Release date:
2025-01-10 00:30:12 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2023-52664
- net: atlantic: eliminate double free in error handling logic
* CVE-url: https://ubuntu.com/security/CVE-2023-52698
- calipso: fix memory leak in netlbl_calipso_add_pass()
* CVE-url: https://ubuntu.com/security/CVE-2021-47466
- mm, slub: fix potential memoryleak in kmem_cache_open()
* CVE-url: https://ubuntu.com/security/CVE-2023-52757
- smb: client: fix potential deadlock when releasing mids
* CVE-url: https://ubuntu.com/security/CVE-2023-52749
- spi: Fix null dereference on suspend
* CVE-url: https://ubuntu.com/security/CVE-2024-26921
- net: ipv4: do not handle duplicate fragments as overlapping
- net: IP defrag: encapsulate rbtree defrag code into callable functions
- ipv4: remove unnecessary type castings
- skb_expand_head() adjust skb->truesize incorrectly
- inet: inet_defrag: prevent sk release while still in use
* CVE-url: https://ubuntu.com/security/CVE-2021-47082
- tun: avoid double free in tun_free_netdev
* CVE-url: https://ubuntu.com/security/CVE-2024-36968
- Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
* CVE-url: https://ubuntu.com/security/CVE-2023-52507
- nfc: nci: assert requested protocol is valid
* CVE-url: https://ubuntu.com/security/CVE-2024-44944
- netfilter: ctnetlink: use helper function to calculate expect ID
* CVE-url: https://ubuntu.com/security/CVE-2024-35861
- smb: client: fix potential UAF in cifs_debug_files_proc_show()
- smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
* CVE-url: https://ubuntu.com/security/CVE-2024-35863
- smb: client: fix potential UAF in smb2_is_valid_oplock_break()
* CVE-url: https://ubuntu.com/security/CVE-2024-35864
- smb: client: fix potential UAF in smb2_is_valid_lease_break()
* CVE-url: https://ubuntu.com/security/CVE-2024-35867
- smb: client: fix potential UAF in cifs_stats_proc_show()
* CVE-url: https://ubuntu.com/security/CVE-2024-35868
- smb: client: fix potential UAF in cifs_stats_proc_write()
* CVE-url: https://ubuntu.com/security/CVE-2024-35896
- netfilter: validate user input for expected length
* CVE-url: https://ubuntu.com/security/CVE-2024-27010
- net/sched: Fix mirred deadlock on device recursion
* CVE-url: https://ubuntu.com/security/CVE-2024-26961
- mac802154: fix llsec key resources release in mac802154_llsec_key_del
* CVE-url: https://ubuntu.com/security/CVE-2024-26958
- NFS: Fix up commit deadlocks
- nfs: fix UAF in direct writes
* CVE-url: https://ubuntu.com/security/CVE-2024-50115
- KVM: nSVM: Don't strip host's C-bit from guest's CR3 when reading PDPTRs
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
* CVE-url: https://ubuntu.com/security/CVE-2024-50148
- Bluetooth: bnep: fix wild-memory-access in proto_unregister
* CVE-url: https://ubuntu.com/security/CVE-2024-40910
- ax25: Fix refcount imbalance on inbound connections
* CVE-url: https://ubuntu.com/security/CVE-2024-53057
- net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
* CVE-url: https://ubuntu.com/security/CVE-2021-47101
- net: asix: fix uninit value bugs
- asix: fix uninit-value in asix_mdio_read()
* CVE-url: https://ubuntu.com/security/CVE-2024-36952
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up
* CVE-url: https://ubuntu.com/security/CVE-2023-52488
- regmap: Add regmap_noinc_read API
- regmap: Add regmap_noinc_write API
- serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO
* CVE-url: https://ubuntu.com/security/CVE-2024-50142
- xfrm: validate new SA's prefixlen using SA family when sel.family is unset
* CVE-url: https://ubuntu.com/security/CVE-2024-50256
- netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
* CVE-url: https://ubuntu.com/security/CVE-2024-50264
- vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
* CVE-url: https://ubuntu.com/security/CVE-2021-47501
- i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
* CVE-url: https://ubuntu.com/security/CVE-2021-47076
- RDMA/rxe: Return CQE error if invalid lkey was supplied
* CVE-url: https://ubuntu.com/security/CVE-2023-52574
- team: fix null-ptr-deref when team device type is changed
* CVE-url: https://ubuntu.com/security/CVE-2023-52477
- usb: hub: Guard against accesses to uninitialized BOS descriptors
* CVE-url: https://ubuntu.com/security/CVE-2023-52475
- Input: powermate - fix use-after-free in powermate_config_complete
* CVE-url: https://ubuntu.com/security/CVE-2024-39489
- ipv6: sr: fix memleak in seg6_hmac_init_algo
Updated packages:
-
linux-buildinfo-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:b3755238531998193d13768cebed1dad0d14f559
-
linux-buildinfo-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:96f98e2db9ac5d44944edd7e5bf048619c9bd4bf
-
linux-cloud-tools-4.15.0-242-tuxcare.els30_4.15.0-242.253_amd64.deb
sha:2b7c99bdf6e21f26018857faf92cd45064443d93
-
linux-cloud-tools-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:25383109d04f7ce2637f45f467559d6923983f81
-
linux-cloud-tools-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:101f39cd5ad594179979e3f6329b076394bf5f11
-
linux-cloud-tools-common_4.15.0-242.253_all.deb
sha:4a31735fde4d5bea4e23bd73cb8ba103cf61b3e4
-
linux-cloud-tools-generic_4.15.0.242.253_amd64.deb
sha:815ba6e975f7e6eb2917233b1c4aa134230c3540
-
linux-cloud-tools-lowlatency_4.15.0.242.253_amd64.deb
sha:0d536bf925969c15633b3580a6b4eb4e03a03e50
-
linux-crashdump_4.15.0.242.253_amd64.deb
sha:35ac24792f2d2c76389f059e3a10b99bd1d0e7c6
-
linux-doc_4.15.0-242.253_all.deb
sha:ae57d246cccb81ecb746ac1f275ef859fb21732a
-
linux-generic_4.15.0.242.253_amd64.deb
sha:0def929df27c711953655b8e8810ca2135658d66
-
linux-headers-4.15.0-242-tuxcare.els30_4.15.0-242.253_all.deb
sha:cb0318c3cd2f9cc9e9a1e2a385ea06304a8c21b4
-
linux-headers-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:a6d6ac46e5862bcd91046d86a0097353a088e1c8
-
linux-headers-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:3b4269b8229dc08a278b7c69aae16bc236e3e2c8
-
linux-headers-generic_4.15.0.242.253_amd64.deb
sha:48d1479698a547f6aef25fc99a4ef7d0f34d9b66
-
linux-headers-lowlatency_4.15.0.242.253_amd64.deb
sha:5119f8f3e3225da2d255cd54add2814536c3c6ee
-
linux-image-generic_4.15.0.242.253_amd64.deb
sha:5fae53f2652f966c6faf8171d57df048f35f3961
-
linux-image-lowlatency_4.15.0.242.253_amd64.deb
sha:2a63458c0264a4b071924519bd78915129492512
-
linux-image-unsigned-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:ceb992e496dfdee181fb8a4fc53606c96f63e894
-
linux-image-unsigned-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:fce860380ae2f75692064c8ea0cc4aa6230d1e66
-
linux-libc-dev_4.15.0-242.253_amd64.deb
sha:5780bbd01bb016a5fc1a297b67eff5b469447f7d
-
linux-lowlatency_4.15.0.242.253_amd64.deb
sha:45d236c2e0a778c0ccb3f65c921e6d6471dceb20
-
linux-modules-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:7b10f55113cec664ac2fd10ecadb2be82487ff03
-
linux-modules-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:81a972047c3922b1a4b03e5cb53fd2ac99ccc2c2
-
linux-modules-extra-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:ed91d89a4353f30fc5589723df25b87cc564865b
-
linux-source_4.15.0.242.253_all.deb
sha:835d293349b1a8f53a424b8ac4644ca3afa55747
-
linux-source-4.15.0_4.15.0-242.253_all.deb
sha:9cf40d5af05b7b8aaa08cf54a1aa7d847a7a7baa
-
linux-tools-4.15.0-242-tuxcare.els30_4.15.0-242.253_amd64.deb
sha:f7f4bef94cf9b3e1954189802264b1202dc56045
-
linux-tools-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
sha:56a24882320e1da576ee5922292f4333d9018944
-
linux-tools-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
sha:852db188d89d1c4f95eeb23ab575c2c7c748b6f6
-
linux-tools-common_4.15.0-242.253_all.deb
sha:4bcdab7ff7244ca929322520fad2c174342430e3
-
linux-tools-generic_4.15.0.242.253_amd64.deb
sha:27e80783aa5bd2ec85160c19deac0ecc5d4cdba9
-
linux-tools-host_4.15.0-242.253_all.deb
sha:37ca0c4c552879e6261098fc54269aab541e17d9
-
linux-tools-lowlatency_4.15.0.242.253_amd64.deb
sha:fe6697b2fb93a8b5f651ef6a1abafa22c96edfbe
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.