Release Info

Advisory: CLSA-2024:1718951563

OS: Ubuntu 16.04 ELS

Public date: 2024-06-21 02:32:45

Project: linux-hwe

Version: 4.15.0-230.241~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2024-1718951563.html

Changelog

[ Ubuntu: 4.15.0-230.241 ] * CVE-url: https://ubuntu.com/security/CVE-2024-26764 - aio: remove an outdated BUG_ON and comment in aio_complete - aio: remove the extra get_file/fput pair in io_submit_one - aio: refactor read/write iocb setup - fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio * CVE-url: https://ubuntu.com/security/CVE-2024-36971 - net: fix __dst_negative_advice() race * CVE-url: https://ubuntu.com/security/CVE-2024-26840 - cachefiles: fix memory leak in cachefiles_add_cache() * CVE-url: https://ubuntu.com/security/CVE-2021-47543 - perf report: Fix memory leaks around perf_tip() * CVE-url: https://ubuntu.com/security/CVE-2024-27405 - usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call - usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs * CVE-url: https://ubuntu.com/security/CVE-2024-26779 - wifi: mac80211: fix race condition on enabling fast-xmit * CVE-url: https://ubuntu.com/security/CVE-2024-26772 - ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() * CVE-url: https://ubuntu.com/security/CVE-2024-26845 - scsi: target: core: Add TMF to tmr_list handling * CVE-url: https://ubuntu.com/security/CVE-2021-47063 - drm: bridge/panel: Cleanup connector on bridge detach * CVE-url: https://ubuntu.com/security/CVE-2024-26804 - net: ip_tunnel: prevent perpetual headroom growth * CVE-url: https://ubuntu.com/security/CVE-2024-27410 - wifi: nl80211: reject iftype change with mesh ID change * CVE-url: https://ubuntu.com/security/CVE-2024-26793 - gtp: fix use-after-free and null-ptr-deref in gtp_newlink() * CVE-url: https://ubuntu.com/security/CVE-2024-26754 - gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() * CVE-url: https://ubuntu.com/security/CVE-2024-26839 - IB/hfi1: Fix a memleak in init_credit_return * CVE-url: https://ubuntu.com/security/CVE-2024-26773 - ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() * CVE-url: https://ubuntu.com/security/CVE-2024-27413 - efi/capsule-loader: fix incorrect allocation size * CVE-url: https://ubuntu.com/security/CVE-2024-26736 - afs: Increase buffer size in afs_update_volume_status() * CVE-url: https://ubuntu.com/security/CVE-2024-26777 - fbdev: sis: Error out if pixclock equals zero * CVE-url: https://ubuntu.com/security/CVE-2024-26778 - fbdev: savage: Error out if pixclock equals zero * CVE-url: https://ubuntu.com/security/CVE-2024-26763 - dm-crypt: don't modify the data when using authenticated encryption * CVE-url: https://ubuntu.com/security/CVE-2024-26733 - arp: Prevent overflow in arp_req_get(). * CVE-url: https://ubuntu.com/security/CVE-2024-26791 - btrfs: dev-replace: properly validate device names

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-buildinfo-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb linux-cloud-tools-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-cloud-tools-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb linux-headers-4.15.0-230-tuxcare.els28_4.15.0-230.241~16.04.1_all.deb linux-headers-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-headers-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb linux-hwe-cloud-tools-4.15.0-230-tuxcare.els28_4.15.0-230.241~16.04.1_amd64.deb linux-hwe-tools-4.15.0-230-tuxcare.els28_4.15.0-230.241~16.04.1_amd64.deb linux-image-unsigned-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-image-unsigned-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb linux-modules-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-modules-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb linux-modules-extra-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-230.241~16.04.1_all.deb linux-tools-4.15.0-230-tuxcare.els28-generic_4.15.0-230.241~16.04.1_amd64.deb linux-tools-4.15.0-230-tuxcare.els28-lowlatency_4.15.0-230.241~16.04.1_amd64.deb

CVEs

CVE-2024-36971
CVE-2024-26840
CVE-2024-26733
CVE-2024-26754
CVE-2021-47063
CVE-2024-26764
CVE-2024-26763
CVE-2024-26777
CVE-2024-26779
CVE-2024-26804
CVE-2024-26839
CVE-2024-26736
CVE-2024-26778
CVE-2024-27410
CVE-2024-27413
CVE-2024-26793
CVE-2024-27405
CVE-2024-26845
CVE-2024-26791
CVE-2024-26772
CVE-2021-47543
CVE-2024-26773