[CLSA-2023:1693904331] Fix of 11 CVEs
Type:
security
Severity:
Moderate
Release date:
2023-09-05 08:58:57 UTC
Description:
* Jammy update: v5.15.86 upstream stable release (LP: #2005113) // CVE-url: https://ubuntu.com/security/CVE-2022-3606 - libbpf: Fix null-pointer dereference in find_prog_by_sec_insn() * Jammy update: v5.15.87 upstream stable release (LP: #2007441) // CVE-url: https://ubuntu.com/security/CVE-2023-23454 - net: sched: cbq: dont intepret cls results when asked to drop * Jammy update: v5.15.76 upstream stable release (LP: #1997113) // CVE-url: https://ubuntu.com/security/CVE-2023-0590 - net: sched: fix race condition in qdisc_graft() * Jammy update: v5.15.104 upstream stable release (LP: #2023225) // CVE-url: https://ubuntu.com/security/CVE-2023-1855 - hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition * Jammy update: v5.15.91 upstream stable release (LP: #2011467) // CVE-url: https://ubuntu.com/security/CVE-2022-4129 - l2tp: Serialize access to sk_user_data with sk_callback_lock * Jammy update: v5.15.105 upstream stable release (LP: #2023230) // CVE-url: https://ubuntu.com/security/CVE-2023-30772 - power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition * Jammy update: v5.15.105 upstream stable release (LP: #2023230) // CVE-url: https://ubuntu.com/security/CVE-2023-2194 - i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() * Jammy update: v5.15.105 upstream stable release (LP: #2023230) // CVE-url: https://ubuntu.com/security/CVE-2023-33203 - net: qcom/emac: Fix use after free bug in emac_remove due to race condition * CVE-2023-31084 // CVE-2023-31084 was assigned to this bug. // CVE-url: https://ubuntu.com/security/CVE-2023-31084 - media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() * Jammy update: v5.15.99 upstream stable release (LP: #2018438) // CVE-url: https://ubuntu.com/security/CVE-2023-2985 - fs: hfsplus: fix UAF issue in hfsplus_put_super * Jammy update: v5.15.111 upstream stable release (LP: #2025095) // CVE-url: https://ubuntu.com/security/CVE-2023-2269 - dm ioctl: fix nested locking in table_clear() to remove deadlock concern
Updated packages:
  • linux-buildinfo-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:7fc2d16cd42620de6ddb96ca622e6882d6979f56
  • linux-buildinfo-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:7ee994d1af96df1595de5ae8fcfa401da85a427c
  • linux-cloud-tools-4.15.0-216-tuxcare.els4_4.15.0-216.227_amd64.deb
    sha:466910ded3e8efd957e17e207c4ba4e58b548674
  • linux-cloud-tools-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:af0e7c9b842cde8e67b1ab67279c777773578c57
  • linux-cloud-tools-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:38b666f55ce98d0270559a5771f48ee7a6be9dc2
  • linux-cloud-tools-common_4.15.0-216.227_all.deb
    sha:36593edf30aed0523cced9b5ac81a9b872d05a64
  • linux-cloud-tools-generic_4.15.0.216.227_amd64.deb
    sha:5452f5ce4844a3770d465d3093808182a4b95d58
  • linux-cloud-tools-lowlatency_4.15.0.216.227_amd64.deb
    sha:5570ecc67590ad8d138e6128e603b4f9c722e78f
  • linux-crashdump_4.15.0.216.227_amd64.deb
    sha:9e632fa58cdd993cbfef794d90ead742cba5b912
  • linux-doc_4.15.0-216.227_all.deb
    sha:f3b9365f99cf158c5b0841bbbcc8bd822e47de43
  • linux-generic_4.15.0.216.227_amd64.deb
    sha:29a9a131d9f4d5a02c9295ae500cff4f3418c05e
  • linux-headers-4.15.0-216-tuxcare.els4_4.15.0-216.227_all.deb
    sha:2040baa6189d105057b829ba9f59c92b5cf37207
  • linux-headers-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:3dae0af7d72d7fd22e4ebeedabccabb54d0a1950
  • linux-headers-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:b850a1f9e18106e718a15c962b7d7037cb1a74dc
  • linux-headers-generic_4.15.0.216.227_amd64.deb
    sha:b4bac8bd250f0f825ce720721999051855344fb0
  • linux-headers-lowlatency_4.15.0.216.227_amd64.deb
    sha:7946f7a7a6d35793a80eeb0b103d36fd490bdb80
  • linux-image-generic_4.15.0.216.227_amd64.deb
    sha:17c71741a5343b19ef1830faabf1c336122f2b75
  • linux-image-lowlatency_4.15.0.216.227_amd64.deb
    sha:2149c9344e49385c76a3e47dc2ad1d3090571470
  • linux-image-unsigned-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:baf8172d85dfd663f48c0247b3eaa44ecba7abbd
  • linux-image-unsigned-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:ffc7fcc5f684f4e96df9fafbeacf4e9fe2fee7e2
  • linux-libc-dev_4.15.0-216.227_amd64.deb
    sha:72c390b3e28c1de8bbb8ff7e9b1e3a0dcee88a5a
  • linux-lowlatency_4.15.0.216.227_amd64.deb
    sha:a42b7a549071c1bbb5946052ae7cdc3ee9464836
  • linux-modules-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:70dff020cbd328e253891610304a6b879c73aae7
  • linux-modules-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:3579bda5595e7ccb5fd4a8b9d9af56cb4b7193f0
  • linux-modules-extra-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:289983b919fb1702c801930d2d10ee872296ab07
  • linux-source_4.15.0.216.227_all.deb
    sha:84d27771323ca012172c8691f5886b55b8725b2c
  • linux-source-4.15.0_4.15.0-216.227_all.deb
    sha:3c1887c207b866f521789861644cd03d9977b186
  • linux-tools-4.15.0-216-tuxcare.els4_4.15.0-216.227_amd64.deb
    sha:b1a1f57bdfd2094431d9b85a5cfc42b5c644155f
  • linux-tools-4.15.0-216-tuxcare.els4-generic_4.15.0-216.227_amd64.deb
    sha:c2d383bb1183018d80313b969d3a9561a9953f6f
  • linux-tools-4.15.0-216-tuxcare.els4-lowlatency_4.15.0-216.227_amd64.deb
    sha:bca87f6ec9feb05dcc4dcfc37ebf765c6ad0f82d
  • linux-tools-common_4.15.0-216.227_all.deb
    sha:8e69d9590e723a07b430b5188b4c6a7e928cd960
  • linux-tools-generic_4.15.0.216.227_amd64.deb
    sha:f11b84e68e34f98758c33a1c1bce0048286010c1
  • linux-tools-host_4.15.0-216.227_all.deb
    sha:18b0f8d95b4ec54bb1941791574d416cd2e2cf62
  • linux-tools-lowlatency_4.15.0.216.227_amd64.deb
    sha:3826320d09b70622c00c29a944f35e08b89cab7e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.