Release Info

Advisory: CLSA-2023:1695901231

OS: Ubuntu 16.04 ELS

Public date: 2023-09-28 07:40:34

Project: linux

Version: 4.4.0-246.280

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2023-1695901231.html

Changelog

* CVE-url: https://ubuntu.com/security/CVE-2023-42753 - netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c * CVE-2022-40982 // CVE-url: https://ubuntu.com/security/CVE-2022-40982 - init: Provide arch_cpu_finalize_init() - x86/cpu: Switch to arch_cpu_finalize_init() - init: Remove check_bugs() leftovers - x86/speculation: Add Gather Data Sampling mitigation - x86/speculation: Add force option to GDS mitigation - x86/speculation: Add Kconfig option for GDS - KVM: Add GDS_NO support to KVM * CVE-url: https://ubuntu.com/security/CVE-2022-40982 - x86/cpu: Move arch_smt_update() to a neutral place * Bionic update: upstream stable patchset 2019-07-23 (LP: #1837664) // CVE- url: https://ubuntu.com/security/CVE-2022-40982 - cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVM * Jammy update: v5.15.94 upstream stable release (LP: #2012673) // CVE-url: https://ubuntu.com/security/CVE-2022-40982 - x86/speculation: Identify processors vulnerable to SMT RSB predictions * CVE-2023-20588 // CVE-url: https://ubuntu.com/security/CVE-2023-20588 - x86/bugs: Increase the x86 bugs vector size to two u32s - x86/CPU/AMD: Do not leak quotient data after a division by 0 - x86/CPU/AMD: Fix the DIV(0) initial fix attempt * CVE-2023-3863 // CVE-url: https://ubuntu.com/security/CVE-2023-3863 - nfc: llcp: simplify llcp_sock_connect() error paths - net: nfc: Fix use-after-free caused by nfc_llcp_find_local * Jammy update: v5.15.46 upstream stable release (LP: #1981864) // CVE-url: https://ubuntu.com/security/CVE-2023-4385 - fs: jfs: fix possible NULL pointer dereference in dbFree() * Jammy update: v5.15.42 upstream stable release (LP: #1981375) // CVE-url: https://ubuntu.com/security/CVE-2023-4459 - net: vmxnet3: fix possible NULL pointer dereference in vmxnet3_rq_cleanup() * CVE-url: https://ubuntu.com/security/CVE-2023-4921 - net: sched: sch_qfq: Fix UAF in qfq_dequeue() * Miscellaneous Ubuntu changes - [Config] CONFIG_GDS_FORCE_MITIGATION=n

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-buildinfo-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-cloud-tools-4.4.0-246-tuxcare.els17_4.4.0-246.280_amd64.deb linux-cloud-tools-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-cloud-tools-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-cloud-tools-common_4.4.0-246.280_all.deb linux-doc_4.4.0-246.280_all.deb linux-headers-4.4.0-246-tuxcare.els17_4.4.0-246.280_all.deb linux-headers-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-headers-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-image-unsigned-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-image-unsigned-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-libc-dev_4.4.0-246.280_amd64.deb linux-modules-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-modules-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-modules-extra-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-source-4.4.0_4.4.0-246.280_all.deb linux-tools-4.4.0-246-tuxcare.els17_4.4.0-246.280_amd64.deb linux-tools-4.4.0-246-tuxcare.els17-generic_4.4.0-246.280_amd64.deb linux-tools-4.4.0-246-tuxcare.els17-lowlatency_4.4.0-246.280_amd64.deb linux-tools-common_4.4.0-246.280_all.deb linux-tools-host_4.4.0-246.280_all.deb

CVEs

CVE-2022-40982
CVE-2023-4459
CVE-2023-3863
CVE-2023-20588
CVE-2023-4921
CVE-2023-4385
CVE-2023-42753