Release Info

Advisory: CLSA-2022:1670263674

OS: Ubuntu 16.04 ELS

Public date: 2022-12-05 00:00:00

Project: linux-hwe

Version: 4.15.0-200.211~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2022-1670263674.html

Changelog

* bionic/linux: 4.15.0-200.211 -proposed tracker (LP: #1997465) * CVE-2022-3239 - media: em28xx: initialize refcount before kref_get * CVE-2022-3524 - tcp/udp: Fix memory leak in ipv6_renew_options(). * CVE-2022-3564 - Bluetooth: L2CAP: Fix use-after-free caused by l2cap_reassemble_sdu * CVE-2022-3565 - mISDN: fix use-after-free bugs in l1oip timer handlers * CVE-2022-3566 - tcp: Fix data races around icsk->icsk_af_ops. * CVE-2022-3567 - ipv6: annotate some data-races around sk->sk_prot - ipv6: Fix data races around sk->sk_prot. * CVE-2022-3594 - r8152: Rate limit overflow messages * CVE-2022-3621 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level() * CVE-2022-42703 - mm/rmap.c: don't reuse anon_vma if we just want a copy - mm: rmap: explicitly reset vma->anon_vma in unlink_anon_vmas() - mm/rmap: Fix anon_vma->degree ambiguity leading to double-reuse

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-buildinfo-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-cloud-tools-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-cloud-tools-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-cloud-tools-generic-hwe-16.04_4.15.0.200.140_amd64.deb linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.200.140_amd64.deb linux-generic-hwe-16.04_4.15.0.200.140_amd64.deb linux-headers-4.15.0-200-tuxcare.els2_4.15.0-200.211~16.04.1_all.deb linux-headers-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-headers-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-headers-generic-hwe-16.04_4.15.0.200.140_amd64.deb linux-headers-lowlatency-hwe-16.04_4.15.0.200.140_amd64.deb linux-hwe-cloud-tools-4.15.0-200-tuxcare.els2_4.15.0-200.211~16.04.1_amd64.deb linux-hwe-tools-4.15.0-200-tuxcare.els2_4.15.0-200.211~16.04.1_amd64.deb linux-image-generic-hwe-16.04_4.15.0.200.140_amd64.deb linux-image-lowlatency-hwe-16.04_4.15.0.200.140_amd64.deb linux-image-unsigned-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-image-unsigned-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-lowlatency-hwe-16.04_4.15.0.200.140_amd64.deb linux-modules-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-modules-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-modules-extra-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-200.211~16.04.1_all.deb linux-tools-4.15.0-200-tuxcare.els2-generic_4.15.0-200.211~16.04.1_amd64.deb linux-tools-4.15.0-200-tuxcare.els2-lowlatency_4.15.0-200.211~16.04.1_amd64.deb linux-tools-generic-hwe-16.04_4.15.0.200.140_amd64.deb linux-tools-lowlatency-hwe-16.04_4.15.0.200.140_amd64.deb

CVEs

CVE-2022-3567
CVE-2022-3621
CVE-2022-3565
CVE-2022-42703
CVE-2022-3594
CVE-2022-3028
CVE-2022-3239
CVE-2022-3524
CVE-2022-3566
CVE-2022-40768
CVE-2022-3564