[CLSA-2025:1744213128] Fix of 55 CVEs
Type:
security
Severity:
Important
Release date:
2025-04-09 15:38:52 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2025-21858 - geneve: Fix use-after-free in geneve_find_dev(). * CVE-url: https://ubuntu.com/security/CVE-2024-36921 - wifi: iwlwifi: mvm: guard against invalid STA ID on removal * CVE-url: https://ubuntu.com/security/CVE-2023-52621 - bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers * CVE-url: https://ubuntu.com/security/CVE-2025-21855 - ibmvnic: Don't reference skb after sending to VIOS * CVE-url: https://ubuntu.com/security/CVE-2021-47110 - x86/kvm: Disable kvmclock on all CPUs on shutdown * CVE-url: https://ubuntu.com/security/CVE-2025-21791 - vrf: use RCU protection in l3mdev_l3_out() * CVE-url: https://ubuntu.com/security/CVE-2024-57980 - media: uvcvideo: Fix double free in error path * CVE-url: https://ubuntu.com/security/CVE-2025-21718 - net: rose: fix timer races against user threads * CVE-url: https://ubuntu.com/security/CVE-2025-21735 - NFC: nci: Add bounds checking in nci_hci_create_pipe() * CVE-url: https://ubuntu.com/security/CVE-2023-52805 - jfs: fix array-index-out-of-bounds in diAlloc * CVE-url: https://ubuntu.com/security/CVE-2023-52847 - media: bttv: fix use after free error due to btv->timeout timer * CVE-url: https://ubuntu.com/security/CVE-2024-41014 - xfs: add bounds checking to xlog_recover_process_data * CVE-url: https://ubuntu.com/security/CVE-2025-21782 - orangefs: fix a oob in orangefs_debug_write * CVE-url: https://ubuntu.com/security/CVE-2024-26872 - RDMA/srpt: Do not register event handler until srpt device is fully setup * CVE-url: https://ubuntu.com/security/CVE-2024-26982 - Squashfs: check the inode number is not the invalid value of zero * CVE-url: https://ubuntu.com/security/CVE-2024-56548 - hfsplus: don't query the device logical block size multiple times * CVE-url: https://ubuntu.com/security/CVE-2024-57850 - jffs2: Prevent rtime decompress memory corruption * CVE-url: https://ubuntu.com/security/CVE-2024-49982 - aoe: fix the potential use-after-free problem in more places * CVE-url: https://ubuntu.com/security/CVE-2024-47696 - RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency * CVE-url: https://ubuntu.com/security/CVE-2024-50074 - parport: Proper fix for array out-of-bounds access * CVE-url: https://ubuntu.com/security/CVE-2025-21687 - vfio/platform: check the bounds of read/write syscalls * CVE-url: https://ubuntu.com/security/CVE-2024-57889 - regmap: allow to disable all locking mechanisms - pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking * CVE-url: https://ubuntu.com/security/CVE-2024-56539 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() * CVE-url: https://ubuntu.com/security/CVE-2024-53680 - ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() * CVE-url: https://ubuntu.com/security/CVE-2024-56630 - ocfs2: free inode when ocfs2_get_init_inode() fails * CVE-url: https://ubuntu.com/security/CVE-2024-53184 - um: ubd: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-57884 - mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() * CVE-url: https://ubuntu.com/security/CVE-2024-56597 - jfs: fix shift-out-of-bounds in dbSplit * CVE-url: https://ubuntu.com/security/CVE-2025-21664 - dm thin: make get_first_thin use rcu-safe list first function * CVE-url: https://ubuntu.com/security/CVE-2024-56594 - drm/amdgpu: set the right AMDGPU sg segment limitation * CVE-url: https://ubuntu.com/security/CVE-2024-56681 - crypto: bcm - add error check in the ahash_hmac_init function * CVE-url: https://ubuntu.com/security/CVE-2024-52332 - igb: Fix potential invalid memory access in igb_init_module() * CVE-url: https://ubuntu.com/security/CVE-2024-56570 - ovl: Filter invalid inodes with missing lookup function * CVE-url: https://ubuntu.com/security/CVE-2024-57912 - iio: pressure: zpa2326: fix information leak in triggered buffer * CVE-url: https://ubuntu.com/security/CVE-2024-53172 - ubi: fastmap: Fix duplicate slab cache names while attaching * CVE-url: https://ubuntu.com/security/CVE-2024-57929 - dm array: fix releasing a faulty array block twice in dm_array_cursor_end * CVE-url: https://ubuntu.com/security/CVE-2024-56532 - ALSA: us122l: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53183 - um: net: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-56644 - net/ipv6: release expired exception dst cached in socket * CVE-url: https://ubuntu.com/security/CVE-2024-57948 - mac802154: check local interfaces before deleting sdata list * CVE-url: https://ubuntu.com/security/CVE-2024-57904 - iio: adc: at91: call input_free_device() on allocated iio_dev * CVE-url: https://ubuntu.com/security/CVE-2024-56637 - netfilter: ipset: Hold module reference while requesting a module * CVE-url: https://ubuntu.com/security/CVE-2024-56576 - media: i2c: tc358743: Fix crash in the probe error path when using polling * CVE-url: https://ubuntu.com/security/CVE-2024-53214 - vfio/pci: Properly hide first-in-list PCIe extended capability * CVE-url: https://ubuntu.com/security/CVE-2024-56700 - media: wl128x: Fix atomicity violation in fmc_send_cmd() * CVE-url: https://ubuntu.com/security/CVE-2024-56531 - ALSA: caiaq: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53194 - PCI: Fix use-after-free of slot->bus on hot remove * CVE-url: https://ubuntu.com/security/CVE-2024-58055 - usb: gadget: f_tcm: Don't free command immediately * CVE-url: https://ubuntu.com/security/CVE-2024-56619 - nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2021-47636 - ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() * CVE-url: https://ubuntu.com/security/CVE-2024-5317 - nfsd: make sure exp active before svc_export_show * CVE-url: https://ubuntu.com/security/CVE-2024-53174 - SUNRPC: make sure cache entry active before cache_show * CVE-url: https://ubuntu.com/security/CVE-2021-47219 - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() * CVE-url: https://ubuntu.com/security/CVE-2024-50269 - usb: musb: sunxi: Fix accessing an released usb phy * CVE-url: https://ubuntu.com/security/CVE-2024-57908 - iio: imu: kmx61: fix information leak in triggered buffer
Updated packages:
  • linux-buildinfo-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:dd5e48f4f31ed61bbe4850a83ac0a6c1edc23c88
  • linux-buildinfo-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:d782f94ef7efd3d270d5a5ab58de7c739bd756ee
  • linux-cloud-tools-4.15.0-246-tuxcare.els34_4.15.0-246.257_amd64.deb
    sha:1090dd336f7f727ed676e4c347fe2fc3c44879a9
  • linux-cloud-tools-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:e925d9105f203b936e8f3eae49bc36482a243dad
  • linux-cloud-tools-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:8e57915bd41e004b4d8d06591e3bae0b78891ac6
  • linux-cloud-tools-common_4.15.0-246.257_all.deb
    sha:42ee448159d01897b995b03dca0f6491742572af
  • linux-cloud-tools-generic_4.15.0.246.257_amd64.deb
    sha:5d57c300c1610636d1f0031bc492a6b267577459
  • linux-cloud-tools-lowlatency_4.15.0.246.257_amd64.deb
    sha:bc3b4df1b4adf36f97d610d0094bc1b5b7eade97
  • linux-crashdump_4.15.0.246.257_amd64.deb
    sha:43369e2f44a04a5fd7cecf0a9e09d20389ad69dc
  • linux-doc_4.15.0-246.257_all.deb
    sha:3f2cea81c349bd336069e1daa075d2d93553c118
  • linux-generic_4.15.0.246.257_amd64.deb
    sha:74e1012fe6c5f4c5fe4b8dda5adc6b3df126220c
  • linux-headers-4.15.0-246-tuxcare.els34_4.15.0-246.257_all.deb
    sha:097ca50994414f4e8ec7199093fac98ea19955a7
  • linux-headers-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:25e75c8cfdc26c1589653bc79f95fac5088289e7
  • linux-headers-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:505d8b4abb1a481a5700395797c8db3c32c372bc
  • linux-headers-generic_4.15.0.246.257_amd64.deb
    sha:7486912cda769a6641924eb28ed01cc44f789722
  • linux-headers-lowlatency_4.15.0.246.257_amd64.deb
    sha:b312887df4d5a7d87e4a3aa58b9d78723b0e8709
  • linux-image-generic_4.15.0.246.257_amd64.deb
    sha:4b2696a65b3c9fcd6fa35e30c215a9a6b882c91c
  • linux-image-lowlatency_4.15.0.246.257_amd64.deb
    sha:a391747316c389546303f1f4749cbbc6e5080fc5
  • linux-image-unsigned-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:8bfce17925923d24978fafdde185605ba0b57275
  • linux-image-unsigned-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:cd90c96b3aeea1e319af5fec73d211ae958c8a94
  • linux-libc-dev_4.15.0-246.257_amd64.deb
    sha:4a77493410d15445b18f429f175a8cae0d401215
  • linux-lowlatency_4.15.0.246.257_amd64.deb
    sha:6c6c5b162ff6fb0e80e2cbfa413229b89598ef94
  • linux-modules-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:df95178f332b8b2f9560783087daa431b193b7ec
  • linux-modules-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:12fe233e2b0b0c0de3974e47bca5c27819691df8
  • linux-modules-extra-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:1cfaec5ff97ce10807148feb780eb8ce2992929e
  • linux-source_4.15.0.246.257_all.deb
    sha:e29049b6904ffbfe2803fc6a93cf334f6e7843e8
  • linux-source-4.15.0_4.15.0-246.257_all.deb
    sha:92b1ac30e25fe60adb8e2cbdbe70beb2dd074128
  • linux-tools-4.15.0-246-tuxcare.els34_4.15.0-246.257_amd64.deb
    sha:e51ee79c15f15da007287f34e80727be5e7756c9
  • linux-tools-4.15.0-246-tuxcare.els34-generic_4.15.0-246.257_amd64.deb
    sha:7e4327b9988789ea702447ee0e095ba6e9c575cd
  • linux-tools-4.15.0-246-tuxcare.els34-lowlatency_4.15.0-246.257_amd64.deb
    sha:f1a96d349d993f1e77d64a0ffef5f7b3e8050d9f
  • linux-tools-common_4.15.0-246.257_all.deb
    sha:01a43dae64e86a3eac65d99b308b75ffd2539e37
  • linux-tools-generic_4.15.0.246.257_amd64.deb
    sha:c53a04218e1eb1d8d492024abe394f385c213acf
  • linux-tools-host_4.15.0-246.257_all.deb
    sha:97f7e14b3c44c26cd1c13987de39439e478a60ec
  • linux-tools-lowlatency_4.15.0.246.257_amd64.deb
    sha:a71542a43152de3a4e4317a71317c2b605f6050e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.