Release Info

Advisory: CLSA-2023:1684277390

OS: Ubuntu 16.04 ELS

Public date: 2023-05-16 18:49:52

Project: linux

Version: 4.4.0-240.274

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2023-1684277390.html

Changelog

* Bionic update: upstream stable patchset 2022-09-12 (LP: #1989374) // CVE-2022-1012 - tcp: use different parts of the port_offset for index and offset - tcp: add small random increments to the source port - tcp: dynamically allocate the perturb table used by source ports - tcp: increase source port perturb table to 2^16 - tcp: drop the hash_32() part from the index calculation * Bionic update: upstream stable patchset 2022-09-12 (LP: #1989374) - tcp: add some entropy in __inet_hash_connect() * Bionic update: upstream stable patchset 2022-07-06 (LP: #1980879) // CVE-2022-1012 - tcp: resalt the secret every 10 seconds - secure_seq: use the 64 bits of the siphash for port offset calculation * Bionic update: upstream stable patchset 2022-07-06 (LP: #1980879) - tcp: change source port randomizarion at connect() time * Miscellaneous upstream changes - Revert "tcp: drop the hash_32() part from the index calculation" - Revert "tcp: increase source port perturb table to 2^16" - Revert "tcp: dynamically allocate the perturb table used by source ports" - Revert "tcp: add small random increments to the source port" - Revert "tcp: resalt the secret every 10 seconds" - Revert "tcp: use different parts of the port_offset for index and offset" - Revert "secure_seq: use the 64 bits of the siphash for port offset calculation" - Revert "tcp: change source port randomizarion at connect() time" - Revert "secure_seq: use SipHash in place of MD5" - Revert "tcp: allow to turn tcp timestamp randomization off" - Revert "tcp/dccp: better use of ephemeral ports in connect()" - tcp/dccp: better use of ephemeral ports in connect() - tcp: randomize tcp timestamp offsets for each connection - tcp: allow to turn tcp timestamp randomization off - secure_seq: use SipHash in place of MD5

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-buildinfo-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-cloud-tools-4.4.0-240-tuxcare.els11_4.4.0-240.274_amd64.deb linux-cloud-tools-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-cloud-tools-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-cloud-tools-common_4.4.0-240.274_all.deb linux-doc_4.4.0-240.274_all.deb linux-headers-4.4.0-240-tuxcare.els11_4.4.0-240.274_all.deb linux-headers-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-headers-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-image-unsigned-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-image-unsigned-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-libc-dev_4.4.0-240.274_amd64.deb linux-modules-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-modules-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-modules-extra-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-source-4.4.0_4.4.0-240.274_all.deb linux-tools-4.4.0-240-tuxcare.els11_4.4.0-240.274_amd64.deb linux-tools-4.4.0-240-tuxcare.els11-generic_4.4.0-240.274_amd64.deb linux-tools-4.4.0-240-tuxcare.els11-lowlatency_4.4.0-240.274_amd64.deb linux-tools-common_4.4.0-240.274_all.deb linux-tools-host_4.4.0-240.274_all.deb

CVEs

CVE-2022-26966
CVE-2021-4028
CVE-2023-2248
CVE-2023-1670
CVE-2023-1073
CVE-2022-43945
CVE-2022-3586
CVE-2022-1048
CVE-2023-1829
CVE-2023-1989
CVE-2023-30456
CVE-2023-28328
CVE-2023-1513
CVE-2022-1012
CVE-2022-20369
CVE-2023-2007
CVE-2022-24448
CVE-2023-31436