Release Info

Advisory: CLSA-2025:1757965001

OS: Ubuntu 16.04 ELS

Public date: 2025-09-15 19:36:43.180264

Project: linux-hwe

Version: 4.15.0-251.262~16.04.1

Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2025-1757965001.html

Changelog

[ Ubuntu: 4.15.0-251.262 ] * CVE-url: https://ubuntu.com/security/CVE-2025-38000 - sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() * CVE-url: https://ubuntu.com/security/CVE-2024-57996 // CVE-url: https://ubuntu.com/security/CVE-2025-37752 - net_sched: sch_sfq: move the limit validation * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-50202 // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: propagate directory read errors from nilfs_find_entry() * Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: Remove check for PageError - nilfs2: return the mapped address from nilfs_get_page() * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53131 - nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53130 - nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint * CVE-url: https://ubuntu.com/security/CVE-2022-49179 - block, bfq: don't move oom_bfqq * CVE-url: https://ubuntu.com/security/CVE-2022-49176 - bfq: fix use-after-free in bfq_dispatch_request * CVE-url: https://ubuntu.com/security/CVE-2025-21956 - drm/amd/display: Assign normalized_pix_clk when color depth = 14 * CVE-url: https://ubuntu.com/security/CVE-2025-21992 - HID: ignore non-functional sensor in HP 5MP Camera * CVE-url: https://ubuntu.com/security/CVE-2025-22021 - netfilter: socket: Lookup orig tuple for IPv6 SNAT * CVE-url: https://ubuntu.com/security/CVE-2025-22073 - spufs: fix a leak on spufs_new_file() failure * CVE-url: https://ubuntu.com/security/CVE-2025-22079 - ocfs2: validate l_tree_depth to avoid out-of-bounds access * CVE-url: https://ubuntu.com/security/CVE-2025-22086 - RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow * CVE-url: https://ubuntu.com/security/CVE-2025-21722 - nilfs2: do not force clear folio if buffer is referenced * CVE-url: https://ubuntu.com/security/CVE-2025-22018 - atm: Fix NULL pointer dereference * CVE-url: https://ubuntu.com/security/CVE-2024-58071 - team: prevent adding a device which is already a team device lower * CVE-url: https://ubuntu.com/security/CVE-2024-58063 - wifi: rtlwifi: fix memory leaks and invalid access at probe error path * CVE-url: https://ubuntu.com/security/CVE-2024-58052 - drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table * CVE-url: https://ubuntu.com/security/CVE-2024-58058 - ubifs: skip dumping tnc tree when zroot is null * CVE-url: https://ubuntu.com/security/CVE-2025-21859 - USB: gadget: f_midi: f_midi_complete to call queue_work * CVE-url: https://ubuntu.com/security/CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-57922 - drm/amd/display: Add check for granularity in dml ceil/floor helpers * CVE-url: https://ubuntu.com/security/CVE-2024-57913 - usb: gadget: f_fs: Remove WARN_ON in functionfs_bind * CVE-url: https://ubuntu.com/security/CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-50195 - posix-clock: Fix missing timespec64 check in pc_clock_settime() * CVE-url: https://ubuntu.com/security/CVE-2024-50299 - sctp: properly validate chunk size in sctp_sf_ootb() * CVE-url: https://ubuntu.com/security/CVE-2024-50273 - btrfs: reinitialize delayed ref list after deleting it from the list * CVE-url: https://ubuntu.com/security/CVE-2024-41016 - ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2024-50287 - media: v4l2-tpg: prevent the risk of a division by zero * CVE-url: https://ubuntu.com/security/CVE-2024-49965 - ocfs2: remove unreasonable unlock in ocfs2_read_blocks * CVE-url: https://ubuntu.com/security/CVE-2024-50179 - ceph: remove the incorrect Fw reference check when dirtying pages * CVE-url: https://ubuntu.com/security/CVE-2024-40953 - KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() * CVE-url: https://ubuntu.com/security/CVE-2024-50290 - media: cx24116: prevent overflows on SNR calculus * CVE-url: https://ubuntu.com/security/CVE-2024-49877 - ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate * CVE-url: https://ubuntu.com/security/CVE-2024-49938 - wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit * CVE-url: https://ubuntu.com/security/CVE-2024-50008 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() * CVE-url: https://ubuntu.com/security/CVE-2024-47672 - wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead * CVE-url: https://ubuntu.com/security/CVE-2024-49959 - jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error * CVE-url: https://ubuntu.com/security/CVE-2024-49963 - mailbox: bcm2835: Fix timeout during suspend mode * CVE-url: https://ubuntu.com/security/CVE-2024-47709 - can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). * CVE-url: https://ubuntu.com/security/CVE-2025-21699 - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag * CVE-url: https://ubuntu.com/security/CVE-2025-21689 - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() * CVE-url: https://ubuntu.com/security/CVE-2024-38544 - RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt * CVE-url: https://ubuntu.com/security/CVE-2024-50251 - netfilter: nft_payload: sanitize offset and length before calling skb_checksum() * CVE-url: https://ubuntu.com/security/CVE-2024-49949 - udp: add udp gso - net: avoid potential underflow in qdisc_pkt_len_init() with UFO * CVE-url: https://ubuntu.com/security/CVE-2024-53101 - fs: Fix uninitialized value issue in from_kuid and from_kgid * CVE-url: https://ubuntu.com/security/CVE-2023-52975 - scsi: iscsi: Move pool freeing - scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-56748 - scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() * CVE-url: https://ubuntu.com/security/CVE-2025-37797 - net_sched: hfsc: Fix a UAF vulnerability in class handling * CVE-url: https://ubuntu.com/security/CVE-2024-38541 - of: module: add buffer overflow check in of_modalias() * Miscellaneous upstream changes - fixup! UBUNTU: [Config] updateconfigs for NFSD_FAULT_INJECTION

Update

Update command: apt-get update apt-get --only-upgrade install linux-hwe*

Packages list

linux-buildinfo-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-buildinfo-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb linux-cloud-tools-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-cloud-tools-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb linux-headers-4.15.0-251-tuxcare.els49_4.15.0-251.262~16.04.1_all.deb linux-headers-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-headers-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb linux-hwe-cloud-tools-4.15.0-251-tuxcare.els49_4.15.0-251.262~16.04.1_amd64.deb linux-hwe-tools-4.15.0-251-tuxcare.els49_4.15.0-251.262~16.04.1_amd64.deb linux-image-unsigned-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-image-unsigned-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb linux-modules-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-modules-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb linux-modules-extra-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-source-4.15.0_4.15.0-251.262~16.04.1_all.deb linux-tools-4.15.0-251-tuxcare.els49-generic_4.15.0-251.262~16.04.1_amd64.deb linux-tools-4.15.0-251-tuxcare.els49-lowlatency_4.15.0-251.262~16.04.1_amd64.deb

CVEs

CVE-2024-56748
CVE-2024-50273
CVE-2024-41016
CVE-2024-53101
CVE-2024-50251
CVE-2024-53130
CVE-2024-49877
CVE-2024-58063
CVE-2024-58071
CVE-2025-22079
CVE-2025-22073
CVE-2025-22021
CVE-2025-21992
CVE-2024-49949
CVE-2024-49963
CVE-2024-50299
CVE-2024-50195
CVE-2024-57913
CVE-2024-50202
CVE-2024-50008
CVE-2024-49938
CVE-2025-21638
CVE-2024-57922
CVE-2022-49176
CVE-2025-21722
CVE-2025-22086
CVE-2024-40953
CVE-2024-38544
CVE-2022-49179
CVE-2025-37797
CVE-2024-47672
CVE-2023-52975
CVE-2024-57996
CVE-2025-21689
CVE-2025-21699
CVE-2025-21640
CVE-2024-47709
CVE-2024-53131
CVE-2024-50290
CVE-2024-49965
CVE-2024-50287
CVE-2025-38000
CVE-2024-49959
CVE-2025-21859
CVE-2024-58058
CVE-2024-58052
CVE-2025-21956
CVE-2025-37752
CVE-2025-22018
CVE-2024-50179
CVE-2024-38541