Release Info

Advisory: CLSA-2024:1714065365

OS: Ubuntu 16.04 ELS

Public date: 2024-04-25 13:16:07

Project: linux-hwe

Version: 4.15.0-227.238~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2024-1714065365.html

Changelog

[ Ubuntu: 4.15.0-227.238 ] * CVE-url: https://ubuntu.com/security/CVE-2023-1998 - x86/speculation: Allow enabling STIBP with legacy IBRS * CVE-url: https://ubuntu.com/security/CVE-2021-47193 - scsi: pm80xx: Tie the interrupt name to the module instance - scsi: pm80xx: Deal with kexec reboots - scsi: pm80xx: Increase number of supported queues - scsi: pm80xx: Remove DMA memory allocation for ccb and device structures - scsi: pm80xx: Increase the number of outstanding I/O supported to 1024 - scsi: pm80xx: Fix memory leak during rmmod * CVE-url: https://ubuntu.com/security/CVE-2021-47198 - scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine * CVE-url: https://ubuntu.com/security/CVE-2023-52458 - block: add check that partition length needs to be aligned with block size * CVE-url: https://ubuntu.com/security/CVE-2023-52600 - jfs: fix uaf in jfs_evict_inode * CVE-url: https://ubuntu.com/security/CVE-2023-24023 - Bluetooth: Add debug setting for changing minimum encryption key size - Bluetooth: Add more enc key size check * CVE-url: https://ubuntu.com/security/CVE-2023-52603 - UBSAN: array-index-out-of-bounds in dtSplitRoot * Jammy update: v5.15.81 upstream stable release (LP: #2003130) // CVE-url: https://ubuntu.com/security/CVE-2023-1382 - tipc: set con sock in tipc_conn_alloc - tipc: add an extra conn_get in tipc_conn_alloc * CVE-url: https://ubuntu.com/security/CVE-2024-26600 - phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-buildinfo-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb linux-cloud-tools-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-cloud-tools-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb linux-headers-4.15.0-227-tuxcare.els25_4.15.0-227.238~16.04.1_all.deb linux-headers-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-headers-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb linux-hwe-cloud-tools-4.15.0-227-tuxcare.els25_4.15.0-227.238~16.04.1_amd64.deb linux-hwe-tools-4.15.0-227-tuxcare.els25_4.15.0-227.238~16.04.1_amd64.deb linux-image-unsigned-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-image-unsigned-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb linux-modules-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-modules-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb linux-modules-extra-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-227.238~16.04.1_all.deb linux-tools-4.15.0-227-tuxcare.els25-generic_4.15.0-227.238~16.04.1_amd64.deb linux-tools-4.15.0-227-tuxcare.els25-lowlatency_4.15.0-227.238~16.04.1_amd64.deb

CVEs

CVE-2021-47193
CVE-2023-52603
CVE-2023-1998
CVE-2023-1382
CVE-2023-52458
CVE-2023-52600
CVE-2023-24023
CVE-2024-26600
CVE-2021-47198