Release date:
2025-05-16 21:14:45 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2021-47352
- virtio-net: Add validation for used length
* CVE-url: https://ubuntu.com/security/CVE-2024-46745
- Input: uinput - reject requests with unreasonable number of slots
* CVE-url: https://ubuntu.com/security/CVE-2024-44952
- driver core: Fix uevent_show() vs driver detach race
* CVE-url: https://ubuntu.com/security/CVE-2024-42304
- ext4: make sure the first directory block is not a hole
* CVE-url: https://ubuntu.com/security/CVE-2024-42305
- ext4: check dot and dotdot of dx_root before making dir indexed
* CVE-url: https://ubuntu.com/security/CVE-2024-53168
- sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
* CVE-url: https://ubuntu.com/security/CVE-2024-49925
- driver core: add dev_groups to all drivers
- driver core: Fix error return code in really_probe()
- fbdev: efifb: Register sysfs groups through driver core
* CVE-url: https://ubuntu.com/security/CVE-2024-56661
- tipc: fix NULL deref in cleanup_bearer()
* CVE-url: https://ubuntu.com/security/CVE-2024-56642
- tipc: Fix use-after-free of kernel socket in cleanup_bearer().
* CVE-url: https://ubuntu.com/security/CVE-2021-47163
- tipc: wait and exit until all work queues are done
* CVE-url: https://ubuntu.com/security/CVE-2024-26915
- drm/amdgpu: fix IH overflow on Vega10 v2
- drm/amdgpu: Add check to prevent IH overflow
- drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
* CVE-url: https://ubuntu.com/security/CVE-2024-56770
- net/sched: netem: account for backlog updates from child qdisc
- netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
* CVE-url: https://ubuntu.com/security/CVE-2024-50296
- net: hns3: fix kernel crash when uninstalling driver
* CVE-url: https://ubuntu.com/security/CVE-2024-53066
- nfs: Fix KMSAN warning in decode_getfattr_attrs()
* CVE-url: https://ubuntu.com/security/CVE-2024-49944
- sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
* CVE-url: https://ubuntu.com/security/CVE-2024-50237
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
* CVE-url: https://ubuntu.com/security/CVE-2024-46780
- nilfs2: protect references to superblock parameters exposed in sysfs
* CVE-url: https://ubuntu.com/security/CVE-2024-53063
- media: dvbdev: prevent the risk of out of memory access
- media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set
* CVE-url: https://ubuntu.com/security/CVE-2023-52927
- netfilter: allow exp not to be removed in nf_ct_find_expectation
* CVE-url: https://ubuntu.com/security/CVE-2021-47150
- net: fec: fix the potential memory leak in fec_enet_init()
* CVE-url: https://ubuntu.com/security/CVE-2024-53140
- netlink: terminate outstanding dump on socket close
* CVE-url: https://ubuntu.com/security/CVE-2025-21971
- net_sched: Prevent creation of classes with TC_H_ROOT
* CVE-url: https://ubuntu.com/security/CVE-2025-37785
- ext4: fix OOB read when checking dotdot dir
* CVE-url: https://ubuntu.com/security/CVE-2023-52572
- cifs: Fix UAF in cifs_demultiplex_thread()
* CVE-url: https://ubuntu.com/security/CVE-2022-49738
- f2fs: fix to do sanity check on summary info
- f2fs: should put a page when checking the summary info
- f2fs: fix to do sanity check on i_extra_isize in is_alive()
* CVE-url: https://ubuntu.com/security/CVE-2022-49740
- wifi: brcmfmac: Check the count value of channel spec to prevent out-of-
bounds reads
* CVE-url: https://ubuntu.com/security/
- ipv6: Define dscp_t and stop taking ECN bits into account in fib6-rules
* CVE-url: https://ubuntu.com/security/CVE-2023-53020
- l2tp: close all race conditions in l2tp_tunnel_register()
* CVE-url: https://ubuntu.com/security/CVE-2025-21957
- scsi: qla1280: Fix kernel oops when debug level > 2
* CVE-url: https://ubuntu.com/security/CVE-2025-21948
- HID: appleir: Fix potential NULL dereference at raw event handle
* CVE-url: https://ubuntu.com/security/CVE-2023-52936
- debugfs: add debugfs_lookup_and_remove()
- kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup()
* CVE-url: https://ubuntu.com/security/CVE-2025-21912
- gpio: rcar: Use raw_spinlock to protect register access
* CVE-url: https://ubuntu.com/security/CVE-2025-21922
- ppp: Fix KMSAN uninit-value warning with bpf
* CVE-url: https://ubuntu.com/security/CVE-2025-21891
- ipvlan: ensure network headers are in skb linear part
* CVE-url: https://ubuntu.com/security/CVE-2025-21959
- netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in
insert_tree()
* CVE-url: https://ubuntu.com/security/CVE-2025-21996
- drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
* CVE-url: https://ubuntu.com/security/CVE-2025-21928
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
* CVE-url: https://ubuntu.com/security/CVE-2025-21917
- usb: renesas_usbhs: Flush the notify_hotplug_work
* CVE-url: https://ubuntu.com/security/CVE-2023-53001
- drm/drm_vma_manager: Add drm_vma_node_allow_once()
* CVE-url: https://ubuntu.com/security/CVE-2025-21969
- Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
* CVE-url: https://ubuntu.com/security/CVE-2025-21920
- vlan: enforce underlying device type
* CVE-url: https://ubuntu.com/security/CVE-2025-21904
- caif_virtio: fix wrong pointer check in cfv_probe()
* CVE-url: https://ubuntu.com/security/CVE-2024-56658
- net: defer final 'struct net' free in netns dismantle
* CVE-url: https://ubuntu.com/security/CVE-2022-23041
- xen/pvcalls: use alloc/free_pages_exact()
* CVE-url: https://ubuntu.com/security/CVE-2024-50265
- ocfs2: remove entry once instead of null-ptr-dereference in
ocfs2_xa_remove()
* CVE-url: https://ubuntu.com/security/CVE-2024-46826
- ELF: fix kernel.randomize_va_space double read
* CVE-url: https://ubuntu.com/security/CVE-2025-21700
- net: sched: Disallow replacing of child qdisc from one parent to another
* CVE-url: https://ubuntu.com/security/CVE-2025-21702
- pfifo_tail_enqueue: Drop new packet when sch->limit == 0
* CVE-url: https://ubuntu.com/security/CVE-2024-50167
- be2net: fix potential memory leak in be_xmit()
* CVE-url: https://ubuntu.com/security/CVE-2024-49952
- netfilter: nf_tables: prevent nf_skb_duplicated corruption
* CVE-url: https://ubuntu.com/security/CVE-2024-49948
- net: add more sanity checks to qdisc_pkt_len_init()
Updated packages:
-
linux-buildinfo-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:8b3f34a91b5c656e579831fbf6ab5e4be52fc48a
-
linux-buildinfo-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:e04ff1aaf92ebea769f0388b99625edea27a900d
-
linux-cloud-tools-4.15.0-247-tuxcare.els35_4.15.0-247.258_amd64.deb
sha:9804c0cabec0a9046ae471468fef06b319fc3374
-
linux-cloud-tools-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:cc06445e57c66e31ecda3b46aaea26228590978b
-
linux-cloud-tools-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:60f707cde626de09afdee0be31ecd111bcf29bd6
-
linux-cloud-tools-common_4.15.0-247.258_all.deb
sha:3bafdf3df81339f7228de6da62bddc550220cac1
-
linux-cloud-tools-generic_4.15.0.247.258_amd64.deb
sha:ff107886a8feb418731c3dd0769c562c0699382f
-
linux-cloud-tools-lowlatency_4.15.0.247.258_amd64.deb
sha:7439c7415000f27883a70bb74567494110f75bce
-
linux-crashdump_4.15.0.247.258_amd64.deb
sha:eaef5deda59bb612f4271f92ba8673785bc42545
-
linux-doc_4.15.0-247.258_all.deb
sha:dea1dd89d41db1651f8db3eeeea9772f49491072
-
linux-generic_4.15.0.247.258_amd64.deb
sha:147ab2281419d1769f6f2cef1fd2cad170ed98c6
-
linux-headers-4.15.0-247-tuxcare.els35_4.15.0-247.258_all.deb
sha:11a55e7d90668310f794e9b55b7a3701ae1490d2
-
linux-headers-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:e7b668a194d019f67b797020be5bc588832f7a5d
-
linux-headers-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:d848be223c91bba0bff4c04a37cc298dc62d2141
-
linux-headers-generic_4.15.0.247.258_amd64.deb
sha:4a564cd59f0eae774e5c02b0227dee5e2fdce871
-
linux-headers-lowlatency_4.15.0.247.258_amd64.deb
sha:93eb41188383d5b33f30d94e5afb6126a9af967b
-
linux-image-generic_4.15.0.247.258_amd64.deb
sha:5b8f98e3fd8b6b26e2623239d008f6ec196cf425
-
linux-image-lowlatency_4.15.0.247.258_amd64.deb
sha:8bb1b45caf43e2dee46cafd120e40ff69460fe1b
-
linux-image-unsigned-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:75ecee9e33936b40caeb46424b8a1bda60199740
-
linux-image-unsigned-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:e6b15333e7cf0a3860a21023bb4fe61f92e3fffe
-
linux-libc-dev_4.15.0-247.258_amd64.deb
sha:adc6111638ea3099a3df24f3e1a6ebe83f3b0920
-
linux-lowlatency_4.15.0.247.258_amd64.deb
sha:39dda413347581f494157ba916c562f25de50904
-
linux-modules-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:9b4304c9d13efe1f8ec7546a20af7563babe419c
-
linux-modules-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:17d3b00bf1c750f35a5ef3b6cd03088ee9da6c40
-
linux-modules-extra-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:8ffaa5868d246e33a5f9ce56c7a13463137ad8a2
-
linux-source_4.15.0.247.258_all.deb
sha:b7d1fa2dd6d9f525d74f7ef27a1419713b48c8bf
-
linux-source-4.15.0_4.15.0-247.258_all.deb
sha:0d63a207169f96bbea9a0deace004852884b6de6
-
linux-tools-4.15.0-247-tuxcare.els35_4.15.0-247.258_amd64.deb
sha:218330488abd13e5cbdbcecc7caff92859759f31
-
linux-tools-4.15.0-247-tuxcare.els35-generic_4.15.0-247.258_amd64.deb
sha:7977e6fa9c0da6204c0da2252fffa2f20a08b568
-
linux-tools-4.15.0-247-tuxcare.els35-lowlatency_4.15.0-247.258_amd64.deb
sha:c5bcaeaad8b8857bad35a504f816093828f72e98
-
linux-tools-common_4.15.0-247.258_all.deb
sha:12535ff41cf17aefe5d569509b567d8b2e704f1c
-
linux-tools-generic_4.15.0.247.258_amd64.deb
sha:fd4b0a63e0552f264ece4f8b23ce3d1feb9fd832
-
linux-tools-host_4.15.0-247.258_all.deb
sha:929ec71649b3a1ba0995b5acc5984b2c9e1aaa2d
-
linux-tools-lowlatency_4.15.0.247.258_amd64.deb
sha:89d6302066aa7e3312faa06f11f08d235fc38d8f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.