787
-
linux-tools-4.4.0-279-tuxcare.els50-lowlatency_4.4.0-279.313_amd64.deb
sha:51c345a5725897095e003db141d13e64781ab611
-
linux-tools-common_4.4.0-279.313_all.deb
sha:00ea72caf6f5b0b5362c46dd373d6cd0898fa79d
-
linux-tools-generic_4.4.0.279.313_amd64.deb
sha:b8e1a6ea7ad5066bc4cc6a73f261f1b9354da40f
-
linux-tools-host_4.4.0-279.313_all.deb
sha:3dceabf40af3d702fb3e51d456c1bbd2cf9e0ab0
-
linux-tools-lowlatency_4.4.0.279.313_amd64.deb
sha:f119028a1b2882c7942bdd6403764fb4e5f98e21
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.