Release Info

Advisory: CLSA-2023:1693827322

OS: Ubuntu 16.04 ELS

Public date: 2023-09-04 07:35:25

Project: linux

Version: 4.4.0-244.278

Errata link: https://errata.cloudlinux.com/ubuntu16-els/CLSA-2023-1693827322.html

Changelog

* Jammy update: v5.15.86 upstream stable release (LP: #2005113) // CVE-url: https://ubuntu.com/security/CVE-2022-3606 - libbpf: Fix null-pointer dereference in find_prog_by_sec_insn() * Jammy update: v5.15.87 upstream stable release (LP: #2007441) // CVE-url: https://ubuntu.com/security/CVE-2023-23454 - net: sched: cbq: dont intepret cls results when asked to drop * Jammy update: v5.15.76 upstream stable release (LP: #1997113) // CVE-url: https://ubuntu.com/security/CVE-2023-0590 - net: sched: fix race condition in qdisc_graft() * Jammy update: v5.15.91 upstream stable release (LP: #2011467) // CVE-url: https://ubuntu.com/security/CVE-2022-4129 - l2tp: Serialize access to sk_user_data with sk_callback_lock * Jammy update: v5.15.105 upstream stable release (LP: #2023230) // CVE-url: https://ubuntu.com/security/CVE-2023-30772 - power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition * Jammy update: v5.15.105 upstream stable release (LP: #2023230) // CVE-url: https://ubuntu.com/security/CVE-2023-2194 - i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() * CVE-2023-31084 // CVE-2023-31084 was assigned to this bug. // CVE-url: https://ubuntu.com/security/CVE-2023-31084 - media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() * Jammy update: v5.15.99 upstream stable release (LP: #2018438) // CVE-url: https://ubuntu.com/security/CVE-2023-2985 - fs: hfsplus: fix UAF issue in hfsplus_put_super * Jammy update: v5.15.111 upstream stable release (LP: #2025095) // CVE-url: https://ubuntu.com/security/CVE-2023-2269 - dm ioctl: fix nested locking in table_clear() to remove deadlock concern

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-buildinfo-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-cloud-tools-4.4.0-244-tuxcare.els15_4.4.0-244.278_amd64.deb linux-cloud-tools-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-cloud-tools-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-cloud-tools-common_4.4.0-244.278_all.deb linux-doc_4.4.0-244.278_all.deb linux-headers-4.4.0-244-tuxcare.els15_4.4.0-244.278_all.deb linux-headers-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-headers-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-image-unsigned-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-image-unsigned-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-libc-dev_4.4.0-244.278_amd64.deb linux-modules-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-modules-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-modules-extra-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-source-4.4.0_4.4.0-244.278_all.deb linux-tools-4.4.0-244-tuxcare.els15_4.4.0-244.278_amd64.deb linux-tools-4.4.0-244-tuxcare.els15-generic_4.4.0-244.278_amd64.deb linux-tools-4.4.0-244-tuxcare.els15-lowlatency_4.4.0-244.278_amd64.deb linux-tools-common_4.4.0-244.278_all.deb linux-tools-host_4.4.0-244.278_all.deb

CVEs

CVE-2023-2269
CVE-2023-0590
CVE-2023-23454
CVE-2023-2985
CVE-2022-3606
CVE-2023-30772
CVE-2022-4129
CVE-2023-2194
CVE-2023-31084