Release date:
2024-05-21 05:43:54 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2023-47233
- wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
* CVE-url: https://ubuntu.com/security/CVE-2023-52601
- jfs: Fix memleak in dbAdjCtl
* CVE-url: https://ubuntu.com/security/CVE-2024-26801
- Bluetooth: Avoid potential use-after-free in hci_error_reset
* CVE-url: https://ubuntu.com/security/CVE-2024-26805
- netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
* CVE-url: https://ubuntu.com/security/CVE-2024-26735
- ipv6: sr: fix possible use-after-free and null-ptr-deref
* CVE-url: https://ubuntu.com/security/CVE-2023-52566
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
* CVE-url: https://ubuntu.com/security/CVE-2021-46981
- nbd: Fix NULL pointer in flush_workqueue
* CVE-url: https://ubuntu.com/security/CVE-2024-26622
- tomoyo: fix UAF write bug in tomoyo_write_control()
* CVE-url: https://ubuntu.com/security/CVE-2024-26614
- tcp: make sure init the accept_queue's spinlocks once
- ipv6: init the accept_queue's spinlocks in inet6_create
* CVE-url: https://ubuntu.com/security/CVE-2023-52530
- wifi: mac80211: fix potential key use-after-free
* CVE-url: https://ubuntu.com/security/CVE-2023-52524
- net: nfc: llcp: Add lock when modifying device list
* CVE-url: https://ubuntu.com/security/CVE-2021-47173
- misc/uss720: fix memory leak in uss720_probe
* CVE-url: https://ubuntu.com/security/CVE-2024-26910
- timers: Get rid of del_singleshot_timer_sync()
- timers: Update kernel-doc for various functions
- timers: Use del_timer_sync() even on UP
- timers: Rename del_timer_sync() to timer_delete_sync()
- timers: Rename del_timer() to timer_delete()
- timers: Silently ignore timers with a NULL function
- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode
- timers: Add shutdown mechanism to the internal functions
- timers: Provide timer_shutdown[_sync]()
- netfilter: ipset: fix performance regression in swap operation
* CVE-url: https://ubuntu.com/security/CVE-2023-52595
- rt2x00: clear IV's on start to fix AP mode regression
- wifi: rt2x00: restart beacon queue when hardware reset
* CVE-url: https://ubuntu.com/security/CVE-2023-52617
- switchtec: Improve MRPC efficiency by enabling write combining
- switchtec: Add MRPC DMA mode support
- PCI: switchtec: Fix stdev_release() crash after surprise hot remove
* CVE-url: https://ubuntu.com/security/CVE-2024-26696
- nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()
* CVE-url: https://ubuntu.com/security/CVE-2024-26685
- nilfs2: fix potential bug in end_buffer_async_write
* CVE-url: https://ubuntu.com/security/CVE-2024-26625
- llc: call sock_orphan() at release time
* CVE-url: https://ubuntu.com/security/CVE-2023-52615
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng
* CVE-url: https://ubuntu.com/security/CVE-2023-52486
- drm: Don't unref the same fb many times by mistake due to deadlock handling
* CVE-url: https://ubuntu.com/security/CVE-2024-26920
- tracing/trigger: Fix to return error if failed to alloc snapshot
* CVE-url: https://ubuntu.com/security/CVE-2024-26697
- nilfs2: fix data corruption in dsync block recovery for small block sizes
* CVE-url: https://ubuntu.com/security/CVE-2024-26679
- inet: read sk->sk_family once in inet_recv_error()
* CVE-url: https://ubuntu.com/security/CVE-2023-52622
- ext4: remove unnecessary check from alloc_flex_gd()
- ext4: avoid online resizing failures due to oversized flex bg
* CVE-url: https://ubuntu.com/security/CVE-2024-26635
- llc: Drop support for ETH_P_TR_802_2.
* CVE-url: https://ubuntu.com/security/CVE-2023-52594
- wifi: ath9k: Fix potential array-index-out-of-bounds read in
ath9k_htc_txstatus()
* CVE-url: https://ubuntu.com/security/CVE-2023-52583
- ceph: fix deadlock or deadcode of misusing dget()
* CVE-url: https://ubuntu.com/security/CVE-2024-26720
- mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again
* CVE-url: https://ubuntu.com/security/CVE-2024-26825
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup
* CVE-url: https://ubuntu.com/security/CVE-2024-26671
- blk-mq: fix IO hang from sbitmap wakeup race
* CVE-url: https://ubuntu.com/security/CVE-2024-26675
- ppp_async: limit MRU to 64K
* CVE-url: https://ubuntu.com/security/CVE-2024-26663
- tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
* CVE-url: https://ubuntu.com/security/CVE-2023-52602
- jfs: fix slab-out-of-bounds Read in dtSearch
* CVE-url: https://ubuntu.com/security/CVE-2024-26704
- ext4: fix double-free of blocks due to wrong extents moved_len
* CVE-url: https://ubuntu.com/security/CVE-2023-52619
- pstore/ram: Fix crash when setting number of cpus to an odd number
* CVE-url: https://ubuntu.com/security/CVE-2024-26636
- llc: make llc_ui_sendmsg() more robust against bonding changes
* CVE-url: https://ubuntu.com/security/CVE-2023-52587
- IB/ipoib: Fix mcast list locking
* CVE-url: https://ubuntu.com/security/CVE-2023-52601 // CVE-url:
https://ubuntu.com/security/CVE-2023-52604
- jfs: fix array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2023-52604
- FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2023-52623
- SUNRPC: Fix a suspicious RCU usage warning
* CVE-url: https://ubuntu.com/security/CVE-2023-52599
- jfs: fix array-index-out-of-bounds in diNewExt
* CVE-url: https://ubuntu.com/security/CVE-2024-26884
- bpf: Fix hashtab overflow check on 32-bit arches
* CVE-url: https://ubuntu.com/security/CVE-2024-26883
- bpf: Fix stackmap overflow check on 32-bit arches
* CVE-url: https://ubuntu.com/security/CVE-2024-26882
- net: add atomic_long_t to net_device_stats fields
- net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
* CVE-url: https://ubuntu.com/security/CVE-2024-26908
- x86/xen: Add some null pointer checking to smp.c
* CVE-url: https://ubuntu.com/security/CVE-2024-26904
- btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve
* CVE-url: https://ubuntu.com/security/CVE-2024-26903
- Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
* CVE-url: https://ubuntu.com/security/CVE-2024-26901
- do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
* CVE-url: https://ubuntu.com/security/CVE-2024-26898
- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
Updated packages:
-
linux-buildinfo-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:2ea36646ad79f45877c52f3335ca924df99e4a7e
-
linux-buildinfo-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:fc491224f4a1a39834d774bd2220b9b0e62b87e1
-
linux-cloud-tools-4.15.0-228-tuxcare.els16_4.15.0-228.239_amd64.deb
sha:bbae36d9d5a7712ee18d1d665bc3b398dddc90e2
-
linux-cloud-tools-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:0689ae4d055dd849f933225c74f7b31cd151c747
-
linux-cloud-tools-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:e5897a674895855fcbbf8e7dce8ddb87fbf85a14
-
linux-cloud-tools-common_4.15.0-228.239_all.deb
sha:a4b95149495ac6560995efa387e34dafb1522642
-
linux-cloud-tools-generic_4.15.0.228.239_amd64.deb
sha:e39bddc4f60c6f8d16f6eb6e2e1690e80538e24a
-
linux-cloud-tools-lowlatency_4.15.0.228.239_amd64.deb
sha:37c860e4370300aac76777a1bf3f5f5b2f9ca521
-
linux-crashdump_4.15.0.228.239_amd64.deb
sha:789713917e9748e033a54760efb503a304b69d45
-
linux-doc_4.15.0-228.239_all.deb
sha:fd8dcdc6d93474f584f266608fc4472ea45d5123
-
linux-generic_4.15.0.228.239_amd64.deb
sha:2e585ecee711e99909d156efe12b9b5f50f6d105
-
linux-headers-4.15.0-228-tuxcare.els16_4.15.0-228.239_all.deb
sha:58f2cd2cc739d7dd7ff6c9e30cb50cf454e68d92
-
linux-headers-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:ae2d159bff5ebd337b858ba51fa4a9103caad7c7
-
linux-headers-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:1e31d118e07e292685ec43d9c9fda26b4404c35c
-
linux-headers-generic_4.15.0.228.239_amd64.deb
sha:b8176618d055916c1c739612e6e9beaaa14e52f2
-
linux-headers-lowlatency_4.15.0.228.239_amd64.deb
sha:96297c74c31320e0f47662f1e035f909b577608a
-
linux-image-generic_4.15.0.228.239_amd64.deb
sha:a4c8eab8e7f88f0dc22dfa6a917651aa1f60fc7c
-
linux-image-lowlatency_4.15.0.228.239_amd64.deb
sha:c23584ad22f867805b18c13db9adfe80bacbfa14
-
linux-image-unsigned-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:bbc17c91b8b119893f06933309368f171e4b10df
-
linux-image-unsigned-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:b18fa11fbb4ac16d2e9a9d7ec30e1c97c1a9c0f2
-
linux-libc-dev_4.15.0-228.239_amd64.deb
sha:4a023a2939db858167ef768bc6df312f6f75f3dd
-
linux-lowlatency_4.15.0.228.239_amd64.deb
sha:998001520b8725ebb7fb05ca2341351f18c80c03
-
linux-modules-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:1adacd5740438b2c4a25d567ee3e3d47c03e2373
-
linux-modules-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:4c21d4ae6cbc7dd9eefd227775c3fb42eb993497
-
linux-modules-extra-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:35797b1b9256f88a38e01d6ac4a99534ca9d8dc4
-
linux-source_4.15.0.228.239_all.deb
sha:f2a73319525a92e5f146f1f3be9a315d4def06c7
-
linux-source-4.15.0_4.15.0-228.239_all.deb
sha:954f3cf10136c08a82feaa9576727fdcf38ddfee
-
linux-tools-4.15.0-228-tuxcare.els16_4.15.0-228.239_amd64.deb
sha:bbb72701794691f7c47cbdab19406c6a1ea9a3ca
-
linux-tools-4.15.0-228-tuxcare.els16-generic_4.15.0-228.239_amd64.deb
sha:61a0e9b31b12505769c19ec4746b4877f8d79b29
-
linux-tools-4.15.0-228-tuxcare.els16-lowlatency_4.15.0-228.239_amd64.deb
sha:5af64c47b1c3b6ff4070d9d9c29ab503725d0fdd
-
linux-tools-common_4.15.0-228.239_all.deb
sha:4d5c837adb72280b733d5914c1c13d77f0aabf36
-
linux-tools-generic_4.15.0.228.239_amd64.deb
sha:965bf8b4377b144f8524ac9afc190606fef4f120
-
linux-tools-host_4.15.0-228.239_all.deb
sha:ed462563931885eed68c27dc31ff987de108fc82
-
linux-tools-lowlatency_4.15.0.228.239_amd64.deb
sha:8d914243737157348f935673acbff5eebfc7c1a3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.