[CLSA-2024:1716270232] Fix of 48 CVEs
Type:
security
Severity:
Important
Release date:
2024-05-21 05:43:54 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2023-47233 - wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach * CVE-url: https://ubuntu.com/security/CVE-2023-52601 - jfs: Fix memleak in dbAdjCtl * CVE-url: https://ubuntu.com/security/CVE-2024-26801 - Bluetooth: Avoid potential use-after-free in hci_error_reset * CVE-url: https://ubuntu.com/security/CVE-2024-26805 - netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter * CVE-url: https://ubuntu.com/security/CVE-2024-26735 - ipv6: sr: fix possible use-after-free and null-ptr-deref * CVE-url: https://ubuntu.com/security/CVE-2023-52566 - nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() * CVE-url: https://ubuntu.com/security/CVE-2021-46981 - nbd: Fix NULL pointer in flush_workqueue * CVE-url: https://ubuntu.com/security/CVE-2024-26622 - tomoyo: fix UAF write bug in tomoyo_write_control() * CVE-url: https://ubuntu.com/security/CVE-2024-26614 - tcp: make sure init the accept_queue's spinlocks once - ipv6: init the accept_queue's spinlocks in inet6_create * CVE-url: https://ubuntu.com/security/CVE-2023-52530 - wifi: mac80211: fix potential key use-after-free * CVE-url: https://ubuntu.com/security/CVE-2023-52524 - net: nfc: llcp: Add lock when modifying device list * CVE-url: https://ubuntu.com/security/CVE-2021-47173 - misc/uss720: fix memory leak in uss720_probe * CVE-url: https://ubuntu.com/security/CVE-2024-26910 - timers: Get rid of del_singleshot_timer_sync() - timers: Update kernel-doc for various functions - timers: Use del_timer_sync() even on UP - timers: Rename del_timer_sync() to timer_delete_sync() - timers: Rename del_timer() to timer_delete() - timers: Silently ignore timers with a NULL function - timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode - timers: Add shutdown mechanism to the internal functions - timers: Provide timer_shutdown[_sync]() - netfilter: ipset: fix performance regression in swap operation * CVE-url: https://ubuntu.com/security/CVE-2023-52595 - rt2x00: clear IV's on start to fix AP mode regression - wifi: rt2x00: restart beacon queue when hardware reset * CVE-url: https://ubuntu.com/security/CVE-2023-52617 - switchtec: Improve MRPC efficiency by enabling write combining - switchtec: Add MRPC DMA mode support - PCI: switchtec: Fix stdev_release() crash after surprise hot remove * CVE-url: https://ubuntu.com/security/CVE-2024-26696 - nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() * CVE-url: https://ubuntu.com/security/CVE-2024-26685 - nilfs2: fix potential bug in end_buffer_async_write * CVE-url: https://ubuntu.com/security/CVE-2024-26625 - llc: call sock_orphan() at release time * CVE-url: https://ubuntu.com/security/CVE-2023-52615 - hwrng: core - Fix page fault dead lock on mmap-ed hwrng * CVE-url: https://ubuntu.com/security/CVE-2023-52486 - drm: Don't unref the same fb many times by mistake due to deadlock handling * CVE-url: https://ubuntu.com/security/CVE-2024-26920 - tracing/trigger: Fix to return error if failed to alloc snapshot * CVE-url: https://ubuntu.com/security/CVE-2024-26697 - nilfs2: fix data corruption in dsync block recovery for small block sizes * CVE-url: https://ubuntu.com/security/CVE-2024-26679 - inet: read sk->sk_family once in inet_recv_error() * CVE-url: https://ubuntu.com/security/CVE-2023-52622 - ext4: remove unnecessary check from alloc_flex_gd() - ext4: avoid online resizing failures due to oversized flex bg * CVE-url: https://ubuntu.com/security/CVE-2024-26635 - llc: Drop support for ETH_P_TR_802_2. * CVE-url: https://ubuntu.com/security/CVE-2023-52594 - wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() * CVE-url: https://ubuntu.com/security/CVE-2023-52583 - ceph: fix deadlock or deadcode of misusing dget() * CVE-url: https://ubuntu.com/security/CVE-2024-26720 - mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again * CVE-url: https://ubuntu.com/security/CVE-2024-26825 - nfc: nci: free rx_data_reassembly skb on NCI device cleanup * CVE-url: https://ubuntu.com/security/CVE-2024-26671 - blk-mq: fix IO hang from sbitmap wakeup race * CVE-url: https://ubuntu.com/security/CVE-2024-26675 - ppp_async: limit MRU to 64K * CVE-url: https://ubuntu.com/security/CVE-2024-26663 - tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() * CVE-url: https://ubuntu.com/security/CVE-2023-52602 - jfs: fix slab-out-of-bounds Read in dtSearch * CVE-url: https://ubuntu.com/security/CVE-2024-26704 - ext4: fix double-free of blocks due to wrong extents moved_len * CVE-url: https://ubuntu.com/security/CVE-2023-52619 - pstore/ram: Fix crash when setting number of cpus to an odd number * CVE-url: https://ubuntu.com/security/CVE-2024-26636 - llc: make llc_ui_sendmsg() more robust against bonding changes * CVE-url: https://ubuntu.com/security/CVE-2023-52587 - IB/ipoib: Fix mcast list locking * CVE-url: https://ubuntu.com/security/CVE-2023-52601 // CVE-url: https://ubuntu.com/security/CVE-2023-52604 - jfs: fix array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2023-52604 - FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2023-52623 - SUNRPC: Fix a suspicious RCU usage warning * CVE-url: https://ubuntu.com/security/CVE-2023-52599 - jfs: fix array-index-out-of-bounds in diNewExt * CVE-url: https://ubuntu.com/security/CVE-2024-26884 - bpf: Fix hashtab overflow check on 32-bit arches * CVE-url: https://ubuntu.com/security/CVE-2024-26883 - bpf: Fix stackmap overflow check on 32-bit arches * CVE-url: https://ubuntu.com/security/CVE-2024-26882 - net: add atomic_long_t to net_device_stats fields - net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() * CVE-url: https://ubuntu.com/security/CVE-2024-26908 - x86/xen: Add some null pointer checking to smp.c * CVE-url: https://ubuntu.com/security/CVE-2024-26904 - btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve * CVE-url: https://ubuntu.com/security/CVE-2024-26903 - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security * CVE-url: https://ubuntu.com/security/CVE-2024-26901 - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak * CVE-url: https://ubuntu.com/security/CVE-2024-26898 - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
Updated packages:
  • linux-buildinfo-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:2ea36646ad79f45877c52f3335ca924df99e4a7e
  • linux-buildinfo-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:fc491224f4a1a39834d774bd2220b9b0e62b87e1
  • linux-cloud-tools-4.15.0-228-tuxcare.els16_4.15.0-228.239_amd64.deb
    sha:bbae36d9d5a7712ee18d1d665bc3b398dddc90e2
  • linux-cloud-tools-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:0689ae4d055dd849f933225c74f7b31cd151c747
  • linux-cloud-tools-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:e5897a674895855fcbbf8e7dce8ddb87fbf85a14
  • linux-cloud-tools-common_4.15.0-228.239_all.deb
    sha:a4b95149495ac6560995efa387e34dafb1522642
  • linux-cloud-tools-generic_4.15.0.228.239_amd64.deb
    sha:e39bddc4f60c6f8d16f6eb6e2e1690e80538e24a
  • linux-cloud-tools-lowlatency_4.15.0.228.239_amd64.deb
    sha:37c860e4370300aac76777a1bf3f5f5b2f9ca521
  • linux-crashdump_4.15.0.228.239_amd64.deb
    sha:789713917e9748e033a54760efb503a304b69d45
  • linux-doc_4.15.0-228.239_all.deb
    sha:fd8dcdc6d93474f584f266608fc4472ea45d5123
  • linux-generic_4.15.0.228.239_amd64.deb
    sha:2e585ecee711e99909d156efe12b9b5f50f6d105
  • linux-headers-4.15.0-228-tuxcare.els16_4.15.0-228.239_all.deb
    sha:58f2cd2cc739d7dd7ff6c9e30cb50cf454e68d92
  • linux-headers-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:ae2d159bff5ebd337b858ba51fa4a9103caad7c7
  • linux-headers-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:1e31d118e07e292685ec43d9c9fda26b4404c35c
  • linux-headers-generic_4.15.0.228.239_amd64.deb
    sha:b8176618d055916c1c739612e6e9beaaa14e52f2
  • linux-headers-lowlatency_4.15.0.228.239_amd64.deb
    sha:96297c74c31320e0f47662f1e035f909b577608a
  • linux-image-generic_4.15.0.228.239_amd64.deb
    sha:a4c8eab8e7f88f0dc22dfa6a917651aa1f60fc7c
  • linux-image-lowlatency_4.15.0.228.239_amd64.deb
    sha:c23584ad22f867805b18c13db9adfe80bacbfa14
  • linux-image-unsigned-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:bbc17c91b8b119893f06933309368f171e4b10df
  • linux-image-unsigned-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:b18fa11fbb4ac16d2e9a9d7ec30e1c97c1a9c0f2
  • linux-libc-dev_4.15.0-228.239_amd64.deb
    sha:4a023a2939db858167ef768bc6df312f6f75f3dd
  • linux-lowlatency_4.15.0.228.239_amd64.deb
    sha:998001520b8725ebb7fb05ca2341351f18c80c03
  • linux-modules-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:1adacd5740438b2c4a25d567ee3e3d47c03e2373
  • linux-modules-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:4c21d4ae6cbc7dd9eefd227775c3fb42eb993497
  • linux-modules-extra-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:35797b1b9256f88a38e01d6ac4a99534ca9d8dc4
  • linux-source_4.15.0.228.239_all.deb
    sha:f2a73319525a92e5f146f1f3be9a315d4def06c7
  • linux-source-4.15.0_4.15.0-228.239_all.deb
    sha:954f3cf10136c08a82feaa9576727fdcf38ddfee
  • linux-tools-4.15.0-228-tuxcare.els16_4.15.0-228.239_amd64.deb
    sha:bbb72701794691f7c47cbdab19406c6a1ea9a3ca
  • linux-tools-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
    sha:61a0e9b31b12505769c19ec4746b4877f8d79b29
  • linux-tools-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
    sha:5af64c47b1c3b6ff4070d9d9c29ab503725d0fdd
  • linux-tools-common_4.15.0-228.239_all.deb
    sha:4d5c837adb72280b733d5914c1c13d77f0aabf36
  • linux-tools-generic_4.15.0.228.239_amd64.deb
    sha:965bf8b4377b144f8524ac9afc190606fef4f120
  • linux-tools-host_4.15.0-228.239_all.deb
    sha:ed462563931885eed68c27dc31ff987de108fc82
  • linux-tools-lowlatency_4.15.0.228.239_amd64.deb
    sha:8d914243737157348f935673acbff5eebfc7c1a3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.