Release info for CLSA-2024:1731602566
Fix of 76 CVEs
Published on Nov 14, 2024
Details
Critical- Advisory
- CLSA-2024:1731602566
- Operating system
- Ubuntu 18.04 ELS
- Published date
- 2024-11-14
- Component
- linux
- Type
- security
Packages list
linux-buildinfo-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-buildinfo-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-cloud-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
linux-cloud-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-cloud-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-cloud-tools-common_4.15.0-240.251_all.deb
linux-doc_4.15.0-240.251_all.deb
linux-headers-4.15.0-240-tuxcare.els28_4.15.0-240.251_all.deb
linux-headers-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-headers-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-image-unsigned-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-image-unsigned-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-libc-dev_4.15.0-240.251_amd64.deb
linux-modules-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-modules-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-modules-extra-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-source-4.15.0_4.15.0-240.251_all.deb
linux-tools-4.15.0-240-tuxcare.els28_4.15.0-240.251_amd64.deb
linux-tools-4.15.0-240-tuxcare.els28-generic_4.15.0-240.251_amd64.deb
linux-tools-4.15.0-240-tuxcare.els28-lowlatency_4.15.0-240.251_amd64.deb
linux-tools-common_4.15.0-240.251_all.deb
linux-tools-host_4.15.0-240.251_all.deb
CVEs
- CVE-2022-48951
- CVE-2022-49006
- CVE-2022-49026
- CVE-2023-52918
- CVE-2024-26641
- CVE-2024-26668
- CVE-2024-27397
- CVE-2024-38611
- CVE-2024-39476
- CVE-2024-41012
- CVE-2024-41042
- CVE-2024-41063
- CVE-2024-42265
- CVE-2024-42289
- CVE-2024-42292
- CVE-2024-42297
- CVE-2024-42309
- CVE-2024-42310
- CVE-2024-42311
- CVE-2024-43839
- CVE-2024-43853
- CVE-2024-43854
- CVE-2024-43856
- CVE-2024-43860
- CVE-2024-43861
- CVE-2024-43871
- CVE-2024-43884
- CVE-2024-43893
- CVE-2024-43914
- CVE-2024-44946
- CVE-2024-44947
- CVE-2024-44960
- CVE-2024-44995
- CVE-2024-45006
- CVE-2024-45021
- CVE-2024-45025
- CVE-2024-45028
- CVE-2024-46675
- CVE-2024-46676
- CVE-2024-46677
- CVE-2024-46679
- CVE-2024-46685
- CVE-2024-46721
- CVE-2024-46750
- CVE-2024-46755
- CVE-2024-46761
- CVE-2024-47659
- CVE-2024-47663
- CVE-2024-47669
- CVE-2024-47670
- CVE-2024-47685
- CVE-2024-47697
- CVE-2024-47698
- CVE-2024-47701
- CVE-2024-47723
- CVE-2024-47742
- CVE-2024-47745
- CVE-2024-47747
- CVE-2024-47757
- CVE-2024-49860
- CVE-2024-49882
- CVE-2024-49883
- CVE-2024-49884
- CVE-2024-49889
- CVE-2024-49900
- CVE-2024-49903
- CVE-2024-49950
- CVE-2024-49967
- CVE-2024-49981
- CVE-2024-49995
- CVE-2024-50033
- CVE-2024-50035
- CVE-2024-50036
- CVE-2024-50044
- CVE-2024-50055
- CVE-2024-50073