Advisory: CLSA-2023:1690395161
OS: Ubuntu 16.04 ELS
Public date: 2023-07-26 14:12:43
Project: linux
Version: 4.4.0-242.276
Errata link: https://errata.cloudlinux.com/ubuntu16-els/CLSA-2023-1690395161.html
* Bionic update: upstream stable patchset 2021-11-12 (LP: #1950816) // CVE- url: https://ubuntu.com/security/CVE-2021-20321 - ovl: fix missing negative dentry check in ovl_rename() * CVE-url: https://ubuntu.com/security/CVE-2021-20321 - ovl: cleanup unused var in rename2 * Jammy update: v5.15.93 upstream stable release (LP: #2012665) // CVE-url: https://ubuntu.com/security/CVE-2023-3161 - fbcon: Check font dimension limits * CVE-url: https://ubuntu.com/security/CVE-2021-3753 - vt_kdsetmode: extend console locking * Jammy update: v5.15.75 upstream stable release (LP: #1996825) // CVE-url: https://ubuntu.com/security/CVE-2022-1184 - ext4: fix check for block being out of directory size * Jammy update: v5.15.61 upstream stable release (LP: #1990162) // CVE-url: https://ubuntu.com/security/CVE-2022-1184 - ext4: check if directory block is within i_size * Jammy update: v5.15.104 upstream stable release (LP: #2023225) // CVE-url: https://ubuntu.com/security/CVE-2023-1990 - nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition * CVE-url: https://ubuntu.com/security/CVE-2023-3090 - ipvlan:Fix out-of-bounds caused by unclear skb->cb * Jammy update: v5.15.63 upstream stable release (LP: #1990564) // CVE-url: https://ubuntu.com/security/CVE-2023-3111 - btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() * CVE-url: https://ubuntu.com/security/CVE-2023-3111 - Btrfs: fill relocation block rsv after allocation - btrfs: check return value of btrfs_commit_transaction in relocation * CVE-url: https://ubuntu.com/security/CVE-2023-3141 - memstick: r592: Fix UAF bug in r592_remove due to race condition * CVE-url: https://ubuntu.com/security/CVE-2023-3212 - gfs2: Don't deref jdesc in evict * CVE-url: https://ubuntu.com/security/CVE-2023-3268 - kernel/relay.c: fix read_pos error when multiple readers - relayfs: fix out-of-bounds access in relay_file_read * CVE-url: https://ubuntu.com/security/CVE-2023-3390 - netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE * CVE-url: https://ubuntu.com/security/CVE-2023-35824 - media: dm1105: Fix use after free bug in dm1105_remove due to race condition
Update command: apt-get update apt-get --only-upgrade install linux*
linux-buildinfo-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-buildinfo-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-cloud-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb linux-cloud-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-cloud-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-cloud-tools-common_4.4.0-242.276_all.deb linux-doc_4.4.0-242.276_all.deb linux-headers-4.4.0-242-tuxcare.els13_4.4.0-242.276_all.deb linux-headers-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-headers-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-image-unsigned-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-image-unsigned-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-libc-dev_4.4.0-242.276_amd64.deb linux-modules-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-modules-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-modules-extra-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-source-4.4.0_4.4.0-242.276_all.deb linux-tools-4.4.0-242-tuxcare.els13_4.4.0-242.276_amd64.deb linux-tools-4.4.0-242-tuxcare.els13-generic_4.4.0-242.276_amd64.deb linux-tools-4.4.0-242-tuxcare.els13-lowlatency_4.4.0-242.276_amd64.deb linux-tools-common_4.4.0-242.276_all.deb linux-tools-host_4.4.0-242.276_all.deb