Release date:
2023-07-26 18:12:45 UTC
Description:
* Bionic update: upstream stable patchset 2021-11-12 (LP: #1950816) // CVE-
url: https://ubuntu.com/security/CVE-2021-20321
- ovl: fix missing negative dentry check in ovl_rename()
* CVE-url: https://ubuntu.com/security/CVE-2021-20321
- ovl: cleanup unused var in rename2
* Jammy update: v5.15.93 upstream stable release (LP: #2012665) // CVE-url:
https://ubuntu.com/security/CVE-2023-3161
- fbcon: Check font dimension limits
* CVE-url: https://ubuntu.com/security/CVE-2021-3753
- vt_kdsetmode: extend console locking
* Jammy update: v5.15.75 upstream stable release (LP: #1996825) // CVE-url:
https://ubuntu.com/security/CVE-2022-1184
- ext4: fix check for block being out of directory size
* Jammy update: v5.15.61 upstream stable release (LP: #1990162) // CVE-url:
https://ubuntu.com/security/CVE-2022-1184
- ext4: check if directory block is within i_size
* Jammy update: v5.15.104 upstream stable release (LP: #2023225) // CVE-url:
https://ubuntu.com/security/CVE-2023-1990
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition
* CVE-url: https://ubuntu.com/security/CVE-2023-3090
- ipvlan:Fix out-of-bounds caused by unclear skb->cb
* Jammy update: v5.15.63 upstream stable release (LP: #1990564) // CVE-url:
https://ubuntu.com/security/CVE-2023-3111
- btrfs: unset reloc control if transaction commit fails in
prepare_to_relocate()
* CVE-url: https://ubuntu.com/security/CVE-2023-3111
- Btrfs: fill relocation block rsv after allocation
- btrfs: check return value of btrfs_commit_transaction in relocation
* CVE-url: https://ubuntu.com/security/CVE-2023-3141
- memstick: r592: Fix UAF bug in r592_remove due to race condition
* CVE-url: https://ubuntu.com/security/CVE-2023-3212
- gfs2: Don't deref jdesc in evict
* CVE-url: https://ubuntu.com/security/CVE-2023-3268
- kernel/relay.c: fix read_pos error when multiple readers
- relayfs: fix out-of-bounds access in relay_file_read
* CVE-url: https://ubuntu.com/security/CVE-2023-3390
- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
* CVE-url: https://ubuntu.com/security/CVE-2023-35824
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition
Updated packages:
-
linux-buildinfo-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:80ad370d54aa129027f6542706577e10c5e1d513
-
linux-buildinfo-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:aa651f63afe24a5e92554e83c3c83e1aa897de9e
-
linux-cloud-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb
sha:d62214e4182bb9cfcaaef22af5839b838fd2ad99
-
linux-cloud-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:b331093ffa7a7c461f31e1a8bf4ca80e9b9f34bc
-
linux-cloud-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:42fecd68c2e63b64f45f3ad7b5bd047d3753a01a
-
linux-cloud-tools-common_4.4.0-242.276_all.deb
sha:e7901b4b699aab22259811ba956b3775818421d1
-
linux-cloud-tools-generic_4.4.0.242.276_amd64.deb
sha:390a0dbcf6430d8f64fa7100cbe994ea8072b2c0
-
linux-cloud-tools-lowlatency_4.4.0.242.276_amd64.deb
sha:b75494dfd2a15b681015b8a46b0dcddf605cf3a0
-
linux-crashdump_4.4.0.242.276_amd64.deb
sha:d00da2cbc83f7ba6d2cfcf21693852a163e8ed71
-
linux-doc_4.4.0-242.276_all.deb
sha:dcaef169268e9f8b05fc0e511b2d579ad68a95ff
-
linux-generic_4.4.0.242.276_amd64.deb
sha:0033da93cd1ff78a40fa53354057bb8f393a40fd
-
linux-headers-4.4.0-242-tuxcare.els13_4.4.0-242.276_all.deb
sha:539284f1afa89d81bb6cf60c34d1abdfd8bf91ba
-
linux-headers-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:b097fc59204e749710ddc3971aeb9d1d8539b6e6
-
linux-headers-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:df1556ccf2471dc694cb01b33e2cb9922c4db964
-
linux-headers-generic_4.4.0.242.276_amd64.deb
sha:c9e8280611d4cb4c0d91a78aa5187aa9339341a0
-
linux-headers-lowlatency_4.4.0.242.276_amd64.deb
sha:7a4e0b88c03ecb3699279d9409cdc0695eadd0de
-
linux-image-generic_4.4.0.242.276_amd64.deb
sha:6445b600666c539de345f88072e3c32cbd120512
-
linux-image-lowlatency_4.4.0.242.276_amd64.deb
sha:9acc204ea68728dc680168e58a3a42c2dec79536
-
linux-image-unsigned-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:f764438bb8c0b0ff3bffed58a539450b8230cea6
-
linux-image-unsigned-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:e0f6e0ad8c6517f88d342ef3db4544f96aa73c23
-
linux-libc-dev_4.4.0-242.276_amd64.deb
sha:1424971575c2619635f9b18de953185b4bf9d8a8
-
linux-lowlatency_4.4.0.242.276_amd64.deb
sha:3868d090122d34c481c9588a270ab2032c2b20bb
-
linux-modules-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:68c7e17403625d13df63661cf38b1c8a3ca5a052
-
linux-modules-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:341e7ef14a6a75a9b251bf528b4e9e7f76d11c53
-
linux-modules-extra-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:aad2b5f1d45e845a884a11438b95a9403126116c
-
linux-source_4.4.0.242.276_all.deb
sha:e43d6847df944af65a48f8b01816184bc9e6aaf9
-
linux-source-4.4.0_4.4.0-242.276_all.deb
sha:61f9df2b6655d342aafd6ae3bf513f057d442679
-
linux-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb
sha:a022e628f2922242863202b2157f5d4551db0ec7
-
linux-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
sha:b37e834e48ec3bb5af29fee0f9551df59a98a60b
-
linux-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
sha:c9675d30e249a05d6ee87fec4de7009ad4b34e36
-
linux-tools-common_4.4.0-242.276_all.deb
sha:51e42bc8adb41debddffd4d12b1768aee2e471d8
-
linux-tools-generic_4.4.0.242.276_amd64.deb
sha:78f27fcd7c7a627378c3090da84b032a05d8794e
-
linux-tools-host_4.4.0-242.276_all.deb
sha:deb54ee60b4306e499f832254fe75ea7c1f0d4cc
-
linux-tools-lowlatency_4.4.0.242.276_amd64.deb
sha:bd1e1f74578b1be86f2a29cb813c85de071fe330
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.