[CLSA-2025:1736469452] Fix of 35 CVEs
Type:
security
Severity:
None
Release date:
2025-01-10 00:37:37 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2023-52664 - net: atlantic: eliminate double free in error handling logic * CVE-url: https://ubuntu.com/security/CVE-2023-52698 - calipso: fix memory leak in netlbl_calipso_add_pass() * CVE-url: https://ubuntu.com/security/CVE-2021-47466 - mm, slub: fix potential memoryleak in kmem_cache_open() * CVE-url: https://ubuntu.com/security/CVE-2023-52757 - smb: client: fix potential deadlock when releasing mids * CVE-url: https://ubuntu.com/security/CVE-2023-52749 - spi: Fix null dereference on suspend * CVE-url: https://ubuntu.com/security/CVE-2024-26921 - net: ipv4: do not handle duplicate fragments as overlapping - net: IP defrag: encapsulate rbtree defrag code into callable functions - ipv4: remove unnecessary type castings - skb_expand_head() adjust skb->truesize incorrectly - inet: inet_defrag: prevent sk release while still in use * CVE-url: https://ubuntu.com/security/CVE-2021-47082 - tun: avoid double free in tun_free_netdev * CVE-url: https://ubuntu.com/security/CVE-2024-36968 - Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() * CVE-url: https://ubuntu.com/security/CVE-2023-52507 - nfc: nci: assert requested protocol is valid * CVE-url: https://ubuntu.com/security/CVE-2024-44944 - netfilter: ctnetlink: use helper function to calculate expect ID * CVE-url: https://ubuntu.com/security/CVE-2024-35861 - smb: client: fix potential UAF in cifs_debug_files_proc_show() - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() * CVE-url: https://ubuntu.com/security/CVE-2024-35863 - smb: client: fix potential UAF in smb2_is_valid_oplock_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35864 - smb: client: fix potential UAF in smb2_is_valid_lease_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35867 - smb: client: fix potential UAF in cifs_stats_proc_show() * CVE-url: https://ubuntu.com/security/CVE-2024-35868 - smb: client: fix potential UAF in cifs_stats_proc_write() * CVE-url: https://ubuntu.com/security/CVE-2024-35896 - netfilter: validate user input for expected length * CVE-url: https://ubuntu.com/security/CVE-2024-27010 - net/sched: Fix mirred deadlock on device recursion * CVE-url: https://ubuntu.com/security/CVE-2024-26961 - mac802154: fix llsec key resources release in mac802154_llsec_key_del * CVE-url: https://ubuntu.com/security/CVE-2024-26958 - NFS: Fix up commit deadlocks - nfs: fix UAF in direct writes * CVE-url: https://ubuntu.com/security/CVE-2024-50115 - KVM: nSVM: Don't strip host's C-bit from guest's CR3 when reading PDPTRs - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory * CVE-url: https://ubuntu.com/security/CVE-2024-50148 - Bluetooth: bnep: fix wild-memory-access in proto_unregister * CVE-url: https://ubuntu.com/security/CVE-2024-40910 - ax25: Fix refcount imbalance on inbound connections * CVE-url: https://ubuntu.com/security/CVE-2024-53057 - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT * CVE-url: https://ubuntu.com/security/CVE-2021-47101 - net: asix: fix uninit value bugs - asix: fix uninit-value in asix_mdio_read() * CVE-url: https://ubuntu.com/security/CVE-2024-36952 - scsi: lpfc: Move NPIV's transport unregistration to after resource clean up * CVE-url: https://ubuntu.com/security/CVE-2023-52488 - regmap: Add regmap_noinc_read API - regmap: Add regmap_noinc_write API - serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO * CVE-url: https://ubuntu.com/security/CVE-2024-50142 - xfrm: validate new SA's prefixlen using SA family when sel.family is unset * CVE-url: https://ubuntu.com/security/CVE-2024-50256 - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() * CVE-url: https://ubuntu.com/security/CVE-2024-50264 - vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans * CVE-url: https://ubuntu.com/security/CVE-2021-47501 - i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc * CVE-url: https://ubuntu.com/security/CVE-2021-47076 - RDMA/rxe: Return CQE error if invalid lkey was supplied * CVE-url: https://ubuntu.com/security/CVE-2023-52574 - team: fix null-ptr-deref when team device type is changed * CVE-url: https://ubuntu.com/security/CVE-2023-52477 - usb: hub: Guard against accesses to uninitialized BOS descriptors * CVE-url: https://ubuntu.com/security/CVE-2023-52475 - Input: powermate - fix use-after-free in powermate_config_complete * CVE-url: https://ubuntu.com/security/CVE-2024-39489 - ipv6: sr: fix memleak in seg6_hmac_init_algo
Updated packages:
  • linux-buildinfo-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:b3755238531998193d13768cebed1dad0d14f559
  • linux-buildinfo-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:96f98e2db9ac5d44944edd7e5bf048619c9bd4bf
  • linux-cloud-tools-4.15.0-242-tuxcare.els30_4.15.0-242.253_amd64.deb
    sha:2b7c99bdf6e21f26018857faf92cd45064443d93
  • linux-cloud-tools-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:25383109d04f7ce2637f45f467559d6923983f81
  • linux-cloud-tools-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:101f39cd5ad594179979e3f6329b076394bf5f11
  • linux-cloud-tools-common_4.15.0-242.253_all.deb
    sha:4a31735fde4d5bea4e23bd73cb8ba103cf61b3e4
  • linux-cloud-tools-generic_4.15.0.242.253_amd64.deb
    sha:815ba6e975f7e6eb2917233b1c4aa134230c3540
  • linux-cloud-tools-lowlatency_4.15.0.242.253_amd64.deb
    sha:0d536bf925969c15633b3580a6b4eb4e03a03e50
  • linux-crashdump_4.15.0.242.253_amd64.deb
    sha:35ac24792f2d2c76389f059e3a10b99bd1d0e7c6
  • linux-doc_4.15.0-242.253_all.deb
    sha:ae57d246cccb81ecb746ac1f275ef859fb21732a
  • linux-generic_4.15.0.242.253_amd64.deb
    sha:0def929df27c711953655b8e8810ca2135658d66
  • linux-headers-4.15.0-242-tuxcare.els30_4.15.0-242.253_all.deb
    sha:cb0318c3cd2f9cc9e9a1e2a385ea06304a8c21b4
  • linux-headers-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:a6d6ac46e5862bcd91046d86a0097353a088e1c8
  • linux-headers-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:3b4269b8229dc08a278b7c69aae16bc236e3e2c8
  • linux-headers-generic_4.15.0.242.253_amd64.deb
    sha:48d1479698a547f6aef25fc99a4ef7d0f34d9b66
  • linux-headers-lowlatency_4.15.0.242.253_amd64.deb
    sha:5119f8f3e3225da2d255cd54add2814536c3c6ee
  • linux-image-generic_4.15.0.242.253_amd64.deb
    sha:5fae53f2652f966c6faf8171d57df048f35f3961
  • linux-image-lowlatency_4.15.0.242.253_amd64.deb
    sha:2a63458c0264a4b071924519bd78915129492512
  • linux-image-unsigned-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:ceb992e496dfdee181fb8a4fc53606c96f63e894
  • linux-image-unsigned-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:fce860380ae2f75692064c8ea0cc4aa6230d1e66
  • linux-libc-dev_4.15.0-242.253_amd64.deb
    sha:5780bbd01bb016a5fc1a297b67eff5b469447f7d
  • linux-lowlatency_4.15.0.242.253_amd64.deb
    sha:45d236c2e0a778c0ccb3f65c921e6d6471dceb20
  • linux-modules-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:7b10f55113cec664ac2fd10ecadb2be82487ff03
  • linux-modules-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:81a972047c3922b1a4b03e5cb53fd2ac99ccc2c2
  • linux-modules-extra-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:ed91d89a4353f30fc5589723df25b87cc564865b
  • linux-source_4.15.0.242.253_all.deb
    sha:835d293349b1a8f53a424b8ac4644ca3afa55747
  • linux-source-4.15.0_4.15.0-242.253_all.deb
    sha:9cf40d5af05b7b8aaa08cf54a1aa7d847a7a7baa
  • linux-tools-4.15.0-242-tuxcare.els30_4.15.0-242.253_amd64.deb
    sha:f7f4bef94cf9b3e1954189802264b1202dc56045
  • linux-tools-4.15.0-242-tuxcare.els30-generic_4.15.0-242.253_amd64.deb
    sha:56a24882320e1da576ee5922292f4333d9018944
  • linux-tools-4.15.0-242-tuxcare.els30-lowlatency_4.15.0-242.253_amd64.deb
    sha:852db188d89d1c4f95eeb23ab575c2c7c748b6f6
  • linux-tools-common_4.15.0-242.253_all.deb
    sha:4bcdab7ff7244ca929322520fad2c174342430e3
  • linux-tools-generic_4.15.0.242.253_amd64.deb
    sha:27e80783aa5bd2ec85160c19deac0ecc5d4cdba9
  • linux-tools-host_4.15.0-242.253_all.deb
    sha:37ca0c4c552879e6261098fc54269aab541e17d9
  • linux-tools-lowlatency_4.15.0.242.253_amd64.deb
    sha:fe6697b2fb93a8b5f651ef6a1abafa22c96edfbe
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.