Release Info

Advisory: CLSA-2025:1753083608

OS: Ubuntu 18.04 ELS

Public date: 2025-07-21 07:39:58

Project: linux

Version: 4.15.0-249.260

Errata link: https://errata.tuxcare.com/els_os/ubuntu18.04els/CLSA-2025-1753083608.html

Changelog

* Focal update: v5.4.292 upstream stable release (LP: #2109357) // CVE-url: https://ubuntu.com/security/CVE-2025-37937 - objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds() * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53197 - ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices * CVE-url: https://ubuntu.com/security/CVE-2024-46787 - userfaultfd: fix checks for huge PMDs * CVE-url: https://ubuntu.com/security/CVE-2025-37798 - sch_drr: make drr_qlen_notify() idempotent - sch_hfsc: make hfsc_qlen_notify() idempotent - sch_qfq: make qfq_qlen_notify() idempotent - codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-50116 // CVE-url: https://ubuntu.com/security/CVE-2024-50116 - nilfs2: fix kernel bug due to missing clearing of buffer delay flag * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-49958 // CVE-url: https://ubuntu.com/security/CVE-2024-49958 - ocfs2: reserve space for inline xattr before attaching reflink tree * Focal update: v5.4.286 upstream stable release (LP: #2089558) // CVE-url: https://ubuntu.com/security/CVE-2021-47195 - spi: fix use-after-free of the add_lock mutex * CVE-url: https://ubuntu.com/security/CVE-2021-47469 - spi: Fix deadlock when adding SPI controllers on SPI buses * CVE-url: https://ubuntu.com/security/CVE-2025-39735 - jfs: fix slab-out-of-bounds read in ea_get() * CVE-url: https://ubuntu.com/security/CVE-2025-22020 - memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove * CVE-url: https://ubuntu.com/security/CVE-2025-22004 - net: atm: fix use after free in lec_send() * CVE-url: https://ubuntu.com/security/CVE-2025-39688 - nfsd: allow SC_STATUS_FREEABLE when searching via nfs4_lookup_stateid() * CVE-url: https://ubuntu.com/security/CVE-2022-49892 - ftrace: Fix use-after-free for dynamic ftrace_ops * CVE-url: https://ubuntu.com/security/CVE-2021-47293 - net/sched: act_skbmod: Skip non-Ethernet packets * CVE-url: https://ubuntu.com/security/CVE-2024-50106 - nfsd: simplify nfs4_put_deleg_lease calls - nfsd: factor out common delegation-destruction code - nfsd: Fix race to FREE_STATEID and cl_revoked - nfsd: don't call functions with side-effecting inside WARN_ON() - nfsd: remove fault injection code - nfsd: avoid race after unhash_delegation_locked() - nfsd4: don't set lock stateid's sc_type to CLOSED - nfsd: split sc_status out of sc_type - nfsd: fix race between laundromat and free_stateid * CVE-url: https://ubuntu.com/security/CVE-2024-57982 - xfrm: state: fix out-of-bounds read during lookup * CVE-url: https://ubuntu.com/security/CVE-2023-52588 - f2fs: fix to tag gcing flag on page during block migration * Miscellaneous Ubuntu changes - [Config] updateconfigs for NFSD_FAULT_INJECTION

Update

Update command: apt-get update apt-get --only-upgrade install linux*

Packages list

linux-buildinfo-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-buildinfo-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-cloud-tools-4.15.0-249-tuxcare.els37_4.15.0-249.260_amd64.deb linux-cloud-tools-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-cloud-tools-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-cloud-tools-common_4.15.0-249.260_all.deb linux-doc_4.15.0-249.260_all.deb linux-headers-4.15.0-249-tuxcare.els37_4.15.0-249.260_all.deb linux-headers-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-headers-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-image-unsigned-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-image-unsigned-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-libc-dev_4.15.0-249.260_amd64.deb linux-modules-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-modules-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-modules-extra-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-source-4.15.0_4.15.0-249.260_all.deb linux-tools-4.15.0-249-tuxcare.els37_4.15.0-249.260_amd64.deb linux-tools-4.15.0-249-tuxcare.els37-generic_4.15.0-249.260_amd64.deb linux-tools-4.15.0-249-tuxcare.els37-lowlatency_4.15.0-249.260_amd64.deb linux-tools-common_4.15.0-249.260_all.deb linux-tools-host_4.15.0-249.260_all.deb

CVEs

CVE-2024-50106
CVE-2021-47469
CVE-2024-49958
CVE-2024-50116
CVE-2024-53197
CVE-2025-22020
CVE-2024-57982
CVE-2023-52588
CVE-2025-37937
CVE-2025-22004
CVE-2025-39735