[CLSA-2024:1731602566] Fix of 76 CVEs
Type:
security
Severity:
Critical
Release date:
2024-11-14 16:42:51 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-44946 - kcm: Serialise kcm_sendmsg() for the same socket. * CVE-url: https://ubuntu.com/security/CVE-2024-42292 - kobject_uevent: Fix OOB access within zap_modalias_env() * CVE-url: https://ubuntu.com/security/CVE-2024-41042 - netfilter: nf_tables: prefer nft_chain_validate * CVE-url: https://ubuntu.com/security/CVE-2024-42265 - protect the fetch of ->fd[fd] in do_dup2() from mispredictions * CVE-url: https://ubuntu.com/security/CVE-2024-50036 - net: do not delay dst_entries_add() in dst_release() * CVE-url: https://ubuntu.com/security/CVE-2024-47663 - staging: iio: frequency: ad9833: Load clock using clock framework - staging: iio: frequency: ad9834: Validate frequency parameter value * CVE-url: https://ubuntu.com/security/CVE-2024-47669 - nilfs2: fix state management in error path of log writing function * CVE-url: https://ubuntu.com/security/CVE-2023-52918 - media: pci: cx23885: check cx23885_vdev_init() return * CVE-url: https://ubuntu.com/security/CVE-2024-44960 - usb: gadget: core: Check for unset descriptor * CVE-url: https://ubuntu.com/security/CVE-2024-42297 - f2fs: fix to don't dirty inode for readonly filesystem * CVE-url: https://ubuntu.com/security/CVE-2024-46750 - PCI: Add missing bridge lock to pci_bus_lock() * CVE-url: https://ubuntu.com/security/CVE-2024-46676 - nfc: pn533: Add poll mod list filling check * CVE-url: https://ubuntu.com/security/CVE-2024-46761 - pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv * CVE-url: https://ubuntu.com/security/CVE-2024-46755 - wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() * CVE-url: https://ubuntu.com/security/CVE-2024-46679 - ethtool: check device is present when getting link settings * CVE-url: https://ubuntu.com/security/CVE-2024-46721 - apparmor: fix possible NULL pointer dereference * CVE-url: https://ubuntu.com/security/CVE-2024-46685 - pinctrl: single: fix potential NULL dereference in pcs_get_function() * CVE-url: https://ubuntu.com/security/CVE-2024-44947 - fuse: Initialize beyond-EOF page contents before setting uptodate * CVE-url: https://ubuntu.com/security/CVE-2024-46675 - usb: dwc3: core: Prevent USB core invalid event buffer address access * CVE-url: https://ubuntu.com/security/CVE-2024-43893 - serial: core: check uartclk for zero to avoid divide by zero * CVE-url: https://ubuntu.com/security/CVE-2024-45021 - memcg_write_event_control(): fix a user-triggerable oops * CVE-url: https://ubuntu.com/security/CVE-2024-46677 - gtp: fix a potential NULL pointer dereference * CVE-url: https://ubuntu.com/security/CVE-2024-43861 - net: usb: qmi_wwan: fix memory leak for not ip packets * CVE-url: https://ubuntu.com/security/CVE-2024-41063 - Bluetooth: hci_core: cancel all works upon hci_unregister_dev() * CVE-url: https://ubuntu.com/security/CVE-2024-45006 - xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration * CVE-url: https://ubuntu.com/security/CVE-2024-43853 - cgroup/cpuset: Prevent UAF in proc_cpuset_show() * CVE-url: https://ubuntu.com/security/CVE-2024-42310 - drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes * CVE-url: https://ubuntu.com/security/CVE-2024-42311 - hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() * CVE-url: https://ubuntu.com/security/CVE-2024-41012 - filelock: Remove locks reliably when fcntl/close race is detected * CVE-url: https://ubuntu.com/security/CVE-2024-45028 - mmc: mmc_test: Fix NULL dereference on allocation failure * CVE-url: https://ubuntu.com/security/CVE-2024-43860 - remoteproc: imx_rproc: Skip over memory region when node value is NULL * CVE-url: https://ubuntu.com/security/CVE-2024-43914 - md/raid5: avoid BUG_ON() while continue reshape after reassembling * CVE-url: https://ubuntu.com/security/CVE-2024-45025 - fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE * CVE-url: https://ubuntu.com/security/CVE-2024-43856 - dma: fix call order in dmam_free_coherent * CVE-url: https://ubuntu.com/security/CVE-2024-42289 - scsi: qla2xxx: During vport delete send async logout explicitly * CVE-url: https://ubuntu.com/security/CVE-2024-44995 - net: hns3: fix a deadlock problem when config TC during resetting * CVE-url: https://ubuntu.com/security/CVE-2024-43854 - block: initialize integrity buffer to zero before writing it to media * CVE-url: https://ubuntu.com/security/CVE-2024-43884 - Bluetooth: MGMT: Add error handling to pair_device() * CVE-url: https://ubuntu.com/security/CVE-2024-43871 - devres: Fix memory leakage caused by driver API devm_free_percpu() * CVE-url: https://ubuntu.com/security/CVE-2024-42309 - drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes * CVE-url: https://ubuntu.com/security/CVE-2024-26668 - netfilter: nft_limit: reject configurations that cause integer overflow * CVE-url: https://ubuntu.com/security/CVE-2024-50044 - Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change * CVE-url: https://ubuntu.com/security/CVE-2024-49967 - ext4: no need to continue when the number of entries is 1 * CVE-url: https://ubuntu.com/security/CVE-2024-50033 - slip: make slhc_remember() more robust against malicious packets * CVE-url: https://ubuntu.com/security/CVE-2024-47670 - ocfs2: add bounds checking to ocfs2_xattr_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2024-49950 - Bluetooth: L2CAP: Fix uaf in l2cap_connect * CVE-url: https://ubuntu.com/security/CVE-2024-49883 - ext4: aovid use-after-free in ext4_ext_insert_extent() * CVE-url: https://ubuntu.com/security/CVE-2024-47745 - mm: call the security_mmap_file() LSM hook in remap_file_pages() * CVE-url: https://ubuntu.com/security/CVE-2024-49860 - ACPI: sysfs: validate return type of _STR method * CVE-url: https://ubuntu.com/security/CVE-2024-49882 - ext4: fix double brelse() the buffer of the extents path * CVE-url: https://ubuntu.com/security/CVE-2024-49995 - tipc: guard against string buffer overrun * CVE-url: https://ubuntu.com/security/CVE-2024-47723 - jfs: fix out-of-bounds in dbNextAG() and diAlloc() * CVE-url: https://ubuntu.com/security/CVE-2024-50055 - driver core: bus: Fix double free in driver API bus_register() * CVE-url: https://ubuntu.com/security/CVE-2024-47698 - drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error * CVE-url: https://ubuntu.com/security/CVE-2022-49026 - e100: Fix possible use after free in e100_xmit_prepare * CVE-url: https://ubuntu.com/security/CVE-2024-47742 - firmware_loader: Block path traversal * CVE-url: https://ubuntu.com/security/CVE-2024-50035 - ppp: fix ppp_async_encode() illegal access * CVE-url: https://ubuntu.com/security/CVE-2024-47757 - nilfs2: fix potential oob read in nilfs_btree_check_delete() * CVE-url: https://ubuntu.com/security/CVE-2024-49884 - ext4: avoid ext4_error()'s caused by ENOMEM in the truncate path - ext4: fix slab-use-after-free in ext4_split_extent_at() * CVE-url: https://ubuntu.com/security/CVE-2022-49006 - tracing: Free buffers when a used dynamic event is removed * CVE-url: https://ubuntu.com/security/CVE-2024-49903 - jfs: Fix uaf in dbFreeBits * CVE-url: https://ubuntu.com/security/CVE-2024-47701 - ext4: avoid OOB when system.data xattr changes underneath the filesystem * CVE-url: https://ubuntu.com/security/CVE-2024-49889 - ext4: avoid use-after-free in ext4_ext_show_leaf() * CVE-url: https://ubuntu.com/security/CVE-2024-50073 - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux * CVE-url: https://ubuntu.com/security/CVE-2024-47747 - net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition * CVE-url: https://ubuntu.com/security/CVE-2024-49900 - jfs: Fix uninit-value access of new_ea in ea_buffer * CVE-url: https://ubuntu.com/security/CVE-2024-47697 - drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error * CVE-url: https://ubuntu.com/security/CVE-2022-48951 - ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx() * CVE-url: https://ubuntu.com/security/CVE-2024-49981 - media: venus: fix use after free bug in venus_remove due to race condition * CVE-url: https://ubuntu.com/security/CVE-2024-43839 - bna: adjust 'name' buf size of bna_tcb and bna_ccb structures * CVE-url: https://ubuntu.com/security/CVE-2024-47659 - smack: tcp: ipv4, fix incorrect labeling * CVE-url: https://ubuntu.com/security/CVE-2024-47685 - netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() * CVE-url: https://ubuntu.com/security/CVE-2024-39476 - md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING * CVE-url: https://ubuntu.com/security/CVE-2024-27397 - netfilter: nf_tables: use timestamp to check for set element timeout - netfilter: nf_tables: annotate data-races around element expiration - netfilter: nf_tables: support timeouts larger than 23 days * CVE-url: https://ubuntu.com/security/CVE-2024-26641 - net: Fix unwanted sign extension in netdev_stats_to_stats64() - ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() * CVE-url: https://ubuntu.com/security/CVE-2024-38611 - media: i2c: et8ek8: Don't strip remove function when driver is builtin
Updated packages:
  • linux-buildinfo-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:c60e0751e84de3250af28530c0b505dc03bb52e8
  • linux-buildinfo-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:c13bfae70f81a96b985772298284f46c455b4ebd
  • linux-cloud-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
    sha:3ac49071669d428ca5211b0b482761b7fca8f376
  • linux-cloud-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:37de310b1527ae52779323c0ff7a28f533a1b6d4
  • linux-cloud-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:b5db9fa63e6f6b161e8632bbac2eea66319bbb7b
  • linux-cloud-tools-common_4.15.0-240.251_all.deb
    sha:6bbd2349e65ac4c99338250e0bf0d536e1f62cb1
  • linux-cloud-tools-generic_4.15.0.240.251_amd64.deb
    sha:08be7cc57534ed56c5636be7ffcecb2f5ced4079
  • linux-cloud-tools-lowlatency_4.15.0.240.251_amd64.deb
    sha:13e2b81db3e92bb6042156fcf4ac6b255c94d392
  • linux-crashdump_4.15.0.240.251_amd64.deb
    sha:b0fd4c04ef3ed95a4a47bf4cc70befd75fc37982
  • linux-doc_4.15.0-240.251_all.deb
    sha:f435f0af99bca6ec3c5baf30c0ac79e89ab2e9bb
  • linux-generic_4.15.0.240.251_amd64.deb
    sha:17422ab01fea46588d1c538be77f9f4f608c7f06
  • linux-headers-4.15.0-240-tuxcare.els28_4.15.0-240.251_all.deb
    sha:507f22d76ab81ce29787a264b7526f28cb5fcf39
  • linux-headers-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:59b2494c1524a9d53d2df53476df97db8cbea1f5
  • linux-headers-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:f5e9189ff4632c0a984353b377d9bb6bdf692114
  • linux-headers-generic_4.15.0.240.251_amd64.deb
    sha:be7502d4feecbcb51d098dcb7d38a01438b706ec
  • linux-headers-lowlatency_4.15.0.240.251_amd64.deb
    sha:2c21992095a964c4f6e1b28a97e949648ed03a14
  • linux-image-generic_4.15.0.240.251_amd64.deb
    sha:77f3bc81872b56eba4c357aed53db24a9a4bc310
  • linux-image-lowlatency_4.15.0.240.251_amd64.deb
    sha:0ce8feeff0ed218a0c6a1ba09afd8792a2725e0a
  • linux-image-unsigned-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:aba8727e3fca30b3446c6c41dc36d6373fcca385
  • linux-image-unsigned-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:a6fd4227efead7e71c40b9f0ea1781b5d4a76452
  • linux-libc-dev_4.15.0-240.251_amd64.deb
    sha:09bd246ee5dc8cfa40e98383f84d6ff7f9e7922e
  • linux-lowlatency_4.15.0.240.251_amd64.deb
    sha:5695bf38b2e6aa40a5eea7271cdb6a6c46988359
  • linux-modules-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:c2bb38e68eb79fbd5bfb69f73820df07e9841167
  • linux-modules-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:a2070e48fa761adccda5bd730ea56e6e509d2f40
  • linux-modules-extra-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:8eda36529392ff71406390fd50883fe40c951ed6
  • linux-source_4.15.0.240.251_all.deb
    sha:e2a5e75f5a9c5b7dc53e2fad177bf83f363062fc
  • linux-source-4.15.0_4.15.0-240.251_all.deb
    sha:5c64264a723d75ffa1490baaa2bcd5c826e813da
  • linux-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
    sha:4d4bcd23a2c051b685d7acddc789599c7909990a
  • linux-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
    sha:532ccc38f9aefb3d3cdb624bb999ed1857b772f2
  • linux-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
    sha:bef6287d17850d8445c6a833aaafb31aa8b99ad3
  • linux-tools-common_4.15.0-240.251_all.deb
    sha:8d47ecdef5b42d148a22819954448e1e16ef3d99
  • linux-tools-generic_4.15.0.240.251_amd64.deb
    sha:5f75226e992daea1540171db7f7ba215ea7bf7ee
  • linux-tools-host_4.15.0-240.251_all.deb
    sha:ef8ed05d4ad41f1954e276a6e55e68733c9bec6c
  • linux-tools-lowlatency_4.15.0.240.251_amd64.deb
    sha:5e90f13dd758f4bd0c00f9ee8ebcae8c724135b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.