[CLSA-2024:1723806933] Fix of 55 CVEs
Type:
security
Severity:
Important
Release date:
2024-08-16 11:15:37 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-39467 - f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() * CVE-url: https://ubuntu.com/security/CVE-2024-36940 - pinctrl: core: delete incorrect free in pinctrl_enable() * CVE-url: https://ubuntu.com/security/CVE-2024-38659 - enic: Validate length of nl attributes in enic_set_vf_port * CVE-url: https://ubuntu.com/security/CVE-2024-38560 - scsi: bfa: Ensure the copied buf is NUL terminated * CVE-url: https://ubuntu.com/security/CVE-2024-36941 - wifi: nl80211: don't free NULL coalescing rule * CVE-url: https://ubuntu.com/security/CVE-2024-27401 - firewire: nosy: ensure user_length is taken into account when fetching packet contents * CVE-url: https://ubuntu.com/security/CVE-2024-39276 - ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() * CVE-url: https://ubuntu.com/security/CVE-2024-27398 - Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout * CVE-url: https://ubuntu.com/security/CVE-2024-36964 - fs/9p: only translate RWX permissions for plain 9P2000 * CVE-url: https://ubuntu.com/security/CVE-2024-38601 - ring-buffer: Fix a race between readers and resize checks * CVE-url: https://ubuntu.com/security/CVE-2024-39475 - fbdev: savage: Handle err return when savagefb_check_var failed * CVE-url: https://ubuntu.com/security/CVE-2024-38578 - ecryptfs: Fix buffer size for tag 66 packet * CVE-url: https://ubuntu.com/security/CVE-2024-36950 - firewire: ohci: mask bus reset interrupts between ISR and bottom half * CVE-url: https://ubuntu.com/security/CVE-2024-38589 - netrom: fix possible dead-lock in nr_rt_ioctl() * CVE-url: https://ubuntu.com/security/CVE-2024-38627 - stm class: Fix a double free in stm_register_device() * CVE-url: https://ubuntu.com/security/CVE-2024-38612 - ipv6: sr: fix invalid unregister error path * CVE-url: https://ubuntu.com/security/CVE-2024-36905 - tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets * CVE-url: https://ubuntu.com/security/CVE-2024-38559 - scsi: qedf: Ensure the copied buf is NUL terminated * CVE-url: https://ubuntu.com/security/CVE-2024-33621 - ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound * CVE-url: https://ubuntu.com/security/CVE-2024-38637 - greybus: lights: check return of get_channel_from_mode * CVE-url: https://ubuntu.com/security/CVE-2024-38567 - wifi: carl9170: add a proper sanity check for endpoints * CVE-url: https://ubuntu.com/security/CVE-2024-39301 - net/9p: fix uninit-value in p9_client_rpc() * CVE-url: https://ubuntu.com/security/CVE-2024-36919 - scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload * CVE-url: https://ubuntu.com/security/CVE-2022-48772 - media: lgdt3306a: Add a check against null-pointer-def * CVE-url: https://ubuntu.com/security/CVE-2024-36017 - rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation * CVE-url: https://ubuntu.com/security/CVE-2024-36934 - bna: ensure the copied buf is NUL terminated * CVE-url: https://ubuntu.com/security/CVE-2024-38558 - net: openvswitch: fix overwriting ct original tuple for ICMPv6 * CVE-url: https://ubuntu.com/security/CVE-2024-38565 - USB: core: Add routines for endpoint checks in old drivers - wifi: ar5523: enable proper endpoint verification * CVE-url: https://ubuntu.com/security/CVE-2024-38600 - ALSA: control: Add verification for kctl accesses - ALSA: control: Track in-flight control read/write/tlv accesses - ALSA: Fix deadlocks with kctl removals at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-31076 - genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline * CVE-url: https://ubuntu.com/security/CVE-2024-36015 - ida: Add new API - ppdev: Remove usage of the deprecated ida_simple_xx() API - ppdev: Add an error check in register_device * CVE-url: https://ubuntu.com/security/CVE-2024-38621 - media: stk1160: fix bounds checking in stk1160_copy_video() * CVE-url: https://ubuntu.com/security/CVE-2024-38549 - drm/mediatek: Add 0 size check to mtk_drm_gem_obj * CVE-url: https://ubuntu.com/security/CVE-2024-35947 - dyndbg: fix old BUG_ON in >control parser * CVE-url: https://ubuntu.com/security/CVE-2024-37353 - virtio: delete vq in vp_find_vqs_msix() when request_irq() fails * CVE-url: https://ubuntu.com/security/CVE-2024-27399 - Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout * CVE-url: https://ubuntu.com/security/CVE-2024-38618 - ALSA: timer: Simplify timer hw resolution calls - ALSA: timer: Set lower bound of start tick time * CVE-url: https://ubuntu.com/security/CVE-2024-38579 - crypto: bcm - Fix pointer arithmetic * CVE-url: https://ubuntu.com/security/CVE-2024-36286 - netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() * CVE-url: https://ubuntu.com/security/CVE-2024-39488 - arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY * CVE-url: https://ubuntu.com/security/CVE-2024-38607 - macintosh/via-macii: Fix "BUG: sleeping function called from invalid context" * CVE-url: https://ubuntu.com/security/CVE-2024-37356 - params: lift param_set_uint_minmax to common code - tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). * CVE-url: https://ubuntu.com/security/CVE-2024-38613 - m68k: Fix spinlock race in kernel thread creation * CVE-url: https://ubuntu.com/security/CVE-2024-36954 - tipc: fix a possible memleak in tipc_buf_append * CVE-url: https://ubuntu.com/security/CVE-2024-38661 - s390/ap: Fix crash in AP internal function modify_bitmap() * CVE-url: https://ubuntu.com/security/CVE-2024-38599 - jffs2: prevent xattr node from overflowing the eraseblock * CVE-url: https://ubuntu.com/security/CVE-2024-38633 - serial: core: Provide port lock wrappers - serial: max3100: Update uart_driver_registered on driver removal * CVE-url: https://ubuntu.com/security/CVE-2024-39292 - um: Add winch to winch_handlers before registering winch IRQ * CVE-url: https://ubuntu.com/security/CVE-2024-36939 - NFS: Cleanup - add nfs_clients_exit to mirror nfs_clients_init - nfs: expose /proc/net/sunrpc/nfs in net namespaces - sunrpc: add a struct rpc_stats arg to rpc_create_args - nfs: make the rpc_stat per net namespace - nfs: Handle error of rpc_proc_register() in nfs_net_init(). * CVE-url: https://ubuntu.com/security/CVE-2024-38634 - serial: max3100: Lock port->lock when calling uart_handle_cts_change() * CVE-url: https://ubuntu.com/security/CVE-2024-36933 - nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). * CVE-url: https://ubuntu.com/security/CVE-2024-36883 - net: fix out-of-bounds access in ops_init * CVE-url: https://ubuntu.com/security/CVE-2024-39480 - kdb: Fix buffer overflow during tab-complete * CVE-url: https://ubuntu.com/security/CVE-2024-36960 - drm/vmwgfx: Fix invalid reads in fence signaled events * CVE-url: https://ubuntu.com/security/CVE-2024-36946 - phonet: fix rtm_phonet_notify() skb allocation
Updated packages:
  • linux-buildinfo-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:4251ec922962de01844e1da5d33c649d7559189a
  • linux-buildinfo-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:243a9d96980fe728aacfb2cab659b35d16a009c1
  • linux-cloud-tools-4.15.0-235-tuxcare.els23_4.15.0-235.246_amd64.deb
    sha:a6fb2a6a1203f8979ebbb0737862d8de41e6583f
  • linux-cloud-tools-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:919f9179d5e372492680291060aad30eb0df2741
  • linux-cloud-tools-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:e441c9d6afa058a376fedf650e69e49a99766c9d
  • linux-cloud-tools-common_4.15.0-235.246_all.deb
    sha:08b031ea63c128e0b0cba52cb604781d3fd56d2a
  • linux-cloud-tools-generic_4.15.0.235.246_amd64.deb
    sha:7bec0888320fdcaa7e9eae9943b611ebc9a5b420
  • linux-cloud-tools-lowlatency_4.15.0.235.246_amd64.deb
    sha:dd7e887d532c973e6952eafc8fd9bd91d2d56f62
  • linux-crashdump_4.15.0.235.246_amd64.deb
    sha:98130f2b48ae4439064c759c679910c88feb37cd
  • linux-doc_4.15.0-235.246_all.deb
    sha:07b38044114a3d457555134d15c65e8467acfeff
  • linux-generic_4.15.0.235.246_amd64.deb
    sha:35ce21162a75699cbd31df669ba5e2629330d930
  • linux-headers-4.15.0-235-tuxcare.els23_4.15.0-235.246_all.deb
    sha:e36c394b2a945c6dae256ddb37f822b0011f2acc
  • linux-headers-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:4288389fc701e861473ab889506a16ff3e1d1cfd
  • linux-headers-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:40eafd61fb5c372e7a5486c31e35434ccc9657ae
  • linux-headers-generic_4.15.0.235.246_amd64.deb
    sha:86777e680f71915eae948e2e013806ca89070034
  • linux-headers-lowlatency_4.15.0.235.246_amd64.deb
    sha:93131a5d6c0db9d7984707ded4236bc8d4433956
  • linux-image-generic_4.15.0.235.246_amd64.deb
    sha:3df13667fab85e4b521a75f8fea186569e92da2a
  • linux-image-lowlatency_4.15.0.235.246_amd64.deb
    sha:9eb8368a7e52664431eee3d27963bb7dd0f3227f
  • linux-image-unsigned-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:dfb7026ee5841ade054832ef96f8a2c460b78ead
  • linux-image-unsigned-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:792e098aecd72eb0c081f0c14a435625093b76a3
  • linux-libc-dev_4.15.0-235.246_amd64.deb
    sha:a4aa88a0598e65456f1d562341e17a9d0fabf0f3
  • linux-lowlatency_4.15.0.235.246_amd64.deb
    sha:31f93c60a32b81a46083382ad08e80ae86475edf
  • linux-modules-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:4722e110f7af668cffa4ca4f7158e4d4580ef747
  • linux-modules-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:aca6fc1446390f54475aa88061f04f936d36197f
  • linux-modules-extra-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:05d035a152e7de3af03a7360a30e71a5510014e4
  • linux-source_4.15.0.235.246_all.deb
    sha:c6d359d9bbe4793f643568eb4497b1866af1b4aa
  • linux-source-4.15.0_4.15.0-235.246_all.deb
    sha:1f0dfc51d39111cc75998862b1254729b7786d24
  • linux-tools-4.15.0-235-tuxcare.els23_4.15.0-235.246_amd64.deb
    sha:07845287c58aab20ad96a50e5ad40af80fb91ceb
  • linux-tools-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
    sha:ac990f9f1e5d08518e21800dc096f62511395976
  • linux-tools-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
    sha:2630cb998e40c970d27a01573ef84a2637ec5a45
  • linux-tools-common_4.15.0-235.246_all.deb
    sha:1d343a33ebcf26ee69734707e321eeeb490ba7d1
  • linux-tools-generic_4.15.0.235.246_amd64.deb
    sha:599671f9456ea5ef8a6003f971d4a6c845aa42e8
  • linux-tools-host_4.15.0-235.246_all.deb
    sha:3e8e3471d162b975e8b45b9a7e7342d02a25a9b1
  • linux-tools-lowlatency_4.15.0.235.246_amd64.deb
    sha:2ca77c2388174173e54935c8b9a1a680a1e64cdf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.