Release date:
2025-04-09 15:38:52 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2025-21858
- geneve: Fix use-after-free in geneve_find_dev().
* CVE-url: https://ubuntu.com/security/CVE-2024-36921
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal
* CVE-url: https://ubuntu.com/security/CVE-2023-52621
- bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
* CVE-url: https://ubuntu.com/security/CVE-2025-21855
- ibmvnic: Don't reference skb after sending to VIOS
* CVE-url: https://ubuntu.com/security/CVE-2021-47110
- x86/kvm: Disable kvmclock on all CPUs on shutdown
* CVE-url: https://ubuntu.com/security/CVE-2025-21791
- vrf: use RCU protection in l3mdev_l3_out()
* CVE-url: https://ubuntu.com/security/CVE-2024-57980
- media: uvcvideo: Fix double free in error path
* CVE-url: https://ubuntu.com/security/CVE-2025-21718
- net: rose: fix timer races against user threads
* CVE-url: https://ubuntu.com/security/CVE-2025-21735
- NFC: nci: Add bounds checking in nci_hci_create_pipe()
* CVE-url: https://ubuntu.com/security/CVE-2023-52805
- jfs: fix array-index-out-of-bounds in diAlloc
* CVE-url: https://ubuntu.com/security/CVE-2023-52847
- media: bttv: fix use after free error due to btv->timeout timer
* CVE-url: https://ubuntu.com/security/CVE-2024-41014
- xfs: add bounds checking to xlog_recover_process_data
* CVE-url: https://ubuntu.com/security/CVE-2025-21782
- orangefs: fix a oob in orangefs_debug_write
* CVE-url: https://ubuntu.com/security/CVE-2024-26872
- RDMA/srpt: Do not register event handler until srpt device is fully setup
* CVE-url: https://ubuntu.com/security/CVE-2024-26982
- Squashfs: check the inode number is not the invalid value of zero
* CVE-url: https://ubuntu.com/security/CVE-2024-56548
- hfsplus: don't query the device logical block size multiple times
* CVE-url: https://ubuntu.com/security/CVE-2024-57850
- jffs2: Prevent rtime decompress memory corruption
* CVE-url: https://ubuntu.com/security/CVE-2024-49982
- aoe: fix the potential use-after-free problem in more places
* CVE-url: https://ubuntu.com/security/CVE-2024-47696
- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
* CVE-url: https://ubuntu.com/security/CVE-2024-50074
- parport: Proper fix for array out-of-bounds access
* CVE-url: https://ubuntu.com/security/CVE-2025-21687
- vfio/platform: check the bounds of read/write syscalls
* CVE-url: https://ubuntu.com/security/CVE-2024-57889
- regmap: allow to disable all locking mechanisms
- pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
* CVE-url: https://ubuntu.com/security/CVE-2024-56539
- wifi: mwifiex: Fix memcpy() field-spanning write warning in
mwifiex_config_scan()
* CVE-url: https://ubuntu.com/security/CVE-2024-53680
- ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()
* CVE-url: https://ubuntu.com/security/CVE-2024-56630
- ocfs2: free inode when ocfs2_get_init_inode() fails
* CVE-url: https://ubuntu.com/security/CVE-2024-53184
- um: ubd: Do not use drvdata in release
* CVE-url: https://ubuntu.com/security/CVE-2024-57884
- mm: vmscan: account for free pages to prevent infinite Loop in
throttle_direct_reclaim()
* CVE-url: https://ubuntu.com/security/CVE-2024-56597
- jfs: fix shift-out-of-bounds in dbSplit
* CVE-url: https://ubuntu.com/security/CVE-2025-21664
- dm thin: make get_first_thin use rcu-safe list first function
* CVE-url: https://ubuntu.com/security/CVE-2024-56594
- drm/amdgpu: set the right AMDGPU sg segment limitation
* CVE-url: https://ubuntu.com/security/CVE-2024-56681
- crypto: bcm - add error check in the ahash_hmac_init function
* CVE-url: https://ubuntu.com/security/CVE-2024-52332
- igb: Fix potential invalid memory access in igb_init_module()
* CVE-url: https://ubuntu.com/security/CVE-2024-56570
- ovl: Filter invalid inodes with missing lookup function
* CVE-url: https://ubuntu.com/security/CVE-2024-57912
- iio: pressure: zpa2326: fix information leak in triggered buffer
* CVE-url: https://ubuntu.com/security/CVE-2024-53172
- ubi: fastmap: Fix duplicate slab cache names while attaching
* CVE-url: https://ubuntu.com/security/CVE-2024-57929
- dm array: fix releasing a faulty array block twice in dm_array_cursor_end
* CVE-url: https://ubuntu.com/security/CVE-2024-56532
- ALSA: us122l: Use snd_card_free_when_closed() at disconnection
* CVE-url: https://ubuntu.com/security/CVE-2024-53183
- um: net: Do not use drvdata in release
* CVE-url: https://ubuntu.com/security/CVE-2024-56644
- net/ipv6: release expired exception dst cached in socket
* CVE-url: https://ubuntu.com/security/CVE-2024-57948
- mac802154: check local interfaces before deleting sdata list
* CVE-url: https://ubuntu.com/security/CVE-2024-57904
- iio: adc: at91: call input_free_device() on allocated iio_dev
* CVE-url: https://ubuntu.com/security/CVE-2024-56637
- netfilter: ipset: Hold module reference while requesting a module
* CVE-url: https://ubuntu.com/security/CVE-2024-56576
- media: i2c: tc358743: Fix crash in the probe error path when using polling
* CVE-url: https://ubuntu.com/security/CVE-2024-53214
- vfio/pci: Properly hide first-in-list PCIe extended capability
* CVE-url: https://ubuntu.com/security/CVE-2024-56700
- media: wl128x: Fix atomicity violation in fmc_send_cmd()
* CVE-url: https://ubuntu.com/security/CVE-2024-56531
- ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
* CVE-url: https://ubuntu.com/security/CVE-2024-53194
- PCI: Fix use-after-free of slot->bus on hot remove
* CVE-url: https://ubuntu.com/security/CVE-2024-58055
- usb: gadget: f_tcm: Don't free command immediately
* CVE-url: https://ubuntu.com/security/CVE-2024-56619
- nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()
* CVE-url: https://ubuntu.com/security/CVE-2021-47636
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
* CVE-url: https://ubuntu.com/security/CVE-2024-5317
- nfsd: make sure exp active before svc_export_show
* CVE-url: https://ubuntu.com/security/CVE-2024-53174
- SUNRPC: make sure cache entry active before cache_show
* CVE-url: https://ubuntu.com/security/CVE-2021-47219
- scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
* CVE-url: https://ubuntu.com/security/CVE-2024-50269
- usb: musb: sunxi: Fix accessing an released usb phy
* CVE-url: https://ubuntu.com/security/CVE-2024-57908
- iio: imu: kmx61: fix information leak in triggered buffer
Updated packages:
-
linux-buildinfo-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:dd5e48f4f31ed61bbe4850a83ac0a6c1edc23c88
-
linux-buildinfo-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:d782f94ef7efd3d270d5a5ab58de7c739bd756ee
-
linux-cloud-tools-4.15.0-246-tuxcare.els34_4.15.0-246.257_amd64.deb
sha:1090dd336f7f727ed676e4c347fe2fc3c44879a9
-
linux-cloud-tools-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:e925d9105f203b936e8f3eae49bc36482a243dad
-
linux-cloud-tools-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:8e57915bd41e004b4d8d06591e3bae0b78891ac6
-
linux-cloud-tools-common_4.15.0-246.257_all.deb
sha:42ee448159d01897b995b03dca0f6491742572af
-
linux-cloud-tools-generic_4.15.0.246.257_amd64.deb
sha:5d57c300c1610636d1f0031bc492a6b267577459
-
linux-cloud-tools-lowlatency_4.15.0.246.257_amd64.deb
sha:bc3b4df1b4adf36f97d610d0094bc1b5b7eade97
-
linux-crashdump_4.15.0.246.257_amd64.deb
sha:43369e2f44a04a5fd7cecf0a9e09d20389ad69dc
-
linux-doc_4.15.0-246.257_all.deb
sha:3f2cea81c349bd336069e1daa075d2d93553c118
-
linux-generic_4.15.0.246.257_amd64.deb
sha:74e1012fe6c5f4c5fe4b8dda5adc6b3df126220c
-
linux-headers-4.15.0-246-tuxcare.els34_4.15.0-246.257_all.deb
sha:097ca50994414f4e8ec7199093fac98ea19955a7
-
linux-headers-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:25e75c8cfdc26c1589653bc79f95fac5088289e7
-
linux-headers-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:505d8b4abb1a481a5700395797c8db3c32c372bc
-
linux-headers-generic_4.15.0.246.257_amd64.deb
sha:7486912cda769a6641924eb28ed01cc44f789722
-
linux-headers-lowlatency_4.15.0.246.257_amd64.deb
sha:b312887df4d5a7d87e4a3aa58b9d78723b0e8709
-
linux-image-generic_4.15.0.246.257_amd64.deb
sha:4b2696a65b3c9fcd6fa35e30c215a9a6b882c91c
-
linux-image-lowlatency_4.15.0.246.257_amd64.deb
sha:a391747316c389546303f1f4749cbbc6e5080fc5
-
linux-image-unsigned-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:8bfce17925923d24978fafdde185605ba0b57275
-
linux-image-unsigned-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:cd90c96b3aeea1e319af5fec73d211ae958c8a94
-
linux-libc-dev_4.15.0-246.257_amd64.deb
sha:4a77493410d15445b18f429f175a8cae0d401215
-
linux-lowlatency_4.15.0.246.257_amd64.deb
sha:6c6c5b162ff6fb0e80e2cbfa413229b89598ef94
-
linux-modules-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:df95178f332b8b2f9560783087daa431b193b7ec
-
linux-modules-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:12fe233e2b0b0c0de3974e47bca5c27819691df8
-
linux-modules-extra-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:1cfaec5ff97ce10807148feb780eb8ce2992929e
-
linux-source_4.15.0.246.257_all.deb
sha:e29049b6904ffbfe2803fc6a93cf334f6e7843e8
-
linux-source-4.15.0_4.15.0-246.257_all.deb
sha:92b1ac30e25fe60adb8e2cbdbe70beb2dd074128
-
linux-tools-4.15.0-246-tuxcare.els34_4.15.0-246.257_amd64.deb
sha:e51ee79c15f15da007287f34e80727be5e7756c9
-
linux-tools-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
sha:7e4327b9988789ea702447ee0e095ba6e9c575cd
-
linux-tools-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
sha:f1a96d349d993f1e77d64a0ffef5f7b3e8050d9f
-
linux-tools-common_4.15.0-246.257_all.deb
sha:01a43dae64e86a3eac65d99b308b75ffd2539e37
-
linux-tools-generic_4.15.0.246.257_amd64.deb
sha:c53a04218e1eb1d8d492024abe394f385c213acf
-
linux-tools-host_4.15.0-246.257_all.deb
sha:97f7e14b3c44c26cd1c13987de39439e478a60ec
-
linux-tools-lowlatency_4.15.0.246.257_amd64.deb
sha:a71542a43152de3a4e4317a71317c2b605f6050e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.