Release date:
2024-07-22 14:46:47 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-35902
- net/rds: fix possible cp null dereference
* CVE-url: https://ubuntu.com/security/CVE-2024-38587
- speakup: Fix sizeof() vs ARRAY_SIZE() bug
* CVE-url: https://ubuntu.com/security/CVE-2024-39493
- crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
* CVE-url: https://ubuntu.com/security/CVE-2024-38381
- nfc: nci: Fix uninit-value in nci_rx_work
* CVE-url: https://ubuntu.com/security/CVE-2024-26810
- vfio/pci: Lock external INTx masking ops
* CVE-url: https://ubuntu.com/security/CVE-2024-26687
- xen/events: close evtchn after mapping cleanup
* CVE-url: https://ubuntu.com/security/CVE-2024-35893
- net: sched: change type of reference and bind counters
- net: sched: act_skbmod: remove dependency on rtnl lock
- net/sched: act_skbmod: prevent kernel-infoleak
* CVE-url: https://ubuntu.com/security/CVE-2024-35823
- vt: preserve unicode values corresponding to screen characters
- vt: fix unicode buffer corruption when deleting characters
* CVE-url: https://ubuntu.com/security/CVE-2024-35805
- dm snapshot: Replace mutex with rw semaphore
- dm snapshot: fix lockup in dm_exception_table_exit
* CVE-url: https://ubuntu.com/security/CVE-2024-27004
- clk: core: clarify the check for runtime PM
- clk: Get runtime PM before walking tree during disable_unused
* CVE-url: https://ubuntu.com/security/CVE-2024-26852
- net/ipv6: avoid possible UAF in ip6_route_mpath_notify()
* CVE-url: https://ubuntu.com/security/CVE-2023-52620
- netfilter: nf_tables: disallow timeout for anonymous sets
* CVE-url: https://ubuntu.com/security/CVE-2024-25739
- ubi: Check for too small LEB size in VTBL code
* CVE-url: https://ubuntu.com/security/CVE-2024-27437
- genirq: Add IRQF_NO_AUTOEN for request_irq/nmi()
- vfio/pci: Disable auto-enable of exclusive INTx IRQ
* CVE-url: https://ubuntu.com/security/CVE-2022-48627
- vc: separate state
- vt: fix memory overlapping when deleting chars in the buffer
* CVE-url: https://ubuntu.com/security/CVE-2024-35910
- mptcp: add sk_stop_timer_sync helper
- tcp: properly terminate timers for kernel sockets
* CVE-url: https://ubuntu.com/security/CVE-2024-35969
- ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr
* CVE-url: https://ubuntu.com/security/CVE-2024-27024
- RDS: RDMA: Fix the NULL-ptr deref in rds_ib_get_mr
- net/rds: fix WARNING in rds_conn_connect_if_down
* CVE-url: https://ubuntu.com/security/CVE-2024-26863
- hsr: Fix uninit-value access in hsr_get_node()
* CVE-url: https://ubuntu.com/security/CVE-2024-26984
- nouveau: fix instmem race condition around ptr stores
* CVE-url: https://ubuntu.com/security/CVE-2024-36020
- i40e: fix vf may be used uninitialized in this function warning
* CVE-url: https://ubuntu.com/security/CVE-2024-35849
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino()
* CVE-url: https://ubuntu.com/security/CVE-2024-27388
- SUNRPC: fix some memleaks in gssx_dec_option_array
* CVE-url: https://ubuntu.com/security/CVE-2024-35886
- ipv6: Fix infinite recursion in fib6_dump_done().
* CVE-url: https://ubuntu.com/security/CVE-2024-35809
- PCI/PM: Drain runtime-idle callbacks before driver removal
* CVE-url: https://ubuntu.com/security/CVE-2024-26875
- media: pvrusb2: fix uaf in pvr2_context_set_notify
* CVE-url: https://ubuntu.com/security/CVE-2024-26851
- netfilter: nf_conntrack_h323: Add protection for bmp length out of range
* CVE-url: https://ubuntu.com/security/CVE-2024-26999
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood
* CVE-url: https://ubuntu.com/security/CVE-2024-35819
- soc: fsl: qbman: Use raw spinlock for cgr_lock
* CVE-url: https://ubuntu.com/security/CVE-2024-35806
- soc: fsl: qbman: Always disable interrupts when taking cgr_lock
* CVE-url: https://ubuntu.com/security/CVE-2023-52699
- sysv: don't call sb_bread() with pointers_lock held
* CVE-url: https://ubuntu.com/security/CVE-2024-35828
- wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()
* CVE-url: https://ubuntu.com/security/CVE-2024-27001
- comedi: vmk80xx: fix incomplete endpoint checking
* CVE-url: https://ubuntu.com/security/CVE-2024-26878
- quota: Fix potential NULL pointer dereference
* CVE-url: https://ubuntu.com/security/CVE-2024-27008
- drm: nv04: Fix out of bounds access
* CVE-url: https://ubuntu.com/security//CVE-2024-35825
- usb: gadget: ncm: Fix handling of zero block length packets
* CVE-url: https://ubuntu.com/security/CVE-2024-35935
- btrfs: send: handle path ref underflow in header iterate_inode_ref()
* CVE-url: https://ubuntu.com/security/CVE-2024-26957
- s390/zcrypt: fix reference counting on zcrypt card objects
* CVE-url: https://ubuntu.com/security/CVE-2024-35973
- geneve: fix header validation in geneve[6]_xmit_skb
* CVE-url: https://ubuntu.com/security/CVE-2024-26965
- clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays
* CVE-url: https://ubuntu.com/security/CVE-2024-26931
- scsi: qla2xxx: Fix command flush on cable pull
* CVE-url: https://ubuntu.com/security/CVE-2024-35944
- VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
* CVE-url: https://ubuntu.com/security/CVE-2024-27028
- spi: spi-mt65xx: Fix NULL pointer access in interrupt handler
* CVE-url: https://ubuntu.com/security/CVE-2024-35830
- media: tc358743: register v4l2 async device only after successful setup
* CVE-url: https://ubuntu.com/security/CVE-2024-26956
- nilfs2: fix failure to detect DAT corruption in btree and direct mappings
* CVE-url: https://ubuntu.com/security/CVE-2024-35807
- ext4: fix corruption during on-line resize
* CVE-url: https://ubuntu.com/security/CVE-2024-26813
- vfio/platform: Create persistent IRQ handlers
* CVE-url: https://ubuntu.com/security/CVE-2023-52644
- wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled
* CVE-url: https://ubuntu.com/security/CVE-2024-26966
- clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays
* CVE-url: https://ubuntu.com/security/CVE-2024-26654
- ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs
* CVE-url: https://ubuntu.com/security/CVE-2024-27073
- media: ttpci: fix two memleaks in budget_av_attach
* CVE-url: https://ubuntu.com/security/CVE-2023-52880
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
* CVE-url: https://ubuntu.com/security/CVE-2023-52650
- drm/tegra: dsi: Add missing check for of_find_device_by_node
* CVE-url: https://ubuntu.com/security/CVE-2024-35822
- usb: udc: remove warning when queue disabled ep
* CVE-url: https://ubuntu.com/security/CVE-2024-35933
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version
* CVE-url: https://ubuntu.com/security/CVE-2024-26857
- geneve: make sure to pull inner header in geneve_rx()
* CVE-url: https://ubuntu.com/security/CVE-2024-35925
- block: prevent division by zero in blk_rq_stat_sum()
* CVE-url: https://ubuntu.com/security/CVE-2024-35930
- scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
* CVE-url: https://ubuntu.com/security/CVE-2024-27419
- netrom: Fix data-races around sysctl_net_busy_read
* CVE-url: https://ubuntu.com/security/CVE-2024-35955
- kprobes: Fix possible use-after-free issue on kprobe registration
* CVE-url: https://ubuntu.com/security/CVE-2024-27074
- media: go7007: fix a memleak in go7007_load_encoder
* CVE-url: https://ubuntu.com/security/CVE-2024-35847
- irqchip/gic-v3-its: Prevent double free on error
* CVE-url: https://ubuntu.com/security/CVE-2024-35936
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()
* CVE-url: https://ubuntu.com/security/CVE-2024-35821
- ubifs: Set page uptodate in the correct place
* CVE-url: https://ubuntu.com/security/CVE-2024-27075
- media: dvb-frontends: avoid stack overflow warnings with clang
* CVE-url: https://ubuntu.com/security/CVE-2024-26651
- sr9800: Add check for usbnet_get_endpoints
* CVE-url: https://ubuntu.com/security/CVE-2024-27043
- media: edia: dvbdev: fix a use-after-free
* CVE-url: https://ubuntu.com/security/CVE-2024-26976
- KVM: Always flush async #PF workqueue when vCPU is being destroyed
* CVE-url: https://ubuntu.com/security/CVE-2024-27000
- serial: mxs-auart: add spinlock around changing cts state
* CVE-url: https://ubuntu.com/security/CVE-2024-35815
- fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion
* CVE-url: https://ubuntu.com/security/CVE-2024-27396
- net: gtp: Fix Use-After-Free in gtp_dellink
* CVE-url: https://ubuntu.com/security/CVE-2024-26874
- drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
* CVE-url: https://ubuntu.com/security/CVE-2024-35922
- fbmon: prevent division by zero in fb_videomode_from_videomode()
* CVE-url: https://ubuntu.com/security/CVE-2024-27078
- media: v4l2-tpg: fix some memleaks in tpg_alloc
* CVE-url: https://ubuntu.com/security/CVE-2024-26981
- nilfs2: fix OOB in nilfs_set_de_type
* CVE-url: https://ubuntu.com/security/CVE-2024-26816
- x86, relocs: Ignore relocations in .notes section
* CVE-url: https://ubuntu.com/security/CVE-2024-26880
- dm: call the resume method on internal suspend
* CVE-url: https://ubuntu.com/security/CVE-2024-26994
- speakup: Avoid crash on very long word
* CVE-url: https://ubuntu.com/security/CVE-2024-26955
- nilfs2: prevent kernel bug at submit_bh_wbc()
* CVE-url: https://ubuntu.com/security/CVE-2024-36004
- i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
* CVE-url: https://ubuntu.com/security/CVE-2024-35789
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes
* CVE-url: https://ubuntu.com/security/CVE-2024-26974
- crypto: qat - resolve race condition during AER recovery
* CVE-url: https://ubuntu.com/security/CVE-2024-26859
- net/bnx2x: Prevent access to a freed page in page_pool
* CVE-url: https://ubuntu.com/security/CVE-2024-35960
- net/mlx5: Properly link new fs rules into the tree
* CVE-url: https://ubuntu.com/security/CVE-2024-27059
- USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
* CVE-url: https://ubuntu.com/security/CVE-2024-26993
- fs: sysfs: Fix reference leak in sysfs_break_active_protection()
* CVE-url: https://ubuntu.com/security/CVE-2024-24857 // CVE-url:
https://ubuntu.com/security/CVE-2024-24858 // CVE-url:
https://ubuntu.com/security/CVE-2024-24859
- Bluetooth: Fix TOCTOU in HCI debugfs implementation
* CVE-url: https://ubuntu.com/security/CVE-2024-26894
- ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
* CVE-url: https://ubuntu.com/security/CVE-2024-27436
- ALSA: usb-audio: Stop parsing channels bits when all channels are found.
* CVE-url: https://ubuntu.com/security/CVE-2024-35915
- nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet
* CVE-url: https://ubuntu.com/security/CVE-2024-26973
- fat: fix uninitialized field in nostale filehandles
* CVE-url: https://ubuntu.com/security/CVE-2024-26923
- af_unix: Fix garbage collector racing against connect()
* CVE-url: https://ubuntu.com/security/CVE-2024-26643
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with
timeout
* CVE-url: https://ubuntu.com/security/CVE-2024-26886
- Bluetooth: af_bluetooth: Fix deadlock
Updated packages:
-
linux-buildinfo-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:d4fe86b91a261d57229a544006bdd6fde2ca2070
-
linux-buildinfo-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:c47aac6c04c0429fbe2fee6a6f0ba925202b3318
-
linux-cloud-tools-4.15.0-232-tuxcare.els20_4.15.0-232.243_amd64.deb
sha:cbfd0c7fcd82c99b387174272bbf6a13eda05540
-
linux-cloud-tools-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:7adccefa8c3c8a09bda51b601ca1e7efc49a2e03
-
linux-cloud-tools-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:5b6ec47b69895373d942df211ab05652f2eb2d7d
-
linux-cloud-tools-common_4.15.0-232.243_all.deb
sha:e7f499fc1701423b82c8144922b61cc9fd0ce26c
-
linux-cloud-tools-generic_4.15.0.232.243_amd64.deb
sha:8ba6e7c5682e9e4d94414e7ac4dfd9683915c71d
-
linux-cloud-tools-lowlatency_4.15.0.232.243_amd64.deb
sha:25416156652bd0c5b678990db124c68757469f16
-
linux-crashdump_4.15.0.232.243_amd64.deb
sha:b34c14fea02fd2ada8c2bfb6990956272fd89e91
-
linux-doc_4.15.0-232.243_all.deb
sha:7b9795769903dc963ad930def83d15c1671bdf3a
-
linux-generic_4.15.0.232.243_amd64.deb
sha:51ccae76cf82d939f6603996af045a0bd25a4053
-
linux-headers-4.15.0-232-tuxcare.els20_4.15.0-232.243_all.deb
sha:9f68bad740b30ad80703c120818b645ae276c44b
-
linux-headers-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:3e265e5b92805ea45fb6705e4dd9bb4771b70a72
-
linux-headers-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:e33a9ca20c75226172eeb14494906163cafa802f
-
linux-headers-generic_4.15.0.232.243_amd64.deb
sha:bb439940ee1795c3c8223d0f439df0337606c4f2
-
linux-headers-lowlatency_4.15.0.232.243_amd64.deb
sha:a004d910c12c0b699a1453077acea3cd7cf26618
-
linux-image-generic_4.15.0.232.243_amd64.deb
sha:bc945f24c1b88d6e15f09e0233f4cdcb35429505
-
linux-image-lowlatency_4.15.0.232.243_amd64.deb
sha:ac15465141375993ea8c24acec884dc765babf4f
-
linux-image-unsigned-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:34c8473f7050380619636f8cf468921e603e7474
-
linux-image-unsigned-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:4d528b524f80536a53da5b467146103e232eb878
-
linux-libc-dev_4.15.0-232.243_amd64.deb
sha:4197348cf305421fdc98d7545800a69b3ec0a4fb
-
linux-lowlatency_4.15.0.232.243_amd64.deb
sha:9e15fb86f3733d5e497edc48f1bf8c2612afb67f
-
linux-modules-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:ba84ff949ef11db34fcab815eb2b9946482a3d30
-
linux-modules-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:9d44689c5a636746bc20613a89f5f5935e3c49b1
-
linux-modules-extra-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:8e7c20eeb0d323e2fbbc926a479249b4a9cf53fd
-
linux-source_4.15.0.232.243_all.deb
sha:279f75ac5a34ff709347d5708cff429fa3d601d2
-
linux-source-4.15.0_4.15.0-232.243_all.deb
sha:a9dbb012d1657b2b0b22d905e89efa61b50f2bdc
-
linux-tools-4.15.0-232-tuxcare.els20_4.15.0-232.243_amd64.deb
sha:54b9a5abd0dc5dab8cf117c49a27d09751c40648
-
linux-tools-4.15.0-232-tuxcare.els20-generic_4.15.0-232.243_amd64.deb
sha:f71fcf3791c567ac1c73545e640b4c32b7ff6e97
-
linux-tools-4.15.0-232-tuxcare.els20-lowlatency_4.15.0-232.243_amd64.deb
sha:bdee1406644d0ce919ddf1d30ce266094ab7c491
-
linux-tools-common_4.15.0-232.243_all.deb
sha:e5fb0ea94105b1dc316285024659a4cf4ab9c67c
-
linux-tools-generic_4.15.0.232.243_amd64.deb
sha:2967036c46c5fe1a7b9c77968d8de1d3e5de4b84
-
linux-tools-host_4.15.0-232.243_all.deb
sha:a6e51de5cfb3cd14a3f0bc130d67f4159aa21140
-
linux-tools-lowlatency_4.15.0.232.243_amd64.deb
sha:6745973e2c68b2e1a1ac702dbe92f90a3d88467f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.