Release Info

Advisory: CLSA-2023:1701279154

OS: Ubuntu 16.04 ELS

Public date: 2023-11-29 12:32:36

Project: linux-hwe

Version: 4.15.0-221.232~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2023-1701279154.html

Changelog

[ Ubuntu: 4.15.0-221.232 ] * CVE-2023-31085 // CVE-url: https://ubuntu.com/security/CVE-2023-31085 - ubi: Refuse attaching if mtd's erasesize is 0 * Jammy update: v5.15.121 upstream stable release (LP: #2032689) // CVE-url: https://ubuntu.com/security/CVE-2023-4132 - media: usb: siano: Fix warning due to null work_func_t function pointer * Jammy update: v5.15.99 upstream stable release (LP: #2018438) // CVE-url: https://ubuntu.com/security/CVE-2023-4132 - media: usb: siano: Fix use after free bugs caused by do_submit_urb * CVE-2023-5717 // CVE-url: https://ubuntu.com/security/CVE-2023-5717 - perf: Disallow mis-matched inherited group reads * CVE-url: https://ubuntu.com/security/CVE-2023-1838 - Fix double fget() in vhost_net_set_backend() * Jammy update: v5.15.99 upstream stable release (LP: #2018438) // CVE-url: https://ubuntu.com/security/CVE-2023-1077 - sched/rt: pick_next_rt_entity(): check list_entry * Jammy update: v5.15.99 upstream stable release (LP: #2018438) // CVE-url: https://ubuntu.com/security/CVE-2023-1076 - net: add sock_init_data_uid() - tun: tun_chr_open(): correctly initialize socket uid - tap: tap_open(): correctly initialize socket uid * CVE-url: https://ubuntu.com/security/CVE-2023-45863 - kobject: Fix slab-out-of-bounds in fill_kobj_path() * CVE-url: https://ubuntu.com/security/CVE-2023-45871 - igb: set max size RX buffer when store bad packet is enabled * Jammy update: v5.15.100 upstream stable release (LP: #2020387) // CVE-url: https://ubuntu.com/security/CVE-2023-45862 - USB: ene_usb6250: Allocate enough memory for full object * CVE-url: https://ubuntu.com/security/CVE-2023-39189 - netfilter: nfnetlink_osf: avoid OOB read

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-buildinfo-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb linux-cloud-tools-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-cloud-tools-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb linux-headers-4.15.0-221-tuxcare.els19_4.15.0-221.232~16.04.1_all.deb linux-headers-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-headers-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb linux-hwe-cloud-tools-4.15.0-221-tuxcare.els19_4.15.0-221.232~16.04.1_amd64.deb linux-hwe-tools-4.15.0-221-tuxcare.els19_4.15.0-221.232~16.04.1_amd64.deb linux-image-unsigned-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-image-unsigned-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb linux-modules-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-modules-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb linux-modules-extra-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-221.232~16.04.1_all.deb linux-tools-4.15.0-221-tuxcare.els19-generic_4.15.0-221.232~16.04.1_amd64.deb linux-tools-4.15.0-221-tuxcare.els19-lowlatency_4.15.0-221.232~16.04.1_amd64.deb

CVEs

CVE-2023-45863
CVE-2023-45862
CVE-2023-4132
CVE-2023-1076
CVE-2023-1077
CVE-2023-5717
CVE-2023-39189
CVE-2023-31085
CVE-2023-1838
CVE-2023-45871