Advisory: CLSA-2023:1693333574
OS: Ubuntu 16.04 ELS
Public date: 2023-08-29 14:26:17
Project: linux
Version: 4.4.0-243.277
Errata link: https://errata.cloudlinux.com/ubuntu16-els/CLSA-2023-1693333574.html
* CVE-url: https://ubuntu.com/security/CVE-2023-4128 - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after- free - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after- free - net/sched: cls_route: No longer copy tcf_result on update to avoid use- after-free * CVE-url: https://ubuntu.com/security/CVE-2023-40283 - Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb * Jammy update: v5.15.42 upstream stable release (LP: #1981375) // CVE-url: https://ubuntu.com/security/CVE-2023-4387 - net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() * CVE-2023-20593 // CVE-url: https://ubuntu.com/security/CVE-2023-20593 - x86/cpu/amd: Move the errata checking functionality up - x86/cpu/amd: Add a Zenbleed fix * CVE-2023-35001 // CVE-url: https://ubuntu.com/security/CVE-2023-35001 - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval * Bionic update: upstream stable patchset 2023-04-05 (LP: #2015399) // CVE- url: https://ubuntu.com/security/CVE-2023-3567 - vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF * CVE-url: https://ubuntu.com/security/CVE-2023-0458 - prlimit: do_prlimit needs to have a speculation check * CVE-url: https://ubuntu.com/security/CVE-2023-2513 - ext4: fix use-after-free in ext4_xattr_set_entry * Jammy update: v5.15.61 upstream stable release (LP: #1990162) // CVE-url: https://ubuntu.com/security/CVE-2023-2513 - ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h * CVE-url: https://ubuntu.com/security/CVE-2023-3159 - firewire: fix potential uaf in outbound_phy_packet_callback() * Jammy update: v5.15.106 upstream stable release (LP: #2023233) // CVE-url: https://ubuntu.com/security/CVE-2023-1611 - btrfs: fix race between quota disable and quota assign ioctls * CVE-url: https://ubuntu.com/security/CVE-2023-3611 - net/sched: sch_qfq: account for stab overhead in qfq_enqueue * CVE-2023-3776 // CVE-url: https://ubuntu.com/security/CVE-2023-3776 - net/sched: cls_fw: Fix improper refcount update leads to use-after-free
Update command: apt-get update apt-get --only-upgrade install linux*
linux-buildinfo-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-buildinfo-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-cloud-tools-4.4.0-243-tuxcare.els14_4.4.0-243.277_amd64.deb linux-cloud-tools-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-cloud-tools-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-cloud-tools-common_4.4.0-243.277_all.deb linux-doc_4.4.0-243.277_all.deb linux-headers-4.4.0-243-tuxcare.els14_4.4.0-243.277_all.deb linux-headers-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-headers-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-image-unsigned-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-image-unsigned-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-libc-dev_4.4.0-243.277_amd64.deb linux-modules-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-modules-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-modules-extra-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-source-4.4.0_4.4.0-243.277_all.deb linux-tools-4.4.0-243-tuxcare.els14_4.4.0-243.277_amd64.deb linux-tools-4.4.0-243-tuxcare.els14-generic_4.4.0-243.277_amd64.deb linux-tools-4.4.0-243-tuxcare.els14-lowlatency_4.4.0-243.277_amd64.deb linux-tools-common_4.4.0-243.277_all.deb linux-tools-host_4.4.0-243.277_all.deb