[CLSA-2023:1690395161] Fix of 12 CVEs
Type:
security
Severity:
Important
Release date:
2023-07-26 18:12:45 UTC
Description:
* Bionic update: upstream stable patchset 2021-11-12 (LP: #1950816) // CVE- url: https://ubuntu.com/security/CVE-2021-20321 - ovl: fix missing negative dentry check in ovl_rename() * CVE-url: https://ubuntu.com/security/CVE-2021-20321 - ovl: cleanup unused var in rename2 * Jammy update: v5.15.93 upstream stable release (LP: #2012665) // CVE-url: https://ubuntu.com/security/CVE-2023-3161 - fbcon: Check font dimension limits * CVE-url: https://ubuntu.com/security/CVE-2021-3753 - vt_kdsetmode: extend console locking * Jammy update: v5.15.75 upstream stable release (LP: #1996825) // CVE-url: https://ubuntu.com/security/CVE-2022-1184 - ext4: fix check for block being out of directory size * Jammy update: v5.15.61 upstream stable release (LP: #1990162) // CVE-url: https://ubuntu.com/security/CVE-2022-1184 - ext4: check if directory block is within i_size * Jammy update: v5.15.104 upstream stable release (LP: #2023225) // CVE-url: https://ubuntu.com/security/CVE-2023-1990 - nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition * CVE-url: https://ubuntu.com/security/CVE-2023-3090 - ipvlan:Fix out-of-bounds caused by unclear skb->cb * Jammy update: v5.15.63 upstream stable release (LP: #1990564) // CVE-url: https://ubuntu.com/security/CVE-2023-3111 - btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() * CVE-url: https://ubuntu.com/security/CVE-2023-3111 - Btrfs: fill relocation block rsv after allocation - btrfs: check return value of btrfs_commit_transaction in relocation * CVE-url: https://ubuntu.com/security/CVE-2023-3141 - memstick: r592: Fix UAF bug in r592_remove due to race condition * CVE-url: https://ubuntu.com/security/CVE-2023-3212 - gfs2: Don't deref jdesc in evict * CVE-url: https://ubuntu.com/security/CVE-2023-3268 - kernel/relay.c: fix read_pos error when multiple readers - relayfs: fix out-of-bounds access in relay_file_read * CVE-url: https://ubuntu.com/security/CVE-2023-3390 - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE * CVE-url: https://ubuntu.com/security/CVE-2023-35824 - media: dm1105: Fix use after free bug in dm1105_remove due to race condition
Updated packages:
  • linux-buildinfo-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:80ad370d54aa129027f6542706577e10c5e1d513
  • linux-buildinfo-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:aa651f63afe24a5e92554e83c3c83e1aa897de9e
  • linux-cloud-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb
    sha:d62214e4182bb9cfcaaef22af5839b838fd2ad99
  • linux-cloud-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:b331093ffa7a7c461f31e1a8bf4ca80e9b9f34bc
  • linux-cloud-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:42fecd68c2e63b64f45f3ad7b5bd047d3753a01a
  • linux-cloud-tools-common_4.4.0-242.276_all.deb
    sha:e7901b4b699aab22259811ba956b3775818421d1
  • linux-cloud-tools-generic_4.4.0.242.276_amd64.deb
    sha:390a0dbcf6430d8f64fa7100cbe994ea8072b2c0
  • linux-cloud-tools-lowlatency_4.4.0.242.276_amd64.deb
    sha:b75494dfd2a15b681015b8a46b0dcddf605cf3a0
  • linux-crashdump_4.4.0.242.276_amd64.deb
    sha:d00da2cbc83f7ba6d2cfcf21693852a163e8ed71
  • linux-doc_4.4.0-242.276_all.deb
    sha:dcaef169268e9f8b05fc0e511b2d579ad68a95ff
  • linux-generic_4.4.0.242.276_amd64.deb
    sha:0033da93cd1ff78a40fa53354057bb8f393a40fd
  • linux-headers-4.4.0-242-tuxcare.els13_4.4.0-242.276_all.deb
    sha:539284f1afa89d81bb6cf60c34d1abdfd8bf91ba
  • linux-headers-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:b097fc59204e749710ddc3971aeb9d1d8539b6e6
  • linux-headers-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:df1556ccf2471dc694cb01b33e2cb9922c4db964
  • linux-headers-generic_4.4.0.242.276_amd64.deb
    sha:c9e8280611d4cb4c0d91a78aa5187aa9339341a0
  • linux-headers-lowlatency_4.4.0.242.276_amd64.deb
    sha:7a4e0b88c03ecb3699279d9409cdc0695eadd0de
  • linux-image-generic_4.4.0.242.276_amd64.deb
    sha:6445b600666c539de345f88072e3c32cbd120512
  • linux-image-lowlatency_4.4.0.242.276_amd64.deb
    sha:9acc204ea68728dc680168e58a3a42c2dec79536
  • linux-image-unsigned-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:f764438bb8c0b0ff3bffed58a539450b8230cea6
  • linux-image-unsigned-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:e0f6e0ad8c6517f88d342ef3db4544f96aa73c23
  • linux-libc-dev_4.4.0-242.276_amd64.deb
    sha:1424971575c2619635f9b18de953185b4bf9d8a8
  • linux-lowlatency_4.4.0.242.276_amd64.deb
    sha:3868d090122d34c481c9588a270ab2032c2b20bb
  • linux-modules-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:68c7e17403625d13df63661cf38b1c8a3ca5a052
  • linux-modules-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:341e7ef14a6a75a9b251bf528b4e9e7f76d11c53
  • linux-modules-extra-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:aad2b5f1d45e845a884a11438b95a9403126116c
  • linux-source_4.4.0.242.276_all.deb
    sha:e43d6847df944af65a48f8b01816184bc9e6aaf9
  • linux-source-4.4.0_4.4.0-242.276_all.deb
    sha:61f9df2b6655d342aafd6ae3bf513f057d442679
  • linux-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb
    sha:a022e628f2922242863202b2157f5d4551db0ec7
  • linux-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb
    sha:b37e834e48ec3bb5af29fee0f9551df59a98a60b
  • linux-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb
    sha:c9675d30e249a05d6ee87fec4de7009ad4b34e36
  • linux-tools-common_4.4.0-242.276_all.deb
    sha:51e42bc8adb41debddffd4d12b1768aee2e471d8
  • linux-tools-generic_4.4.0.242.276_amd64.deb
    sha:78f27fcd7c7a627378c3090da84b032a05d8794e
  • linux-tools-host_4.4.0-242.276_all.deb
    sha:deb54ee60b4306e499f832254fe75ea7c1f0d4cc
  • linux-tools-lowlatency_4.4.0.242.276_amd64.deb
    sha:bd1e1f74578b1be86f2a29cb813c85de071fe330
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.