[CLSA-2024:1706617379] Fix of 12 CVEs
Type:
security
Severity:
Important
Release date:
2024-01-30 12:23:02 UTC
Description:
* Jammy update: v5.15.140 upstream stable release (LP: #2050038) // CVE-url: https://ubuntu.com/security/CVE-2024-0607 - netfilter: nf_tables: fix pointer math issue in nft_byteorder_eval() * CVE-url: https://ubuntu.com/security/CVE-2024-0607 - netfilter: nf_tables: Introduce new 64-bit helper register functions * Focal update: Focal update: v5.4.235 upstream stable release (LP: #2017706) // CVE-url: https://ubuntu.com/security/CVE-2023-1079 - HID: asus: Remove check for same LED brightness on set - HID: asus: use spinlock to protect concurrent accesses - HID: asus: use spinlock to safely schedule workers * CVE-url: https://ubuntu.com/security/CVE-2022-36402 - drm/vmwgfx: Add SM4_1 flag - drm/vmwgfx: Add support for SVGA3dCmdDefineGBSurface_v3 - drm/vmwgfx: Add CAP2 support in vmwgfx - drm/vmwgfx: Bump version patchlevel and date - drm/vmwgfx: Expose SM4_1 param to user space - drm/vmwgfx: Update the device headers - drm/vmwgfx: Fix shader stage validation * CVE-url: https://ubuntu.com/security/CVE-2024-0639 - sctp: fix potential deadlock on &net->sctp.addr_wq_lock * CVE-url: https://ubuntu.com/security/CVE-2023-6915 - ida: Fix crash in ida_free when the bitmap is empty * CVE-url: https://ubuntu.com/security/CVE-2023-6040 - netfilter: nf_tables: Reject tables of unsupported family * CVE-url: https://ubuntu.com/security/CVE-2023-51780 - atm: Fix Use-After-Free in do_vcc_ioctl * CVE-url: https://ubuntu.com/security/CVE-2023-51782 - net/rose: Fix Use-After-Free in rose_ioctl * CVE-url: https://ubuntu.com/security/CVE-2023-51781 - appletalk: Fix Use-After-Free in atalk_ioctl * CVE-url: https://ubuntu.com/security/CVE-2024-0340 - vhost: use kzalloc() instead of kmalloc() followed by memset() * CVE-2023-51779 // CVE-url: https://ubuntu.com/security/CVE-2023-51779 - Bluetooth: af_bluetooth: Fix Use-After-Free in bt_sock_recvmsg * Jammy update: v5.15.135 upstream stable release (LP: #2045809) // CVE-url: https://ubuntu.com/security/CVE-2023-34324 - xen/events: replace evtchn_rwlock with RCU * Miscellaneous upstream changes - drm/vmwgfx: Use enum to represent graphics context capabilities
Updated packages:
  • linux-buildinfo-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:08235b6d046208a6cb993392b41b1424cd032ee1
  • linux-buildinfo-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:cf15c6995f9174db4ea236de46f44cdbd4cddb8f
  • linux-cloud-tools-4.15.0-223-tuxcare.els11_4.15.0-223.234_amd64.deb
    sha:decd358e44c4fc0d17a6d1d9d108931b27aa031a
  • linux-cloud-tools-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:6a7ceddec872cb2713a884e8c1479b21c482f7fa
  • linux-cloud-tools-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:ab62215d17b901167184e29a2a4713d01b85dcef
  • linux-cloud-tools-common_4.15.0-223.234_all.deb
    sha:44a59940bb3a341ffa5c6fecd68ececac781301c
  • linux-cloud-tools-generic_4.15.0.223.234_amd64.deb
    sha:28b1e5152bbae2e13b00bf236be4361b13c2de74
  • linux-cloud-tools-lowlatency_4.15.0.223.234_amd64.deb
    sha:3affce90ed59e900828dcf71a1fd0ab7b64430bf
  • linux-crashdump_4.15.0.223.234_amd64.deb
    sha:f090b65f0e613c376f6d5e3771305cca37a71ab5
  • linux-doc_4.15.0-223.234_all.deb
    sha:4e68dced51b0eb571df47d2898ff08f0cb8e672a
  • linux-generic_4.15.0.223.234_amd64.deb
    sha:fba64ef1575a752df6625804686209b0e73cccd9
  • linux-headers-4.15.0-223-tuxcare.els11_4.15.0-223.234_all.deb
    sha:7eb8a565c99019b39da777360cd65abcb5b64fdc
  • linux-headers-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:0d8693e16534e833baa86268f115246ba79b654f
  • linux-headers-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:9af048c1875845c13c5d93f4070fcdb289f84d5a
  • linux-headers-generic_4.15.0.223.234_amd64.deb
    sha:b83ecd93f85b4e2ef0725b5f586e374c8f2cdde7
  • linux-headers-lowlatency_4.15.0.223.234_amd64.deb
    sha:1518779e2f1b667a4bae0098229c17bf9e7a6ba7
  • linux-image-generic_4.15.0.223.234_amd64.deb
    sha:26530a6278b39dbcae06f87ec332c401b25a0128
  • linux-image-lowlatency_4.15.0.223.234_amd64.deb
    sha:232195be5a119605d4fb42e3c9e66c1e69366cf4
  • linux-image-unsigned-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:47dcf8a94caa1db97c23291c0b6f30c714bec8d8
  • linux-image-unsigned-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:ff76141a09420cf19557bf2b49a179fdfd33fdb6
  • linux-libc-dev_4.15.0-223.234_amd64.deb
    sha:28d5663e019fdb8c70e12235a7a1449b4b7ab233
  • linux-lowlatency_4.15.0.223.234_amd64.deb
    sha:f315157b0cda18f0374ab135522cba23baa4ba98
  • linux-modules-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:4882f4a9c62eac99bbde8a3ecf024ba457497c3d
  • linux-modules-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:8a6664b407f4b5bbd119aee8ce6dae5371b50f05
  • linux-modules-extra-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:ad496842ad461db6fa2f96669c0cd7a7d125dd39
  • linux-source_4.15.0.223.234_all.deb
    sha:0408f1738edacb5c85fa300dea39c57df7cbc1ef
  • linux-source-4.15.0_4.15.0-223.234_all.deb
    sha:8e8b9a5667fa3b3cf9efabc2d3ed02909558827d
  • linux-tools-4.15.0-223-tuxcare.els11_4.15.0-223.234_amd64.deb
    sha:fa33c917ca4c3638d72f91a405abc1c968584352
  • linux-tools-4.15.0-223-tuxcare.els11-generic_4.15.0-223.234_amd64.deb
    sha:ebbf9ba0ba354e6f7f5d693a4b64c3909a74b66a
  • linux-tools-4.15.0-223-tuxcare.els11-lowlatency_4.15.0-223.234_amd64.deb
    sha:1d274ea9de3dba97589b99bb0dc0b3e340554590
  • linux-tools-common_4.15.0-223.234_all.deb
    sha:53cbd152212f3d4347ca025a7bf738b32563f3e5
  • linux-tools-generic_4.15.0.223.234_amd64.deb
    sha:8dbeb3dfb8864feb735ce202f1a1e346c66e6f86
  • linux-tools-host_4.15.0-223.234_all.deb
    sha:b1c46c8e90830f485b5c42615642c2493a1c966e
  • linux-tools-lowlatency_4.15.0.223.234_amd64.deb
    sha:277022f90ca241b3dfaea808b8bdfbe9b42b6d9d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.