Release Info

Advisory: CLSA-2025:1736470237

OS: Ubuntu 16.04 ELS

Public date: 2025-01-09 19:50:40

Project: linux

Version: 4.4.0-269.303

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2025-1736470237.html

Changelog

* CVE-url: https://ubuntu.com/security/CVE-2021-47466 - mm, slub: fix potential memoryleak in kmem_cache_open() * CVE-url: https://ubuntu.com/security/CVE-2024-36968 - Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() * Bionic update: upstream stable patchset 2021-06-23 (LP: #1933375) // CVE- url: https://ubuntu.com/security/CVE-2021-47118 - pid: take a reference when initializing `cad_pid` * Bionic update: upstream stable patchset 2022-01-25 (LP: #1959033) // CVE- url: https://ubuntu.com/security/CVE-2021-47086 - phonet/pep: refuse to enable an unbound pipe * CVE-url: https://ubuntu.com/security/CVE-2023-52507 - nfc: nci: assert requested protocol is valid * CVE-url: https://ubuntu.com/security/CVE-2024-44944 - netfilter: ctnetlink: use helper function to calculate expect ID * CVE-url: https://ubuntu.com/security/CVE-2024-35861 - smb: client: fix potential UAF in cifs_debug_files_proc_show() - smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() * CVE-url: https://ubuntu.com/security/CVE-2024-35863 - smb: client: fix potential UAF in smb2_is_valid_oplock_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35864 - smb: client: fix potential UAF in smb2_is_valid_lease_break() * CVE-url: https://ubuntu.com/security/CVE-2024-35867 - smb: client: fix potential UAF in cifs_stats_proc_show() * CVE-url: https://ubuntu.com/security/CVE-2024-35868 - smb: client: fix potential UAF in cifs_stats_proc_write() * CVE-url: https://ubuntu.com/security/CVE-2024-35896 - netfilter: validate user input for expected length * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE- url: https://ubuntu.com/security/CVE-2022-48695 - scsi: mpt3sas: Fix use-after-free warning * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47321 - watchdog: Fix possible use-after-free by calling del_timer_sync() * Bionic update: upstream stable patchset 2021-08-13 (LP: #1939913) // CVE- url: https://ubuntu.com/security/CVE-2021-47310 - net: ti: fix UAF in tlan_remove_one * CVE-url: https://ubuntu.com/security/CVE-2024-27010 - net/sched: Fix mirred deadlock on device recursion * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47353 - udf: Fix NULL pointer dereference in udf_symlink function * CVE-url: https://ubuntu.com/security/CVE-2024-26961 - mac802154: fix llsec key resources release in mac802154_llsec_key_del * CVE-url: https://ubuntu.com/security/CVE-2024-26958 - NFS: Allow multiple commit requests in flight per file - NFS: Fix up commit deadlocks - nfs: fix UAF in direct writes * CVE-url: https://ubuntu.com/security/CVE-2024-50115 - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory * CVE-url: https://ubuntu.com/security/CVE-2024-50148 - Bluetooth: bnep: fix wild-memory-access in proto_unregister * CVE-url: https://ubuntu.com/security/CVE-2024-40910 - ax25: Fix refcount imbalance on inbound connections * CVE-url: https://ubuntu.com/security/CVE-2024-53057 - net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT * CVE-url: https://ubuntu.com/security/CVE-2024-36952 - scsi: lpfc: Move NPIV's transport unregistration to after resource clean up * CVE-url: https://ubuntu.com/security/CVE-2024-50142 - xfrm: validate new SA's prefixlen using SA family when sel.family is unset * CVE-url: https://ubuntu.com/security/CVE-2024-50256 - netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() * CVE-url: https://ubuntu.com/security/CVE-2021-47501 - i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc * CVE-url: https://ubuntu.com/security/CVE-2023-52574 - team: fix null-ptr-deref when team device type is changed * Bionic update: upstream stable patchset 2021-06-01 (LP: #1930472) // CVE- url: https://ubuntu.com/security/CVE-2021-47055 - mtd: require write permissions for locking and badblock ioctls * CVE-url: https://ubuntu.com/security/CVE-2023-52477 - usb: hub: Guard against accesses to uninitialized BOS descriptors * CVE-url: https://ubuntu.com/security/CVE-2023-52475 - Input: powermate - fix use-after-free in powermate_config_complete * CVE-url: https://ubuntu.com/security/CVE-2023-52531 - wifi: iwlwifi: mvm: Fix a memory corruption issue

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-buildinfo-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-cloud-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb linux-cloud-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-cloud-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-cloud-tools-common_4.4.0-269.303_all.deb linux-cloud-tools-generic_4.4.0.269.303_amd64.deb linux-cloud-tools-lowlatency_4.4.0.269.303_amd64.deb linux-crashdump_4.4.0.269.303_amd64.deb linux-doc_4.4.0-269.303_all.deb linux-generic_4.4.0.269.303_amd64.deb linux-headers-4.4.0-269-tuxcare.els40_4.4.0-269.303_all.deb linux-headers-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-headers-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-headers-generic_4.4.0.269.303_amd64.deb linux-headers-lowlatency_4.4.0.269.303_amd64.deb linux-image-generic_4.4.0.269.303_amd64.deb linux-image-lowlatency_4.4.0.269.303_amd64.deb linux-image-unsigned-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-image-unsigned-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-libc-dev_4.4.0-269.303_amd64.deb linux-lowlatency_4.4.0.269.303_amd64.deb linux-modules-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-modules-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-modules-extra-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-source_4.4.0.269.303_all.deb linux-source-4.4.0_4.4.0-269.303_all.deb linux-tools-4.4.0-269-tuxcare.els40_4.4.0-269.303_amd64.deb linux-tools-4.4.0-269-tuxcare.els40-generic_4.4.0-269.303_amd64.deb linux-tools-4.4.0-269-tuxcare.els40-lowlatency_4.4.0-269.303_amd64.deb linux-tools-common_4.4.0-269.303_all.deb linux-tools-generic_4.4.0.269.303_amd64.deb linux-tools-host_4.4.0-269.303_all.deb linux-tools-lowlatency_4.4.0.269.303_amd64.deb

CVEs

CVE-2021-47310
CVE-2021-47321
CVE-2024-35896
CVE-2024-26961
CVE-2024-35863
CVE-2022-48695
CVE-2023-52507
CVE-2024-35861
CVE-2024-53057
CVE-2023-52477
CVE-2023-52475
CVE-2024-50142
CVE-2024-40910
CVE-2024-50256
CVE-2021-47118
CVE-2021-47055
CVE-2024-26958
CVE-2024-27010
CVE-2024-50148
CVE-2024-50115
CVE-2023-52574
CVE-2021-47353
CVE-2024-35864
CVE-2021-47501
CVE-2024-36968
CVE-2024-36952
CVE-2021-47466
CVE-2024-44944
CVE-2021-47086
CVE-2024-35868
CVE-2023-52531
CVE-2024-35867