Release Info

Advisory: CLSA-2025:1742321198

OS: Ubuntu 16.04 ELS

Public date: 2025-03-18 14:06:41

Project: linux-hwe

Version: 4.15.0-245.256~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2025-1742321198.html

Changelog

[ Ubuntu: 4.15.0-245.256 ] * CVE-url: https://ubuntu.com/security/CVE-2024-50180 - fbdev: sisfb: Fix strbuf array overflow * CVE-url: https://ubuntu.com/security/CVE-2023-52522 - net: fix possible store tearing in neigh_periodic_work() * CVE-url: https://ubuntu.com/security/CVE-2024-40911 - wifi: cfg80211: Lock wiphy in cfg80211_get_station * CVE-url: https://ubuntu.com/security/CVE-2024-43863 - drm/vmwgfx: Fix a deadlock in dma buf fence polling * CVE-url: https://ubuntu.com/security/CVE-2024-44931 - gpio: prevent potential speculation leaks in gpio_device_get_desc() * CVE-url: https://ubuntu.com/security/CVE-2024-23848 - media: cec: cec-api: add locking in cec_release() - media: cec: core: avoid recursive cec_claim_log_addrs * CVE-url: https://ubuntu.com/security/CVE-2024-50229 - nilfs2: fix potential deadlock with newly created symlinks * CVE-url: https://ubuntu.com/security/CVE-2024-50171 - net: systemport: fix potential memory leak in bcm_sysport_xmit() * CVE-url: https://ubuntu.com/security/CVE-2024-50233 - staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() * CVE-url: https://ubuntu.com/security/CVE-2024-50134 - drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA * CVE-url: https://ubuntu.com/security/CVE-2024-44938 - jfs: Fix shift-out-of-bounds in dbDiscardAG * CVE-url: https://ubuntu.com/security/CVE-2024-50117 - drm/amd: Guard against bad data for ATIF ACPI method * CVE-url: https://ubuntu.com/security/CVE-2024-49902 - jfs: check if leafidx greater than num leaves per dmap tree * CVE-url: https://ubuntu.com/security/CVE-2023-52799 - jfs: fix array-index-out-of-bounds in dbFindLeaf * CVE-url: https://ubuntu.com/security/CVE-2024-49966 - ocfs2: cancel dqi_sync_work before freeing oinfo * CVE-url: https://ubuntu.com/security/CVE-2024-50267 - USB: serial: io_edgeport: fix use after free in debug printk * CVE-url: https://ubuntu.com/security/CVE-2024-50230 - nilfs2: fix kernel bug due to missing clearing of checked flag * CVE-url: https://ubuntu.com/security/CVE-2024-50302 - HID: core: zero-initialize the report buffer * CVE-url: https://ubuntu.com/security/CVE-2024-50278 - dm cache: fix out-of-bounds access to the dirty bitset when resizing - dm cache: fix potential out-of-bounds access on the first resume * CVE-url: https://ubuntu.com/security/CVE-2024-50234 - wifi: iwlegacy: Clear stale interrupts before resuming device * CVE-url: https://ubuntu.com/security/CVE-2024-50301 - security/keys: fix slab-out-of-bounds in key_task_permission * CVE-url: https://ubuntu.com/security/CVE-2024-50143 - overflow: Add __must_check attribute to check_*() helpers - compiler.h: drop fallback overflow checkers - overflow: Allow mixed type arguments - udf: fix uninit-value use in udf_get_fileshortad * CVE-url: https://ubuntu.com/security/CVE-2024-53061 - media: s5p-jpeg: prevent buffer overflows * CVE-url: https://ubuntu.com/security/CVE-2024-57798 - drm/dp-mst-helper: Remove hotplug callback - drm/dp_mst: Remove huge conditional in drm_dp_mst_handle_up_req() - drm/dp_mst: Refactor drm_dp_mst_handle_up_req() - drm/dp_mst: Rename drm_dp_add_port and drm_dp_update_port - drm/dp_mst: Handle UP requests asynchronously - drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() * CVE-url: https://ubuntu.com/security/CVE-2023-52854 - padata: make padata_do_parallel find alternate callback CPU - padata: allocate workqueue internally - crypto: pcrypt - remove padata cpumask notifier - padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible - padata: use separate workqueues for parallel and serial work - padata: unbind parallel jobs from specific CPUs - workqueue: Make alloc/apply/free_workqueue_attrs() static - workqueue: Remove GPF argument from alloc_workqueue_attrs() - workqueue: unconfine alloc/apply/free_workqueue_attrs() - crypto: pcrypt - Avoid deadlock by using per-instance padata queues - crypto: aead - pass instance to crypto_grab_aead() - crypto: pcrypt - simplify error handling in pcrypt_create_aead() - padata: Fix refcnt handling in padata_free_shell() * CVE-url: https://ubuntu.com/security/CVE-2024-53164 - net: sched: fix ordering of qlen adjustment * CVE-url: https://ubuntu.com/security/CVE-2024-47809 - dlm: fix possible lkb_resource null dereference * CVE-url: https://ubuntu.com/security/CVE-2021-47342 - ext4: fix memory leak in ext4_fill_super - ext4: fix possible UAF when remounting r/o a mmp-protected file system * CVE-url: https://ubuntu.com/security/CVE-2024-53179 - smb: client: fix use-after-free of signing key * Miscellaneous upstream changes - drm/amd/amdgpu: Fix GPR read from debugfs (v2)

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb linux-cloud-tools-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-cloud-tools-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb linux-headers-4.15.0-245-tuxcare.els43_4.15.0-245.256~16.04.1_all.deb linux-headers-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-headers-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43_4.15.0-245.256~16.04.1_amd64.deb linux-hwe-tools-4.15.0-245-tuxcare.els43_4.15.0-245.256~16.04.1_amd64.deb linux-image-unsigned-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-image-unsigned-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb linux-modules-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-modules-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb linux-modules-extra-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-245.256~16.04.1_all.deb linux-tools-4.15.0-245-tuxcare.els43-generic_4.15.0-245.256~16.04.1_amd64.deb linux-tools-4.15.0-245-tuxcare.els43-lowlatency_4.15.0-245.256~16.04.1_amd64.deb

CVEs

CVE-2024-50267
CVE-2024-50230
CVE-2024-49902
CVE-2024-57798
CVE-2024-50233
CVE-2024-50143
CVE-2024-50302
CVE-2024-50234
CVE-2024-43863
CVE-2023-52854
CVE-2023-52799
CVE-2024-50171
CVE-2023-52522
CVE-2024-47809
CVE-2024-44931
CVE-2024-50278
CVE-2024-50180
CVE-2024-50229
CVE-2024-50134
CVE-2024-44938
CVE-2024-53164
CVE-2024-23848
CVE-2024-40911
CVE-2024-50117
CVE-2024-49966
CVE-2024-53061
CVE-2021-47342
CVE-2024-53179
CVE-2024-50301