Release Info

Advisory: CLSA-2024:1733484110

OS: Ubuntu 16.04 ELS

Public date: 2024-12-06 06:21:52

Project: linux-hwe

Version: 4.15.0-241.252~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2024-1733484110.html

Changelog

[ Ubuntu: 4.15.0-241.252 ] * CVE-url: https://ubuntu.com/security/CVE-2024-49992 - drm: remove all control node code - drm: add managed resources tied to drm_device - drm: Set final_kfree in drm_dev_alloc - drm/plane: add drmm_universal_plane_alloc() - drm: Handle dev->unique with drmm_ - drm: Use drmm_ for drm_dev_init cleanup - drm: manage drm_minor cleanup with drmm_ - drm/stm: Avoid use-after-free issues with crtc and plane * CVE-url: https://ubuntu.com/security/CVE-2023-52531 - wifi: iwlwifi: mvm: Fix a memory corruption issue * CVE-url: https://ubuntu.com/security/CVE-2024-35877 - mm: introduce page_needs_cow_for_dma() for deciding whether cow - x86/mm/pat: fix VM_PAT handling in COW mappings * CVE-url: https://ubuntu.com/security/CVE-2023-52578 - net: bridge: use DEV_STATS_INC() * CVE-url: https://ubuntu.com/security/CVE-2024-42240 - x86/bhi: Avoid warning in #DB handler due to BHI mitigation * CVE-url: https://ubuntu.com/security/CVE-2022-48938 - CDC-NCM: avoid overflow in sanity checking * CVE-url: https://ubuntu.com/security/CVE-2023-52502 - net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() * CVE-url: https://ubuntu.com/security/CVE-2023-52614 - time: Introduce jiffies64_to_msecs() - PM / devfreq: Fix buffer overflow in trans_stat_show * CVE-url: https://ubuntu.com/security/CVE-2024-50067 - uprobe: avoid out-of-bounds memory access of fetching args

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-buildinfo-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-cloud-tools-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-cloud-tools-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-cloud-tools-generic-hwe-16.04_4.15.0.241.176_amd64.deb linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.241.176_amd64.deb linux-generic-hwe-16.04_4.15.0.241.176_amd64.deb linux-headers-4.15.0-241-tuxcare.els39_4.15.0-241.252~16.04.1_all.deb linux-headers-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-headers-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-headers-generic-hwe-16.04_4.15.0.241.176_amd64.deb linux-headers-lowlatency-hwe-16.04_4.15.0.241.176_amd64.deb linux-hwe-cloud-tools-4.15.0-241-tuxcare.els39_4.15.0-241.252~16.04.1_amd64.deb linux-hwe-tools-4.15.0-241-tuxcare.els39_4.15.0-241.252~16.04.1_amd64.deb linux-image-generic-hwe-16.04_4.15.0.241.176_amd64.deb linux-image-lowlatency-hwe-16.04_4.15.0.241.176_amd64.deb linux-image-unsigned-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-image-unsigned-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-lowlatency-hwe-16.04_4.15.0.241.176_amd64.deb linux-modules-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-modules-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-modules-extra-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-241.252~16.04.1_all.deb linux-tools-4.15.0-241-tuxcare.els39-generic_4.15.0-241.252~16.04.1_amd64.deb linux-tools-4.15.0-241-tuxcare.els39-lowlatency_4.15.0-241.252~16.04.1_amd64.deb linux-tools-generic-hwe-16.04_4.15.0.241.176_amd64.deb linux-tools-lowlatency-hwe-16.04_4.15.0.241.176_amd64.deb

CVEs

CVE-2024-42240
CVE-2023-52531
CVE-2024-50067
CVE-2024-35877
CVE-2023-52614
CVE-2023-52578
CVE-2023-52502
CVE-2022-48938
CVE-2024-49992