Release date:
2024-08-16 11:15:37 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-39467
- f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
* CVE-url: https://ubuntu.com/security/CVE-2024-36940
- pinctrl: core: delete incorrect free in pinctrl_enable()
* CVE-url: https://ubuntu.com/security/CVE-2024-38659
- enic: Validate length of nl attributes in enic_set_vf_port
* CVE-url: https://ubuntu.com/security/CVE-2024-38560
- scsi: bfa: Ensure the copied buf is NUL terminated
* CVE-url: https://ubuntu.com/security/CVE-2024-36941
- wifi: nl80211: don't free NULL coalescing rule
* CVE-url: https://ubuntu.com/security/CVE-2024-27401
- firewire: nosy: ensure user_length is taken into account when fetching
packet contents
* CVE-url: https://ubuntu.com/security/CVE-2024-39276
- ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
* CVE-url: https://ubuntu.com/security/CVE-2024-27398
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
* CVE-url: https://ubuntu.com/security/CVE-2024-36964
- fs/9p: only translate RWX permissions for plain 9P2000
* CVE-url: https://ubuntu.com/security/CVE-2024-38601
- ring-buffer: Fix a race between readers and resize checks
* CVE-url: https://ubuntu.com/security/CVE-2024-39475
- fbdev: savage: Handle err return when savagefb_check_var failed
* CVE-url: https://ubuntu.com/security/CVE-2024-38578
- ecryptfs: Fix buffer size for tag 66 packet
* CVE-url: https://ubuntu.com/security/CVE-2024-36950
- firewire: ohci: mask bus reset interrupts between ISR and bottom half
* CVE-url: https://ubuntu.com/security/CVE-2024-38589
- netrom: fix possible dead-lock in nr_rt_ioctl()
* CVE-url: https://ubuntu.com/security/CVE-2024-38627
- stm class: Fix a double free in stm_register_device()
* CVE-url: https://ubuntu.com/security/CVE-2024-38612
- ipv6: sr: fix invalid unregister error path
* CVE-url: https://ubuntu.com/security/CVE-2024-36905
- tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
* CVE-url: https://ubuntu.com/security/CVE-2024-38559
- scsi: qedf: Ensure the copied buf is NUL terminated
* CVE-url: https://ubuntu.com/security/CVE-2024-33621
- ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound
* CVE-url: https://ubuntu.com/security/CVE-2024-38637
- greybus: lights: check return of get_channel_from_mode
* CVE-url: https://ubuntu.com/security/CVE-2024-38567
- wifi: carl9170: add a proper sanity check for endpoints
* CVE-url: https://ubuntu.com/security/CVE-2024-39301
- net/9p: fix uninit-value in p9_client_rpc()
* CVE-url: https://ubuntu.com/security/CVE-2024-36919
- scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
* CVE-url: https://ubuntu.com/security/CVE-2022-48772
- media: lgdt3306a: Add a check against null-pointer-def
* CVE-url: https://ubuntu.com/security/CVE-2024-36017
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
* CVE-url: https://ubuntu.com/security/CVE-2024-36934
- bna: ensure the copied buf is NUL terminated
* CVE-url: https://ubuntu.com/security/CVE-2024-38558
- net: openvswitch: fix overwriting ct original tuple for ICMPv6
* CVE-url: https://ubuntu.com/security/CVE-2024-38565
- USB: core: Add routines for endpoint checks in old drivers
- wifi: ar5523: enable proper endpoint verification
* CVE-url: https://ubuntu.com/security/CVE-2024-38600
- ALSA: control: Add verification for kctl accesses
- ALSA: control: Track in-flight control read/write/tlv accesses
- ALSA: Fix deadlocks with kctl removals at disconnection
* CVE-url: https://ubuntu.com/security/CVE-2024-31076
- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
* CVE-url: https://ubuntu.com/security/CVE-2024-36015
- ida: Add new API
- ppdev: Remove usage of the deprecated ida_simple_xx() API
- ppdev: Add an error check in register_device
* CVE-url: https://ubuntu.com/security/CVE-2024-38621
- media: stk1160: fix bounds checking in stk1160_copy_video()
* CVE-url: https://ubuntu.com/security/CVE-2024-38549
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj
* CVE-url: https://ubuntu.com/security/CVE-2024-35947
- dyndbg: fix old BUG_ON in >control parser
* CVE-url: https://ubuntu.com/security/CVE-2024-37353
- virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
* CVE-url: https://ubuntu.com/security/CVE-2024-27399
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
* CVE-url: https://ubuntu.com/security/CVE-2024-38618
- ALSA: timer: Simplify timer hw resolution calls
- ALSA: timer: Set lower bound of start tick time
* CVE-url: https://ubuntu.com/security/CVE-2024-38579
- crypto: bcm - Fix pointer arithmetic
* CVE-url: https://ubuntu.com/security/CVE-2024-36286
- netfilter: nfnetlink_queue: acquire rcu_read_lock() in
instance_destroy_rcu()
* CVE-url: https://ubuntu.com/security/CVE-2024-39488
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
* CVE-url: https://ubuntu.com/security/CVE-2024-38607
- macintosh/via-macii: Fix "BUG: sleeping function called from invalid
context"
* CVE-url: https://ubuntu.com/security/CVE-2024-37356
- params: lift param_set_uint_minmax to common code
- tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
* CVE-url: https://ubuntu.com/security/CVE-2024-38613
- m68k: Fix spinlock race in kernel thread creation
* CVE-url: https://ubuntu.com/security/CVE-2024-36954
- tipc: fix a possible memleak in tipc_buf_append
* CVE-url: https://ubuntu.com/security/CVE-2024-38661
- s390/ap: Fix crash in AP internal function modify_bitmap()
* CVE-url: https://ubuntu.com/security/CVE-2024-38599
- jffs2: prevent xattr node from overflowing the eraseblock
* CVE-url: https://ubuntu.com/security/CVE-2024-38633
- serial: core: Provide port lock wrappers
- serial: max3100: Update uart_driver_registered on driver removal
* CVE-url: https://ubuntu.com/security/CVE-2024-39292
- um: Add winch to winch_handlers before registering winch IRQ
* CVE-url: https://ubuntu.com/security/CVE-2024-36939
- NFS: Cleanup - add nfs_clients_exit to mirror nfs_clients_init
- nfs: expose /proc/net/sunrpc/nfs in net namespaces
- sunrpc: add a struct rpc_stats arg to rpc_create_args
- nfs: make the rpc_stat per net namespace
- nfs: Handle error of rpc_proc_register() in nfs_net_init().
* CVE-url: https://ubuntu.com/security/CVE-2024-38634
- serial: max3100: Lock port->lock when calling uart_handle_cts_change()
* CVE-url: https://ubuntu.com/security/CVE-2024-36933
- nsh: Restore skb->{protocol,data,mac_header} for outer header in
nsh_gso_segment().
* CVE-url: https://ubuntu.com/security/CVE-2024-36883
- net: fix out-of-bounds access in ops_init
* CVE-url: https://ubuntu.com/security/CVE-2024-39480
- kdb: Fix buffer overflow during tab-complete
* CVE-url: https://ubuntu.com/security/CVE-2024-36960
- drm/vmwgfx: Fix invalid reads in fence signaled events
* CVE-url: https://ubuntu.com/security/CVE-2024-36946
- phonet: fix rtm_phonet_notify() skb allocation
Updated packages:
-
linux-buildinfo-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:4251ec922962de01844e1da5d33c649d7559189a
-
linux-buildinfo-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:243a9d96980fe728aacfb2cab659b35d16a009c1
-
linux-cloud-tools-4.15.0-235-tuxcare.els23_4.15.0-235.246_amd64.deb
sha:a6fb2a6a1203f8979ebbb0737862d8de41e6583f
-
linux-cloud-tools-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:919f9179d5e372492680291060aad30eb0df2741
-
linux-cloud-tools-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:e441c9d6afa058a376fedf650e69e49a99766c9d
-
linux-cloud-tools-common_4.15.0-235.246_all.deb
sha:08b031ea63c128e0b0cba52cb604781d3fd56d2a
-
linux-cloud-tools-generic_4.15.0.235.246_amd64.deb
sha:7bec0888320fdcaa7e9eae9943b611ebc9a5b420
-
linux-cloud-tools-lowlatency_4.15.0.235.246_amd64.deb
sha:dd7e887d532c973e6952eafc8fd9bd91d2d56f62
-
linux-crashdump_4.15.0.235.246_amd64.deb
sha:98130f2b48ae4439064c759c679910c88feb37cd
-
linux-doc_4.15.0-235.246_all.deb
sha:07b38044114a3d457555134d15c65e8467acfeff
-
linux-generic_4.15.0.235.246_amd64.deb
sha:35ce21162a75699cbd31df669ba5e2629330d930
-
linux-headers-4.15.0-235-tuxcare.els23_4.15.0-235.246_all.deb
sha:e36c394b2a945c6dae256ddb37f822b0011f2acc
-
linux-headers-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:4288389fc701e861473ab889506a16ff3e1d1cfd
-
linux-headers-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:40eafd61fb5c372e7a5486c31e35434ccc9657ae
-
linux-headers-generic_4.15.0.235.246_amd64.deb
sha:86777e680f71915eae948e2e013806ca89070034
-
linux-headers-lowlatency_4.15.0.235.246_amd64.deb
sha:93131a5d6c0db9d7984707ded4236bc8d4433956
-
linux-image-generic_4.15.0.235.246_amd64.deb
sha:3df13667fab85e4b521a75f8fea186569e92da2a
-
linux-image-lowlatency_4.15.0.235.246_amd64.deb
sha:9eb8368a7e52664431eee3d27963bb7dd0f3227f
-
linux-image-unsigned-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:dfb7026ee5841ade054832ef96f8a2c460b78ead
-
linux-image-unsigned-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:792e098aecd72eb0c081f0c14a435625093b76a3
-
linux-libc-dev_4.15.0-235.246_amd64.deb
sha:a4aa88a0598e65456f1d562341e17a9d0fabf0f3
-
linux-lowlatency_4.15.0.235.246_amd64.deb
sha:31f93c60a32b81a46083382ad08e80ae86475edf
-
linux-modules-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:4722e110f7af668cffa4ca4f7158e4d4580ef747
-
linux-modules-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:aca6fc1446390f54475aa88061f04f936d36197f
-
linux-modules-extra-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:05d035a152e7de3af03a7360a30e71a5510014e4
-
linux-source_4.15.0.235.246_all.deb
sha:c6d359d9bbe4793f643568eb4497b1866af1b4aa
-
linux-source-4.15.0_4.15.0-235.246_all.deb
sha:1f0dfc51d39111cc75998862b1254729b7786d24
-
linux-tools-4.15.0-235-tuxcare.els23_4.15.0-235.246_amd64.deb
sha:07845287c58aab20ad96a50e5ad40af80fb91ceb
-
linux-tools-4.15.0-235-tuxcare.els23-generic_4.15.0-235.246_amd64.deb
sha:ac990f9f1e5d08518e21800dc096f62511395976
-
linux-tools-4.15.0-235-tuxcare.els23-lowlatency_4.15.0-235.246_amd64.deb
sha:2630cb998e40c970d27a01573ef84a2637ec5a45
-
linux-tools-common_4.15.0-235.246_all.deb
sha:1d343a33ebcf26ee69734707e321eeeb490ba7d1
-
linux-tools-generic_4.15.0.235.246_amd64.deb
sha:599671f9456ea5ef8a6003f971d4a6c845aa42e8
-
linux-tools-host_4.15.0-235.246_all.deb
sha:3e8e3471d162b975e8b45b9a7e7342d02a25a9b1
-
linux-tools-lowlatency_4.15.0.235.246_amd64.deb
sha:2ca77c2388174173e54935c8b9a1a680a1e64cdf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.