[CLSA-2025:1758019011] Fix of 17 CVEs
Type:
security
Severity:
Important
Release date:
2025-09-16 13:50:20 UTC
Description:
* CVE-2024-50047 fix. // CVE-url: https://ubuntu.com/security/CVE-2025-38488 - smb: client: fix use-after-free in crypt_message when using async crypto * CVE-url: https://ubuntu.com/security/CVE-2024-57996 // CVE-url: https://ubuntu.com/security/CVE-2025-37752 - net_sched: sch_sfq: move the limit validation * CVE-url: https://ubuntu.com/security/CVE-2023-52975 - scsi: iscsi: Move pool freeing - scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress * CVE-url: https://ubuntu.com/security/CVE-2023-52757 - smb: client: fix potential deadlock when releasing mids * CVE-url: https://ubuntu.com/security/CVE-2025-38083 - net_sched: prio: fix a race in prio_tune() * CVE-url: https://ubuntu.com/security/CVE-2024-49950 - Bluetooth: L2CAP: Fix uaf in l2cap_connect - Bluetooth: hci_core: Fix calling mgmt_device_connected * CVE-url: https://ubuntu.com/security/CVE-2024-50073 - tty: n_gsm: Fix use-after-free in gsm_cleanup_mux * CVE-url: https://ubuntu.com/security/CVE-2025-37797 - net_sched: hfsc: Fix a UAF vulnerability in class handling * CVE-url: https://ubuntu.com/security/CVE-2024-38541 - of: module: add buffer overflow check in of_modalias() * CVE-url: https://ubuntu.com/security/CVE-2025-37997 - netfilter: ipset: fix region locking in hash types * CVE-url: https://ubuntu.com/security/CVE-2024-53051 - drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability * CVE-url: https://ubuntu.com/security/CVE-2025-37890 - net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc - sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() - net_sched: hfsc: Address reentrant enqueue adding class to eltree twice * CVE-url: https://ubuntu.com/security/CVE-2025-37782 - hfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key * CVE-url: https://ubuntu.com/security/CVE-2024-53185 - smb: client: fix NULL ptr deref in crypto_aead_setkey() * CVE-url: https://ubuntu.com/security/CVE-2024-50047 - smb: client: fix UAF in async decryption * CVE-url: https://ubuntu.com/security/CVE-2024-56662 - acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl * Miscellaneous upstream changes - Revert "UBUNTU: SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key"
Updated packages:
  • linux-buildinfo-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:95436bf7139a52c1a3b55ff29726f047cb2c2a14
  • linux-buildinfo-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:b1837318aa7ee9555adf914796f049d28275a26f
  • linux-cloud-tools-5.4.0-221-tuxcare.els3_5.4.0-221.241_amd64.deb
    sha:c7246c5fcb904650c1ac3888598efb10c2624f28
  • linux-cloud-tools-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:34c4325abd920f0b799f99d90386a08661d18418
  • linux-cloud-tools-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:5c58f5c0dde1afdc5f6c372eccd2ffadb759e032
  • linux-cloud-tools-common_5.4.0-221.241_all.deb
    sha:824f698a130571a34d375b3de0cb311f3f70f36a
  • linux-doc_5.4.0-221.241_all.deb
    sha:aa7b5a7a1fb7b1d38ec190e2488205f38eaa8a0c
  • linux-headers-5.4.0-221-tuxcare.els3_5.4.0-221.241_all.deb
    sha:0f7822afb73e5b96b6149e6839d10508797418bf
  • linux-headers-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:3c55dd5cbf655643d74e56d102bdeb4b2c2a1dab
  • linux-headers-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:25e6ab272e5899ee78221af66fb330e2c4da4c12
  • linux-image-unsigned-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:12e3be0a594ef88a7770be2cda4af7427b7e41c4
  • linux-image-unsigned-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:34f9857d558dae90ca07edc0af369f76011c5670
  • linux-libc-dev_5.4.0-221.241_amd64.deb
    sha:b3a4eeb9736d670c04dfe7cc56bfc899c96cd1a2
  • linux-modules-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:cf30a7b5536982c1786e6143025f967f28768b42
  • linux-modules-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:57eeda0451ae062247cb72cdeb3d2d803e36ef9f
  • linux-modules-extra-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:1084ff4df04981f499c3fbcb4d5eaad7650739a4
  • linux-source-5.4.0_5.4.0-221.241_all.deb
    sha:c0a96aea3d2e1d4ac099c45a4f2e99d5bffa87cb
  • linux-tools-5.4.0-221-tuxcare.els3_5.4.0-221.241_amd64.deb
    sha:641d0d478079cc6a80e645e3b16524a6aa4bfb5d
  • linux-tools-5.4.0-221-tuxcare.els3-generic_5.4.0-221.241_amd64.deb
    sha:3752b53407803b3938c057a2c3c218249a49a1ef
  • linux-tools-5.4.0-221-tuxcare.els3-lowlatency_5.4.0-221.241_amd64.deb
    sha:f661e5b011e2906f9f0fead40cdd8297753fb9f4
  • linux-tools-common_5.4.0-221.241_all.deb
    sha:39bb0d82b09c9401a9a75dad5672d6335e3eeeb6
  • linux-tools-host_5.4.0-221.241_all.deb
    sha:35874680b939914e5786035265694490507b6d3f
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.