Release date:
2025-02-06 14:40:17 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-26595
- mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
* CVE-url: https://ubuntu.com/security/CVE-2024-38553/CVE-2024-38597
- netpoll: make ndo_poll_controller() optional
- bonding: use netpoll_poll_dev() helper
- netpoll: do not test NAPI_STATE_SCHED in poll_one_napi()
* CVE-url: https://ubuntu.com/security/CVE-2024-38597
- eth: sungem: remove .ndo_poll_controller to avoid deadlocks
* CVE-url: https://ubuntu.com/security/CVE-2024-38553
- net: fec: remove .ndo_poll_controller to avoid deadlocks
* CVE-url: https://ubuntu.com/security/CVE-2024-42252
- closures: Change BUG_ON() to WARN_ON()
* CVE-url: https://ubuntu.com/security/CVE-2024-41066
- ibmvnic: Add tx check to prevent skb leak
* CVE-url: https://ubuntu.com/security/CVE-2024-40982
- ssb: Fix potential NULL pointer dereference in ssb_device_uevent()
* CVE-url: https://ubuntu.com/security/CVE-2024-26689
- ceph: prevent use-after-free in encode_cap_msg()
- fixup! ceph: prevent use-after-free in encode_cap_msg()
* CVE-url: https://ubuntu.com/security/CVE-2024-56595
- jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree
* CVE-url: https://ubuntu.com/security/CVE-2024-57892
- ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
* CVE-url: https://ubuntu.com/security/CVE-2024-57896
- btrfs: fix hang during unmount when stopping a space reclaim worker
- btrfs: wait for fixup workers before stopping cleaner kthread during umount
- btrfs: flush delalloc workers queue before stopping cleaner kthread during
unmount
* CVE-url: https://ubuntu.com/security/CVE-2024-56598
- jfs: array-index-out-of-bounds fix in dtReadFirst
* CVE-url: https://ubuntu.com/security/CVE-2024-56551
- drm/amdgpu: fix usage slab after free
* CVE-url: https://ubuntu.com/security/CVE-2024-56596
- jfs: fix array-index-out-of-bounds in jfs_readdir
* CVE-url: https://ubuntu.com/security/CVE-2024-56615
- bpf: fix OOB devmap writes when deleting elements
* CVE-url: https://ubuntu.com/security/CVE-2024-57887
- drm: adv7511: Fix use-after-free in adv7533_attach_dsi()
* CVE-url: https://ubuntu.com/security/CVE-2024-50154
- tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
* CVE-url: https://ubuntu.com/security/CVE-2024-56775
- drm/amd/display: Fix handling of plane refcount
* CVE-url: https://ubuntu.com/security/CVE-2024-57900
- ila: serialize calls to nf_register_net_hooks()
* CVE-url: https://ubuntu.com/security/CVE-2024-35887
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer
* CVE-url: https://ubuntu.com/security/CVE-2022-48739
- ASoC: hdmi-codec: Fix OOB memory accesses
* CVE-url: https://ubuntu.com/security/CVE-2024-56704
- 9p/xen: fix release of IRQ
* CVE-url: https://ubuntu.com/security/CVE-2024-56606
- af_packet: avoid erroring out after sock_init_data() in packet_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53141
- netfilter: ipset: add missing range check in bitmap_ip_uadt
* CVE-url: https://ubuntu.com/security/CVE-2023-52691
- drm/amd/pm: fix a double-free in si_dpm_init
* CVE-url: https://ubuntu.com/security/CVE-2024-53165
- sh: intc: Fix use-after-free bug in register_intc_controller()
* CVE-url: https://ubuntu.com/security/CVE-2023-52818
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7
* CVE-url: https://ubuntu.com/security/CVE-2024-56603
- net: af_can: do not leave a dangling sk pointer in can_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53173
- NFSv4.0: Fix a use-after-free problem in the asynchronous open()
* CVE-url: https://ubuntu.com/security/CVE-2024-56602
- net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-26996
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport
error
* CVE-url: https://ubuntu.com/security/CVE-2024-56650
- netfilter: x_tables: fix LED ID check in led_tg_check()
* CVE-url: https://ubuntu.com/security/CVE-2024-56600
- net: inet6: do not leave a dangling sk pointer in inet6_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53227
- scsi: bfa: Fix use-after-free in bfad_im_module_exit()
* CVE-url: https://ubuntu.com/security/CVE-2021-47328
- scsi: iscsi: Fix conn use after free during resets
* CVE-url: https://ubuntu.com/security/CVE-2024-53155
- ocfs2: fix uninitialized value in ocfs2_file_read_iter()
* CVE-url: https://ubuntu.com/security/CVE-2024-56651
- can: hi311x: hi3110_can_ist(): fix potential use-after-free
* CVE-url: https://ubuntu.com/security/CVE-2021-47281
- ALSA: timer: Fix possible race at assigning a timer instance
- ALSA: seq: Fix race of snd_seq_timer_open()
* CVE-url: https://ubuntu.com/security/CVE-2024-56605
- Bluetooth: L2CAP: do not leave dangling sk pointer on error in
l2cap_sock_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-53156
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()
* CVE-url: https://ubuntu.com/security/CVE-2023-52741
- cifs: Fix use-after-free in rdata->read_into_pages()
* CVE-url: https://ubuntu.com/security/CVE-2024-56759
- btrfs: fix use-after-free when COWing tree bock and tracing is enabled
* CVE-url: https://ubuntu.com/security/CVE-2024-56604
- Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
* CVE-url: https://ubuntu.com/security/CVE-2024-53142
- initramfs: avoid filename buffer overrun
* CVE-url: https://ubuntu.com/security/CVE-2024-56601
- net: inet: do not leave a dangling sk pointer in inet_create()
* CVE-url: https://ubuntu.com/security/CVE-2024-56662
- acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
* CVE-url: https://ubuntu.com/security/CVE-2024-56631
- scsi: sg: Fix slab-use-after-free read in sg_release()
* CVE-url: https://ubuntu.com/security/CVE-2024-53103
- hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
* CVE-url: https://ubuntu.com/security/CVE-2024-56581
- btrfs: ref-verify: fix use-after-free after invalid ref action
* CVE-url: https://ubuntu.com/security/CVE-2021-47191
- scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
* CVE-url: https://ubuntu.com/security/CVE-2023-52478
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
* CVE-url: https://ubuntu.com/security/CVE-2024-36924
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()
* CVE-url: https://ubuntu.com/security/CVE-2023-52476
- perf/x86/lbr: Filter vsyscall addresses
* CVE-url: https://ubuntu.com/security/CVE-2024-27011
- netfilter: nf_tables: fix memleak in map from abort path
* CVE-url: https://ubuntu.com/security/CVE-2024-53088
- i40e: fix race condition by adding filter's intermediate sync state
Updated packages:
-
linux-buildinfo-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:0726b9c4bc10e52bf3df86ca2dea53c4e0209a76
-
linux-buildinfo-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:375ddf306f194ae27ea8cd743f9534399454b278
-
linux-cloud-tools-4.15.0-243-tuxcare.els31_4.15.0-243.254_amd64.deb
sha:15e832bfdff4aa8ea082e04c08a9539fc25b22b4
-
linux-cloud-tools-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:1eb12c42fe1ab68f208bee3726f3e803687a859e
-
linux-cloud-tools-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:9d37b3908a31895d66347fa656ab097c1dc1033a
-
linux-cloud-tools-common_4.15.0-243.254_all.deb
sha:a2c12d5a6ae48f18e5787602b1e2283bdcae68f1
-
linux-cloud-tools-generic_4.15.0.243.254_amd64.deb
sha:4385742dab71fc3b1442914ed7977760b8baac96
-
linux-cloud-tools-lowlatency_4.15.0.243.254_amd64.deb
sha:571caeaf26ab9b094cdca5ec54be7f198e58462b
-
linux-crashdump_4.15.0.243.254_amd64.deb
sha:5768045a3b9c17aa268f44f36fc0e66709b14e8c
-
linux-doc_4.15.0-243.254_all.deb
sha:e85f6196f3d94b85febec3dd3042ecc66e9de052
-
linux-generic_4.15.0.243.254_amd64.deb
sha:8f4d855643cbe943ae4f9f7a18654308d8e53272
-
linux-headers-4.15.0-243-tuxcare.els31_4.15.0-243.254_all.deb
sha:751700e5e62811b3a55b97c61f6192ea59f36f71
-
linux-headers-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:6b812f37f2eb30a0417f036e29ebcd8f544e3905
-
linux-headers-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:152a0a3473f6f07e24d8fbb6f96fc890ec1537c2
-
linux-headers-generic_4.15.0.243.254_amd64.deb
sha:7bba12f37d37a448f4754c994abef29b22f93b84
-
linux-headers-lowlatency_4.15.0.243.254_amd64.deb
sha:316c739826fafad5fe5942030ec80f05d5f9f232
-
linux-image-generic_4.15.0.243.254_amd64.deb
sha:a0bc321310ea597c11c5c920de0f26c02457233b
-
linux-image-lowlatency_4.15.0.243.254_amd64.deb
sha:534de11b85508f92371a9c7c550762b05299cb5a
-
linux-image-unsigned-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:5824052d06860ee9c3defecc4acc2a3ddde6e44c
-
linux-image-unsigned-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:3318b12ea1b8f1fa84d9e8cdbffa5cfca964f793
-
linux-libc-dev_4.15.0-243.254_amd64.deb
sha:d5c6fb2381fcca5513333f63c2e42494f9fb70e2
-
linux-lowlatency_4.15.0.243.254_amd64.deb
sha:1b0bac1c3188cc2100c88ef2b5f62a595b02f51c
-
linux-modules-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:9645708ac720d148b3ed34c0ec8d3289e6c1176d
-
linux-modules-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:edf340939937b61856d39a9d984d3725a4518626
-
linux-modules-extra-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:8d1580632990e0266ff2c871c6b06f575645394b
-
linux-source_4.15.0.243.254_all.deb
sha:2018c28a85b47425ded24529a36759ad9fce213d
-
linux-source-4.15.0_4.15.0-243.254_all.deb
sha:5c6ddfa3a4d83fb0085c3ff9bc70064c501b156e
-
linux-tools-4.15.0-243-tuxcare.els31_4.15.0-243.254_amd64.deb
sha:05eb7e0baa669c1bf6a4b39db54eb8464afaae3f
-
linux-tools-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
sha:4b3c4d9b21ff08e68407d41c9adf79f2a400a7e6
-
linux-tools-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
sha:ba602c1a28ab1f4e0cca068b2fff5f9abe7e9374
-
linux-tools-common_4.15.0-243.254_all.deb
sha:53ce3aaf2bd46e329266669b119b18cdad703273
-
linux-tools-generic_4.15.0.243.254_amd64.deb
sha:14dbebba78325861b5d8069ce67dcf11199967a9
-
linux-tools-host_4.15.0-243.254_all.deb
sha:6376ab48c28250e1493a3c4e674a9ff18842e890
-
linux-tools-lowlatency_4.15.0.243.254_amd64.deb
sha:1f4cd743980d9943b17abad3f3b667be62508fba
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.