[CLSA-2025:1738853271] Fix of 54 CVEs
Type:
security
Severity:
None
Release date:
2025-02-06 14:47:56 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-26595 - mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path * CVE-url: https://ubuntu.com/security/CVE-2024-38553/CVE-2024-38597 - netpoll: make ndo_poll_controller() optional - bonding: use netpoll_poll_dev() helper - netpoll: do not test NAPI_STATE_SCHED in poll_one_napi() * CVE-url: https://ubuntu.com/security/CVE-2024-38597 - eth: sungem: remove .ndo_poll_controller to avoid deadlocks * CVE-url: https://ubuntu.com/security/CVE-2024-38553 - net: fec: remove .ndo_poll_controller to avoid deadlocks * CVE-url: https://ubuntu.com/security/CVE-2024-42252 - closures: Change BUG_ON() to WARN_ON() * CVE-url: https://ubuntu.com/security/CVE-2024-41066 - ibmvnic: Add tx check to prevent skb leak * CVE-url: https://ubuntu.com/security/CVE-2024-40982 - ssb: Fix potential NULL pointer dereference in ssb_device_uevent() * CVE-url: https://ubuntu.com/security/CVE-2024-26689 - ceph: prevent use-after-free in encode_cap_msg() - fixup! ceph: prevent use-after-free in encode_cap_msg() * CVE-url: https://ubuntu.com/security/CVE-2024-56595 - jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree * CVE-url: https://ubuntu.com/security/CVE-2024-57892 - ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv * CVE-url: https://ubuntu.com/security/CVE-2024-57896 - btrfs: fix hang during unmount when stopping a space reclaim worker - btrfs: wait for fixup workers before stopping cleaner kthread during umount - btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount * CVE-url: https://ubuntu.com/security/CVE-2024-56598 - jfs: array-index-out-of-bounds fix in dtReadFirst * CVE-url: https://ubuntu.com/security/CVE-2024-56551 - drm/amdgpu: fix usage slab after free * CVE-url: https://ubuntu.com/security/CVE-2024-56596 - jfs: fix array-index-out-of-bounds in jfs_readdir * CVE-url: https://ubuntu.com/security/CVE-2024-56615 - bpf: fix OOB devmap writes when deleting elements * CVE-url: https://ubuntu.com/security/CVE-2024-57887 - drm: adv7511: Fix use-after-free in adv7533_attach_dsi() * CVE-url: https://ubuntu.com/security/CVE-2024-50154 - tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). * CVE-url: https://ubuntu.com/security/CVE-2024-56775 - drm/amd/display: Fix handling of plane refcount * CVE-url: https://ubuntu.com/security/CVE-2024-57900 - ila: serialize calls to nf_register_net_hooks() * CVE-url: https://ubuntu.com/security/CVE-2024-35887 - ax25: fix use-after-free bugs caused by ax25_ds_del_timer * CVE-url: https://ubuntu.com/security/CVE-2022-48739 - ASoC: hdmi-codec: Fix OOB memory accesses * CVE-url: https://ubuntu.com/security/CVE-2024-56704 - 9p/xen: fix release of IRQ * CVE-url: https://ubuntu.com/security/CVE-2024-56606 - af_packet: avoid erroring out after sock_init_data() in packet_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53141 - netfilter: ipset: add missing range check in bitmap_ip_uadt * CVE-url: https://ubuntu.com/security/CVE-2023-52691 - drm/amd/pm: fix a double-free in si_dpm_init * CVE-url: https://ubuntu.com/security/CVE-2024-53165 - sh: intc: Fix use-after-free bug in register_intc_controller() * CVE-url: https://ubuntu.com/security/CVE-2023-52818 - drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 * CVE-url: https://ubuntu.com/security/CVE-2024-56603 - net: af_can: do not leave a dangling sk pointer in can_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53173 - NFSv4.0: Fix a use-after-free problem in the asynchronous open() * CVE-url: https://ubuntu.com/security/CVE-2024-56602 - net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() * CVE-url: https://ubuntu.com/security/CVE-2024-26996 - usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error * CVE-url: https://ubuntu.com/security/CVE-2024-56650 - netfilter: x_tables: fix LED ID check in led_tg_check() * CVE-url: https://ubuntu.com/security/CVE-2024-56600 - net: inet6: do not leave a dangling sk pointer in inet6_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53227 - scsi: bfa: Fix use-after-free in bfad_im_module_exit() * CVE-url: https://ubuntu.com/security/CVE-2021-47328 - scsi: iscsi: Fix conn use after free during resets * CVE-url: https://ubuntu.com/security/CVE-2024-53155 - ocfs2: fix uninitialized value in ocfs2_file_read_iter() * CVE-url: https://ubuntu.com/security/CVE-2024-56651 - can: hi311x: hi3110_can_ist(): fix potential use-after-free * CVE-url: https://ubuntu.com/security/CVE-2021-47281 - ALSA: timer: Fix possible race at assigning a timer instance - ALSA: seq: Fix race of snd_seq_timer_open() * CVE-url: https://ubuntu.com/security/CVE-2024-56605 - Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() * CVE-url: https://ubuntu.com/security/CVE-2024-53156 - wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() * CVE-url: https://ubuntu.com/security/CVE-2023-52741 - cifs: Fix use-after-free in rdata->read_into_pages() * CVE-url: https://ubuntu.com/security/CVE-2024-56759 - btrfs: fix use-after-free when COWing tree bock and tracing is enabled * CVE-url: https://ubuntu.com/security/CVE-2024-56604 - Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() * CVE-url: https://ubuntu.com/security/CVE-2024-53142 - initramfs: avoid filename buffer overrun * CVE-url: https://ubuntu.com/security/CVE-2024-56601 - net: inet: do not leave a dangling sk pointer in inet_create() * CVE-url: https://ubuntu.com/security/CVE-2024-56662 - acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl * CVE-url: https://ubuntu.com/security/CVE-2024-56631 - scsi: sg: Fix slab-use-after-free read in sg_release() * CVE-url: https://ubuntu.com/security/CVE-2024-53103 - hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer * CVE-url: https://ubuntu.com/security/CVE-2024-56581 - btrfs: ref-verify: fix use-after-free after invalid ref action * CVE-url: https://ubuntu.com/security/CVE-2021-47191 - scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() * CVE-url: https://ubuntu.com/security/CVE-2023-52478 - HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect * CVE-url: https://ubuntu.com/security/CVE-2024-36924 - scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() * CVE-url: https://ubuntu.com/security/CVE-2023-52476 - perf/x86/lbr: Filter vsyscall addresses * CVE-url: https://ubuntu.com/security/CVE-2024-27011 - netfilter: nf_tables: fix memleak in map from abort path * CVE-url: https://ubuntu.com/security/CVE-2024-53088 - i40e: fix race condition by adding filter's intermediate sync state
Updated packages:
  • linux-buildinfo-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:0726b9c4bc10e52bf3df86ca2dea53c4e0209a76
  • linux-buildinfo-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:375ddf306f194ae27ea8cd743f9534399454b278
  • linux-cloud-tools-4.15.0-243-tuxcare.els31_4.15.0-243.254_amd64.deb
    sha:15e832bfdff4aa8ea082e04c08a9539fc25b22b4
  • linux-cloud-tools-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:1eb12c42fe1ab68f208bee3726f3e803687a859e
  • linux-cloud-tools-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:9d37b3908a31895d66347fa656ab097c1dc1033a
  • linux-cloud-tools-common_4.15.0-243.254_all.deb
    sha:a2c12d5a6ae48f18e5787602b1e2283bdcae68f1
  • linux-cloud-tools-generic_4.15.0.243.254_amd64.deb
    sha:4385742dab71fc3b1442914ed7977760b8baac96
  • linux-cloud-tools-lowlatency_4.15.0.243.254_amd64.deb
    sha:571caeaf26ab9b094cdca5ec54be7f198e58462b
  • linux-crashdump_4.15.0.243.254_amd64.deb
    sha:5768045a3b9c17aa268f44f36fc0e66709b14e8c
  • linux-doc_4.15.0-243.254_all.deb
    sha:e85f6196f3d94b85febec3dd3042ecc66e9de052
  • linux-generic_4.15.0.243.254_amd64.deb
    sha:8f4d855643cbe943ae4f9f7a18654308d8e53272
  • linux-headers-4.15.0-243-tuxcare.els31_4.15.0-243.254_all.deb
    sha:751700e5e62811b3a55b97c61f6192ea59f36f71
  • linux-headers-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:6b812f37f2eb30a0417f036e29ebcd8f544e3905
  • linux-headers-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:152a0a3473f6f07e24d8fbb6f96fc890ec1537c2
  • linux-headers-generic_4.15.0.243.254_amd64.deb
    sha:7bba12f37d37a448f4754c994abef29b22f93b84
  • linux-headers-lowlatency_4.15.0.243.254_amd64.deb
    sha:316c739826fafad5fe5942030ec80f05d5f9f232
  • linux-image-generic_4.15.0.243.254_amd64.deb
    sha:a0bc321310ea597c11c5c920de0f26c02457233b
  • linux-image-lowlatency_4.15.0.243.254_amd64.deb
    sha:534de11b85508f92371a9c7c550762b05299cb5a
  • linux-image-unsigned-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:5824052d06860ee9c3defecc4acc2a3ddde6e44c
  • linux-image-unsigned-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:3318b12ea1b8f1fa84d9e8cdbffa5cfca964f793
  • linux-libc-dev_4.15.0-243.254_amd64.deb
    sha:d5c6fb2381fcca5513333f63c2e42494f9fb70e2
  • linux-lowlatency_4.15.0.243.254_amd64.deb
    sha:1b0bac1c3188cc2100c88ef2b5f62a595b02f51c
  • linux-modules-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:9645708ac720d148b3ed34c0ec8d3289e6c1176d
  • linux-modules-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:edf340939937b61856d39a9d984d3725a4518626
  • linux-modules-extra-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:8d1580632990e0266ff2c871c6b06f575645394b
  • linux-source_4.15.0.243.254_all.deb
    sha:2018c28a85b47425ded24529a36759ad9fce213d
  • linux-source-4.15.0_4.15.0-243.254_all.deb
    sha:5c6ddfa3a4d83fb0085c3ff9bc70064c501b156e
  • linux-tools-4.15.0-243-tuxcare.els31_4.15.0-243.254_amd64.deb
    sha:05eb7e0baa669c1bf6a4b39db54eb8464afaae3f
  • linux-tools-4.15.0-243-tuxcare.els31-generic_4.15.0-243.254_amd64.deb
    sha:4b3c4d9b21ff08e68407d41c9adf79f2a400a7e6
  • linux-tools-4.15.0-243-tuxcare.els31-lowlatency_4.15.0-243.254_amd64.deb
    sha:ba602c1a28ab1f4e0cca068b2fff5f9abe7e9374
  • linux-tools-common_4.15.0-243.254_all.deb
    sha:53ce3aaf2bd46e329266669b119b18cdad703273
  • linux-tools-generic_4.15.0.243.254_amd64.deb
    sha:14dbebba78325861b5d8069ce67dcf11199967a9
  • linux-tools-host_4.15.0-243.254_all.deb
    sha:6376ab48c28250e1493a3c4e674a9ff18842e890
  • linux-tools-lowlatency_4.15.0.243.254_amd64.deb
    sha:1f4cd743980d9943b17abad3f3b667be62508fba
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.