Release date:
2025-07-21 08:17:26 UTC
Description:
* CVE-url: https://ubuntu.com/security/CVE-2024-46787
- userfaultfd: fix checks for huge PMDs
* CVE-url: https://ubuntu.com/security/CVE-2025-37798
- sch_htb: make htb_qlen_notify() idempotent
- sch_drr: make drr_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
* CVE-url: https://ubuntu.com/security/CVE-2025-37803
- udmabuf: fix a buf size overflow issue during udmabuf creation
* CVE-url: https://ubuntu.com/security/CVE-2025-37785
- ext4: optimize __ext4_check_dir_entry()
- ext4: fix OOB read when checking dotdot dir
* CVE-url: https://ubuntu.com/security/CVE-2025-22038
- ksmbd: validate zero num_subauth before sub_auth is accessed
* CVE-url: https://ubuntu.com/security/CVE-2025-21927
- nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
* CVE-url: https://ubuntu.com/security/CVE-2025-21969
- Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
* CVE-url: https://ubuntu.com/security/CVE-2025-21855
- ibmvnic: Don't reference skb after sending to VIOS
* CVE-url: https://ubuntu.com/security/CVE-2025-21780
- drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()
* CVE-url: https://ubuntu.com/security/CVE-2023-0386
- ovl: fail on invalid uid/gid mapping at copy up
Updated packages:
-
linux-buildinfo-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:4536ecbf549406ec3ecea2f6fab4d00beee988c2
-
linux-buildinfo-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:364afb15844d4690226403bbe64ecd38a65a38b2
-
linux-cloud-tools-5.4.0-220-tuxcare.els2_5.4.0-220.240_amd64.deb
sha:ada4e90eb6de6af5f1e36111412781ad54a4a65b
-
linux-cloud-tools-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:044d12e7239bbe680b5a4ce504352213e5fb25bd
-
linux-cloud-tools-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:bcb1d2cc7ffedaf26c9f170a4e9e3791c11d055b
-
linux-cloud-tools-common_5.4.0-220.240_all.deb
sha:1af89962f5ca3f1aa9385f9fde0f2d88328066dd
-
linux-doc_5.4.0-220.240_all.deb
sha:e8268a07d7d6b6432fbc5f8ac975a3b1991f9465
-
linux-headers-5.4.0-220-tuxcare.els2_5.4.0-220.240_all.deb
sha:1902d0e993cc07e21660c8429f65934ce2422dd8
-
linux-headers-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:aae66888a33565e4f5f946a70f6f7ca9ef0ee815
-
linux-headers-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:63cb7f048b6590ffb7d22b57ba24e5dd4a0be895
-
linux-image-unsigned-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:9febd29ed1df488e643f438ffc9fe0a7dc3b94f4
-
linux-image-unsigned-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:7d0c6de2eea39719ed9022d961fc75c9a29212d1
-
linux-libc-dev_5.4.0-220.240_amd64.deb
sha:3bc097282fcd86fec2e553ab5b2f95213f1c2112
-
linux-modules-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:b235416509cf8b896f2419c70689dc131ec77fb4
-
linux-modules-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:b086ab3bfa74f89298f8a9f203744d2fcc056f29
-
linux-modules-extra-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:e9f4ecb36c18bccbac897501f76a3a591c4ebfbd
-
linux-source-5.4.0_5.4.0-220.240_all.deb
sha:38c69e1350dc197db4d7159084cd8159648e139f
-
linux-tools-5.4.0-220-tuxcare.els2_5.4.0-220.240_amd64.deb
sha:ecdc39abedcfc903322b74b8d1b596e1b3477651
-
linux-tools-5.4.0-220-tuxcare.els2-generic_5.4.0-220.240_amd64.deb
sha:b8b675a5b5c05c6d1f0bb25fd63837075e27b534
-
linux-tools-5.4.0-220-tuxcare.els2-lowlatency_5.4.0-220.240_amd64.deb
sha:747ece05f1a612790dbff28cd5046d3ba8e9d9f3
-
linux-tools-common_5.4.0-220.240_all.deb
sha:a8f816aaefc02b53dbc11136604d6f5fb54d5134
-
linux-tools-host_5.4.0-220.240_all.deb
sha:dd0fd6e177ca1d95a7de96edd77dc415d9ab6112
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.