Advisory: CLSA-2024:1723622576
OS: Ubuntu 18.04 ELS
Public date: 2024-08-14 04:02:58
Project: linux
Version: 4.15.0-234.245
Errata link: https://errata.tuxcare.com/els_os/ubuntu18.04els/CLSA-2024-1723622576.html
* CVE-url: https://ubuntu.com/security/CVE-2024-42236 - usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() * CVE-url: https://ubuntu.com/security/CVE-2024-41095 - drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes * CVE-url: https://ubuntu.com/security/CVE-2024-41098 - ata: libata-core: Fix null pointer dereference on error * CVE-url: https://ubuntu.com/security/CVE-2024-42244 - USB: serial: mos7840: fix crash on resume * CVE-url: https://ubuntu.com/security/CVE-2024-41089 - drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes * CVE-url: https://ubuntu.com/security/CVE-2024-42232 - libceph: fix race between delayed_work() and ceph_monc_stop() * CVE-url: https://ubuntu.com/security/CVE-2024-42153 - i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr * CVE-url: https://ubuntu.com/security/CVE-2022-48791 - scsi: pm80xx: Fix TMF task completion race condition - scsi: pm8001: Fix use-after-free for aborted TMF sas_task * CVE-url: https://ubuntu.com/security/CVE-2022-48788 - nvme-rdma: fix possible use-after-free in transport error_recovery work * CVE-url: https://ubuntu.com/security/CVE-2022-48792 - scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task * CVE-url: https://ubuntu.com/security/CVE-2022-48790 - nvme: fix a possible use-after-free in controller reset during load * CVE-url: https://ubuntu.com/security/CVE-2024-42154 - tcp_metrics: validate source addr length * CVE-url: https://ubuntu.com/security/CVE-2024-38596 - af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg * CVE-url: https://ubuntu.com/security/CVE-2024-36270 - netfilter: tproxy: bail out if IP has been disabled on the device * CVE-url: https://ubuntu.com/security/CVE-2024-38780 - dma-buf/sw-sync: don't enable IRQ from sync_print_obj() * CVE-url: https://ubuntu.com/security/CVE-2024-36886 - tipc: fix UAF in error path * CVE-url: https://ubuntu.com/security/CVE-2024-42068 - bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() * CVE-url: https://ubuntu.com/security/CVE-2024-42156 - s390/pkey: Wipe copies of clear-key structures on failure * CVE-url: https://ubuntu.com/security/CVE-2024-42079 - gfs2: Fix NULL pointer dereference in gfs2_log_flush * CVE-url: https://ubuntu.com/security/CVE-2024-42223 - media: dvb-frontends: tda10048: Fix integer overflow * CVE-url: https://ubuntu.com/security/CVE-2024-42157 - s390/pkey: Wipe sensitive data on failure * CVE-url: https://ubuntu.com/security/CVE-2024-42160 - f2fs: indicate shutdown f2fs to allow unmount successfully - f2fs: support fault_type mount option - f2fs: check validation of fault attrs in f2fs_build_fault_attr() * CVE-url: https://ubuntu.com/security/CVE-2024-42224 - net: dsa: mv88e6xxx: Correct check for empty list * CVE-url: https://ubuntu.com/security/CVE-2024-38570 - gfs2: Rename sd_{ glock => kill }_wait - gfs2: Fix potential glock use-after-free on unmount * CVE-url: https://ubuntu.com/security/CVE-2024-38583 - nilfs2: fix use-after-free of timer for log writer thread - nilfs2: fix unexpected freezing of nilfs_segctor_sync() - nilfs2: fix potential hang in nilfs_detach_log_writer() * CVE-url: https://ubuntu.com/security/CVE-2024-42070 - netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers * CVE-url: https://ubuntu.com/security/CVE-2024-42077 - ocfs2: fix DIO failure due to insufficient transaction credits * CVE-url: https://ubuntu.com/security/CVE-2024-42226 - usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB * CVE-url: https://ubuntu.com/security/CVE-2024-42228 - drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
Update command: apt-get update apt-get --only-upgrade install linux*
linux-buildinfo-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-buildinfo-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-cloud-tools-4.15.0-234-tuxcare.els22_4.15.0-234.245_amd64.deb linux-cloud-tools-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-cloud-tools-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-cloud-tools-common_4.15.0-234.245_all.deb linux-doc_4.15.0-234.245_all.deb linux-headers-4.15.0-234-tuxcare.els22_4.15.0-234.245_all.deb linux-headers-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-headers-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-image-unsigned-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-image-unsigned-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-libc-dev_4.15.0-234.245_amd64.deb linux-modules-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-modules-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-modules-extra-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-source-4.15.0_4.15.0-234.245_all.deb linux-tools-4.15.0-234-tuxcare.els22_4.15.0-234.245_amd64.deb linux-tools-4.15.0-234-tuxcare.els22-generic_4.15.0-234.245_amd64.deb linux-tools-4.15.0-234-tuxcare.els22-lowlatency_4.15.0-234.245_amd64.deb linux-tools-common_4.15.0-234.245_all.deb linux-tools-host_4.15.0-234.245_all.deb