Release date:
2024-11-14 16:53:39 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-44946
- kcm: Serialise kcm_sendmsg() for the same socket.
* CVE-url: https://ubuntu.com/security/CVE-2024-42292
- kobject_uevent: Fix OOB access within zap_modalias_env()
* CVE-url: https://ubuntu.com/security/CVE-2024-41042
- netfilter: nf_tables: prefer nft_chain_validate
* CVE-url: https://ubuntu.com/security/CVE-2024-42265
- protect the fetch of ->fd[fd] in do_dup2() from mispredictions
* CVE-url: https://ubuntu.com/security/CVE-2024-50036
- net: do not delay dst_entries_add() in dst_release()
* CVE-url: https://ubuntu.com/security/CVE-2024-47663
- staging: iio: frequency: ad9833: Load clock using clock framework
- staging: iio: frequency: ad9834: Validate frequency parameter value
* CVE-url: https://ubuntu.com/security/CVE-2024-47669
- nilfs2: fix state management in error path of log writing function
* CVE-url: https://ubuntu.com/security/CVE-2023-52918
- media: pci: cx23885: check cx23885_vdev_init() return
* CVE-url: https://ubuntu.com/security/CVE-2024-44960
- usb: gadget: core: Check for unset descriptor
* CVE-url: https://ubuntu.com/security/CVE-2024-42297
- f2fs: fix to don't dirty inode for readonly filesystem
* CVE-url: https://ubuntu.com/security/CVE-2024-46750
- PCI: Add missing bridge lock to pci_bus_lock()
* CVE-url: https://ubuntu.com/security/CVE-2024-46676
- nfc: pn533: Add poll mod list filling check
* CVE-url: https://ubuntu.com/security/CVE-2024-46761
- pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
* CVE-url: https://ubuntu.com/security/CVE-2024-46755
- wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
* CVE-url: https://ubuntu.com/security/CVE-2024-46679
- ethtool: check device is present when getting link settings
* CVE-url: https://ubuntu.com/security/CVE-2024-46721
- apparmor: fix possible NULL pointer dereference
* CVE-url: https://ubuntu.com/security/CVE-2024-46685
- pinctrl: single: fix potential NULL dereference in pcs_get_function()
* CVE-url: https://ubuntu.com/security/CVE-2024-44947
- fuse: Initialize beyond-EOF page contents before setting uptodate
* CVE-url: https://ubuntu.com/security/CVE-2024-46675
- usb: dwc3: core: Prevent USB core invalid event buffer address access
* CVE-url: https://ubuntu.com/security/CVE-2024-43893
- serial: core: check uartclk for zero to avoid divide by zero
* CVE-url: https://ubuntu.com/security/CVE-2024-45021
- memcg_write_event_control(): fix a user-triggerable oops
* CVE-url: https://ubuntu.com/security/CVE-2024-46677
- gtp: fix a potential NULL pointer dereference
* CVE-url: https://ubuntu.com/security/CVE-2024-43861
- net: usb: qmi_wwan: fix memory leak for not ip packets
* CVE-url: https://ubuntu.com/security/CVE-2024-41063
- Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
* CVE-url: https://ubuntu.com/security/CVE-2024-45006
- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
* CVE-url: https://ubuntu.com/security/CVE-2024-43853
- cgroup/cpuset: Prevent UAF in proc_cpuset_show()
* CVE-url: https://ubuntu.com/security/CVE-2024-42310
- drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
* CVE-url: https://ubuntu.com/security/CVE-2024-42311
- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
* CVE-url: https://ubuntu.com/security/CVE-2024-41012
- filelock: Remove locks reliably when fcntl/close race is detected
* CVE-url: https://ubuntu.com/security/CVE-2024-45028
- mmc: mmc_test: Fix NULL dereference on allocation failure
* CVE-url: https://ubuntu.com/security/CVE-2024-43860
- remoteproc: imx_rproc: Skip over memory region when node value is NULL
* CVE-url: https://ubuntu.com/security/CVE-2024-43914
- md/raid5: avoid BUG_ON() while continue reshape after reassembling
* CVE-url: https://ubuntu.com/security/CVE-2024-45025
- fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
* CVE-url: https://ubuntu.com/security/CVE-2024-43856
- dma: fix call order in dmam_free_coherent
* CVE-url: https://ubuntu.com/security/CVE-2024-42289
- scsi: qla2xxx: During vport delete send async logout explicitly
* CVE-url: https://ubuntu.com/security/CVE-2024-44995
- net: hns3: fix a deadlock problem when config TC during resetting
* CVE-url: https://ubuntu.com/security/CVE-2024-43854
- block: initialize integrity buffer to zero before writing it to media
* CVE-url: https://ubuntu.com/security/CVE-2024-43884
- Bluetooth: MGMT: Add error handling to pair_device()
* CVE-url: https://ubuntu.com/security/CVE-2024-43871
- devres: Fix memory leakage caused by driver API devm_free_percpu()
* CVE-url: https://ubuntu.com/security/CVE-2024-42309
- drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes
* CVE-url: https://ubuntu.com/security/CVE-2024-26668
- netfilter: nft_limit: reject configurations that cause integer overflow
* CVE-url: https://ubuntu.com/security/CVE-2024-50044
- Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
* CVE-url: https://ubuntu.com/security/CVE-2024-49967
- ext4: no need to continue when the number of entries is 1
* CVE-url: https://ubuntu.com/security/CVE-2024-50033
- slip: make slhc_remember() more robust against malicious packets
* CVE-url: https://ubuntu.com/security/CVE-2024-47670
- ocfs2: add bounds checking to ocfs2_xattr_find_entry()
* CVE-url: https://ubuntu.com/security/CVE-2024-49950
- Bluetooth: L2CAP: Fix uaf in l2cap_connect
* CVE-url: https://ubuntu.com/security/CVE-2024-49883
- ext4: aovid use-after-free in ext4_ext_insert_extent()
* CVE-url: https://ubuntu.com/security/CVE-2024-47745
- mm: call the security_mmap_file() LSM hook in remap_file_pages()
* CVE-url: https://ubuntu.com/security/CVE-2024-49860
- ACPI: sysfs: validate return type of _STR method
* CVE-url: https://ubuntu.com/security/CVE-2024-49882
- ext4: fix double brelse() the buffer of the extents path
* CVE-url: https://ubuntu.com/security/CVE-2024-49995
- tipc: guard against string buffer overrun
* CVE-url: https://ubuntu.com/security/CVE-2024-47723
- jfs: fix out-of-bounds in dbNextAG() and diAlloc()
* CVE-url: https://ubuntu.com/security/CVE-2024-50055
- driver core: bus: Fix double free in driver API bus_register()
* CVE-url: https://ubuntu.com/security/CVE-2024-47698
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
* CVE-url: https://ubuntu.com/security/CVE-2022-49026
- e100: Fix possible use after free in e100_xmit_prepare
* CVE-url: https://ubuntu.com/security/CVE-2024-47742
- firmware_loader: Block path traversal
* CVE-url: https://ubuntu.com/security/CVE-2024-50035
- ppp: fix ppp_async_encode() illegal access
* CVE-url: https://ubuntu.com/security/CVE-2024-47757
- nilfs2: fix potential oob read in nilfs_btree_check_delete()
* CVE-url: https://ubuntu.com/security/CVE-2024-49884
- ext4: avoid ext4_error()'s caused by ENOMEM in the truncate path
- ext4: fix slab-use-after-free in ext4_split_extent_at()
* CVE-url: https://ubuntu.com/security/CVE-2022-49006
- tracing: Free buffers when a used dynamic event is removed
* CVE-url: https://ubuntu.com/security/CVE-2024-49903
- jfs: Fix uaf in dbFreeBits
* CVE-url: https://ubuntu.com/security/CVE-2024-47701
- ext4: avoid OOB when system.data xattr changes underneath the filesystem
* CVE-url: https://ubuntu.com/security/CVE-2024-49889
- ext4: avoid use-after-free in ext4_ext_show_leaf()
* CVE-url: https://ubuntu.com/security/CVE-2024-50073
- tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
* CVE-url: https://ubuntu.com/security/CVE-2024-47747
- net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race
Condition
* CVE-url: https://ubuntu.com/security/CVE-2024-49900
- jfs: Fix uninit-value access of new_ea in ea_buffer
* CVE-url: https://ubuntu.com/security/CVE-2024-47697
- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
* CVE-url: https://ubuntu.com/security/CVE-2022-48951
- ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()
* CVE-url: https://ubuntu.com/security/CVE-2024-49981
- media: venus: fix use after free bug in venus_remove due to race condition
* CVE-url: https://ubuntu.com/security/CVE-2024-43839
- bna: adjust 'name' buf size of bna_tcb and bna_ccb structures
* CVE-url: https://ubuntu.com/security/CVE-2024-47659
- smack: tcp: ipv4, fix incorrect labeling
* CVE-url: https://ubuntu.com/security/CVE-2024-47685
- netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
* CVE-url: https://ubuntu.com/security/CVE-2024-39476
- md/raid5: fix deadlock that raid5d() wait for itself to clear
MD_SB_CHANGE_PENDING
* CVE-url: https://ubuntu.com/security/CVE-2024-27397
- netfilter: nf_tables: use timestamp to check for set element timeout
- netfilter: nf_tables: annotate data-races around element expiration
- netfilter: nf_tables: support timeouts larger than 23 days
* CVE-url: https://ubuntu.com/security/CVE-2024-26641
- net: Fix unwanted sign extension in netdev_stats_to_stats64()
- ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
* CVE-url: https://ubuntu.com/security/CVE-2024-38611
- media: i2c: et8ek8: Don't strip remove function when driver is builtin
Updated packages:
-
linux-buildinfo-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:c60e0751e84de3250af28530c0b505dc03bb52e8
-
linux-buildinfo-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:c13bfae70f81a96b985772298284f46c455b4ebd
-
linux-cloud-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
sha:3ac49071669d428ca5211b0b482761b7fca8f376
-
linux-cloud-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:37de310b1527ae52779323c0ff7a28f533a1b6d4
-
linux-cloud-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:b5db9fa63e6f6b161e8632bbac2eea66319bbb7b
-
linux-cloud-tools-common_4.15.0-240.251_all.deb
sha:6bbd2349e65ac4c99338250e0bf0d536e1f62cb1
-
linux-cloud-tools-generic_4.15.0.240.251_amd64.deb
sha:08be7cc57534ed56c5636be7ffcecb2f5ced4079
-
linux-cloud-tools-lowlatency_4.15.0.240.251_amd64.deb
sha:13e2b81db3e92bb6042156fcf4ac6b255c94d392
-
linux-crashdump_4.15.0.240.251_amd64.deb
sha:b0fd4c04ef3ed95a4a47bf4cc70befd75fc37982
-
linux-doc_4.15.0-240.251_all.deb
sha:f435f0af99bca6ec3c5baf30c0ac79e89ab2e9bb
-
linux-generic_4.15.0.240.251_amd64.deb
sha:17422ab01fea46588d1c538be77f9f4f608c7f06
-
linux-headers-4.15.0-240-tuxcare.els28_4.15.0-240.251_all.deb
sha:507f22d76ab81ce29787a264b7526f28cb5fcf39
-
linux-headers-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:59b2494c1524a9d53d2df53476df97db8cbea1f5
-
linux-headers-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:f5e9189ff4632c0a984353b377d9bb6bdf692114
-
linux-headers-generic_4.15.0.240.251_amd64.deb
sha:be7502d4feecbcb51d098dcb7d38a01438b706ec
-
linux-headers-lowlatency_4.15.0.240.251_amd64.deb
sha:2c21992095a964c4f6e1b28a97e949648ed03a14
-
linux-image-generic_4.15.0.240.251_amd64.deb
sha:77f3bc81872b56eba4c357aed53db24a9a4bc310
-
linux-image-lowlatency_4.15.0.240.251_amd64.deb
sha:0ce8feeff0ed218a0c6a1ba09afd8792a2725e0a
-
linux-image-unsigned-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:aba8727e3fca30b3446c6c41dc36d6373fcca385
-
linux-image-unsigned-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:a6fd4227efead7e71c40b9f0ea1781b5d4a76452
-
linux-libc-dev_4.15.0-240.251_amd64.deb
sha:09bd246ee5dc8cfa40e98383f84d6ff7f9e7922e
-
linux-lowlatency_4.15.0.240.251_amd64.deb
sha:5695bf38b2e6aa40a5eea7271cdb6a6c46988359
-
linux-modules-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:c2bb38e68eb79fbd5bfb69f73820df07e9841167
-
linux-modules-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:a2070e48fa761adccda5bd730ea56e6e509d2f40
-
linux-modules-extra-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:8eda36529392ff71406390fd50883fe40c951ed6
-
linux-source_4.15.0.240.251_all.deb
sha:e2a5e75f5a9c5b7dc53e2fad177bf83f363062fc
-
linux-source-4.15.0_4.15.0-240.251_all.deb
sha:5c64264a723d75ffa1490baaa2bcd5c826e813da
-
linux-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
sha:4d4bcd23a2c051b685d7acddc789599c7909990a
-
linux-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
sha:532ccc38f9aefb3d3cdb624bb999ed1857b772f2
-
linux-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
sha:bef6287d17850d8445c6a833aaafb31aa8b99ad3
-
linux-tools-common_4.15.0-240.251_all.deb
sha:8d47ecdef5b42d148a22819954448e1e16ef3d99
-
linux-tools-generic_4.15.0.240.251_amd64.deb
sha:5f75226e992daea1540171db7f7ba215ea7bf7ee
-
linux-tools-host_4.15.0-240.251_all.deb
sha:ef8ed05d4ad41f1954e276a6e55e68733c9bec6c
-
linux-tools-lowlatency_4.15.0.240.251_amd64.deb
sha:5e90f13dd758f4bd0c00f9ee8ebcae8c724135b2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.