Release Info

Advisory: CLSA-2025:1744713316

OS: Ubuntu 16.04 ELS

Public date: 2025-04-15 10:35:18

Project: linux

Version: 4.4.0-273.307

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2025-1744713316.html

Changelog

* CVE-url: https://ubuntu.com/security/CVE-2024-26872 - RDMA/srpt: Do not register event handler until srpt device is fully setup * CVE-url: https://ubuntu.com/security/CVE-2024-53179 - smb: client: fix use-after-free of signing key * CVE-url: https://ubuntu.com/security/CVE-2021-47357 - atm: iphase: fix possible use-after-free in ia_module_exit() * Bionic update: upstream stable patchset 2022-11-15 (LP: #1996650) // CVE- url: https://ubuntu.com/security/CVE-2021-47103 - inet: fully convert sk->sk_rx_dst to RCU rules * CVE-url: https://ubuntu.com/security/CVE-2025-21858 - geneve: Fix use-after-free in geneve_find_dev(). * CVE-url: https://ubuntu.com/security/CVE-2024-36921 - wifi: iwlwifi: mvm: guard against invalid STA ID on removal * Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE- url: https://ubuntu.com/security/CVE-2022-49478 - media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init * CVE-url: https://ubuntu.com/security/CVE-2023-52621 - bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers * CVE-url: https://ubuntu.com/security/CVE-2025-21855 - ibmvnic: Don't reference skb after sending to VIOS * CVE-url: https://ubuntu.com/security/CVE-2021-47110 - x86/kvm: Disable kvmclock on all CPUs on shutdown * CVE-url: https://ubuntu.com/security/CVE-2024-57980 - media: uvcvideo: Fix double free in error path * CVE-url: https://ubuntu.com/security/CVE-2025-21718 - net: rose: fix timer races against user threads * CVE-url: https://ubuntu.com/security/CVE-2025-21735 - NFC: nci: Add bounds checking in nci_hci_create_pipe() * CVE-url: https://ubuntu.com/security/CVE-2023-52805 - jfs: fix array-index-out-of-bounds in diAlloc * CVE-url: https://ubuntu.com/security/CVE-2023-52847 - media: bttv: fix use after free error due to btv->timeout timer * CVE-url: https://ubuntu.com/security/CVE-2024-41014 - xfs: add bounds checking to xlog_recover_process_data * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48702 - ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc() * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48701 - ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface() * CVE-url: https://ubuntu.com/security/CVE-2024-26982 - Squashfs: check the inode number is not the invalid value of zero * CVE-url: https://ubuntu.com/security/CVE-2024-56548 - hfsplus: don't query the device logical block size multiple times * CVE-url: https://ubuntu.com/security/CVE-2024-57850 - jffs2: Prevent rtime decompress memory corruption * CVE-url: https://ubuntu.com/security/CVE-2024-49982 - aoe: fix the potential use-after-free problem in more places * CVE-url: https://ubuntu.com/security/CVE-2025-21687 - vfio/platform: check the bounds of read/write syscalls * CVE-url: https://ubuntu.com/security/CVE-2024-56539 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() * CVE-url: https://ubuntu.com/security/CVE-2024-53680 - ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() * CVE-url: https://ubuntu.com/security/CVE-2024-56630 - ocfs2: free inode when ocfs2_get_init_inode() fails * CVE-url: https://ubuntu.com/security/CVE-2024-53184 - um: ubd: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-57884 - mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() * CVE-url: https://ubuntu.com/security/CVE-2024-56597 - jfs: fix shift-out-of-bounds in dbSplit * CVE-url: https://ubuntu.com/security/CVE-2025-21664 - dm thin: make get_first_thin use rcu-safe list first function * CVE-url: https://ubuntu.com/security/CVE-2024-56594 - drm/amdgpu: set the right AMDGPU sg segment limitation * CVE-url: https://ubuntu.com/security/CVE-2024-52332 - igb: Fix potential invalid memory access in igb_init_module() * CVE-url: https://ubuntu.com/security/CVE-2024-53172 - ubi: fastmap: Fix duplicate slab cache names while attaching * CVE-url: https://ubuntu.com/security/CVE-2024-56532 - ALSA: us122l: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53183 - um: net: Do not use drvdata in release * CVE-url: https://ubuntu.com/security/CVE-2024-57948 - mac802154: check local interfaces before deleting sdata list * CVE-url: https://ubuntu.com/security/CVE-2024-57904 - iio: adc: at91: call input_free_device() on allocated iio_dev * CVE-url: https://ubuntu.com/security/CVE-2024-56637 - netfilter: ipset: Hold module reference while requesting a module * CVE-url: https://ubuntu.com/security/CVE-2024-53214 - vfio/pci: Properly hide first-in-list PCIe extended capability * CVE-url: https://ubuntu.com/security/CVE-2024-56700 - media: wl128x: Fix atomicity violation in fmc_send_cmd() * CVE-url: https://ubuntu.com/security/CVE-2024-56531 - ALSA: caiaq: Use snd_card_free_when_closed() at disconnection * CVE-url: https://ubuntu.com/security/CVE-2024-53194 - PCI: Fix use-after-free of slot->bus on hot remove * CVE-url: https://ubuntu.com/security/CVE-2024-56619 - nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2021-47636 - ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE- url: https://ubuntu.com/security/CVE-2022-49058 - cifs: potential buffer overflow in handling symlinks * CVE-url: https://ubuntu.com/security/CVE-2024-5317 - nfsd: make sure exp active before svc_export_show * CVE-url: https://ubuntu.com/security/CVE-2024-53174 - SUNRPC: make sure cache entry active before cache_show * CVE-url: https://ubuntu.com/security/CVE-2021-47219 - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() * CVE-url: https://ubuntu.com/security/CVE-2024-50269 - usb: musb: sunxi: Fix accessing an released usb phy * CVE-url: https://ubuntu.com/security/CVE-2024-57908 - iio: imu: kmx61: fix information leak in triggered buffer

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-buildinfo-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-cloud-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb linux-cloud-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-cloud-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-cloud-tools-common_4.4.0-273.307_all.deb linux-cloud-tools-generic_4.4.0.273.307_amd64.deb linux-cloud-tools-lowlatency_4.4.0.273.307_amd64.deb linux-crashdump_4.4.0.273.307_amd64.deb linux-doc_4.4.0-273.307_all.deb linux-generic_4.4.0.273.307_amd64.deb linux-headers-4.4.0-273-tuxcare.els44_4.4.0-273.307_all.deb linux-headers-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-headers-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-headers-generic_4.4.0.273.307_amd64.deb linux-headers-lowlatency_4.4.0.273.307_amd64.deb linux-image-generic_4.4.0.273.307_amd64.deb linux-image-lowlatency_4.4.0.273.307_amd64.deb linux-image-unsigned-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-image-unsigned-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-libc-dev_4.4.0-273.307_amd64.deb linux-lowlatency_4.4.0.273.307_amd64.deb linux-modules-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-modules-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-modules-extra-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-source_4.4.0.273.307_all.deb linux-source-4.4.0_4.4.0-273.307_all.deb linux-tools-4.4.0-273-tuxcare.els44_4.4.0-273.307_amd64.deb linux-tools-4.4.0-273-tuxcare.els44-generic_4.4.0-273.307_amd64.deb linux-tools-4.4.0-273-tuxcare.els44-lowlatency_4.4.0-273.307_amd64.deb linux-tools-common_4.4.0-273.307_all.deb linux-tools-generic_4.4.0.273.307_amd64.deb linux-tools-host_4.4.0-273.307_all.deb linux-tools-lowlatency_4.4.0.273.307_amd64.deb

CVEs

CVE-2024-57850
CVE-2024-53172
CVE-2024-56532
CVE-2022-49058
CVE-2024-56700
CVE-2024-50269
CVE-2021-47357
CVE-2021-47103
CVE-2024-5317
CVE-2023-52847
CVE-2024-53184
CVE-2021-47110
CVE-2024-57884
CVE-2024-53680
CVE-2024-57904
CVE-2024-56619
CVE-2024-56597
CVE-2024-56630
CVE-2025-21855
CVE-2024-53214
CVE-2022-49478
CVE-2024-53194
CVE-2024-57948
CVE-2024-53174
CVE-2024-56531
CVE-2024-26872
CVE-2024-57908
CVE-2025-21687
CVE-2024-53179
CVE-2024-56594
CVE-2025-21664
CVE-2024-53183
CVE-2021-47636
CVE-2024-41014
CVE-2023-52621
CVE-2025-21718
CVE-2025-21735
CVE-2024-36921
CVE-2025-21858
CVE-2021-47219
CVE-2022-48702
CVE-2024-56548
CVE-2024-49982
CVE-2023-52805
CVE-2022-48701
CVE-2024-26982
CVE-2024-57980
CVE-2024-56539
CVE-2024-52332
CVE-2024-56637