Advisory: CLSA-2025:1758009836
OS: Ubuntu 16.04 ELS
Public date: 2025-09-16 08:03:58.765859
Project: linux
Version: 4.4.0-278.312
Errata link: https://errata.tuxcare.com/els_os/ubuntu16.04els/CLSA-2025-1758009836.html
* Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE- url: https://ubuntu.com/security/CVE-2021-34981 - Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails * CVE-url: https://ubuntu.com/security/CVE-2025-37797 - net_sched: hfsc: Fix a UAF vulnerability in class handling * CVE-url: https://ubuntu.com/security/CVE-2024-57996 // CVE-url: https://ubuntu.com/security/CVE-2025-37752 - net_sched: sch_sfq: move the limit validation * Focal update: v5.4.285 upstream stable release (LP: #2089233) // CVE-2024-50202 // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: propagate directory read errors from nilfs_find_entry() * Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url: https://ubuntu.com/security/CVE-2024-50202 - nilfs2: Remove check for PageError - nilfs2: return the mapped address from nilfs_get_page() * CVE-url: https://ubuntu.com/security/CVE-2024-50202 - make ext2_get_page() and friends work without external serialization * Bionic update: upstream stable patchset 2021-08-03 (LP: #1938824) // CVE- url: https://ubuntu.com/security/CVE-2021-47345 - RDMA/cma: Fix rdma_resolve_route() memory leak * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53131 - nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint * Focal update: v5.4.287 upstream stable release (LP: #2095145) // CVE-url: https://ubuntu.com/security/CVE-2024-53130 - nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint * CVE-url: https://ubuntu.com/security/CVE-2025-37798 - codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() * CVE-url: https://ubuntu.com/security/CVE-2025-21640 - sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-57913 - usb: gadget: f_fs: Remove WARN_ON in functionfs_bind * CVE-url: https://ubuntu.com/security/CVE-2025-21638 - sctp: sysctl: auth_enable: avoid using current->nsproxy * CVE-url: https://ubuntu.com/security/CVE-2024-50195 - posix-clock: Fix missing timespec64 check in pc_clock_settime() * CVE-url: https://ubuntu.com/security/CVE-2024-50299 - sctp: properly validate chunk size in sctp_sf_ootb() * CVE-url: https://ubuntu.com/security/CVE-2024-41016 - ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() * CVE-url: https://ubuntu.com/security/CVE-2024-50287 - media: v4l2-tpg: prevent the risk of a division by zero * CVE-url: https://ubuntu.com/security/CVE-2024-49965 - ocfs2: remove unreasonable unlock in ocfs2_read_blocks * CVE-url: https://ubuntu.com/security/CVE-2024-50179 - ceph: remove the incorrect Fw reference check when dirtying pages * CVE-url: https://ubuntu.com/security/CVE-2024-40953 - KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() * CVE-url: https://ubuntu.com/security/CVE-2024-50290 - media: cx24116: prevent overflows on SNR calculus * CVE-url: https://ubuntu.com/security/CVE-2024-49877 - ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate * CVE-url: https://ubuntu.com/security/CVE-2024-50008 - wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() * CVE-url: https://ubuntu.com/security/CVE-2024-49959 - jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error * CVE-url: https://ubuntu.com/security/CVE-2024-49963 - mailbox: bcm2835: Fix timeout during suspend mode * CVE-url: https://ubuntu.com/security/CVE-2024-47709 - can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). * CVE-url: https://ubuntu.com/security/CVE-2025-21699 - gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag * CVE-url: https://ubuntu.com/security/CVE-2025-21689 - USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() * CVE-url: https://ubuntu.com/security/CVE-2024-53101 - fs: Fix uninitialized value issue in from_kuid and from_kgid
Update command: apt-get update apt-get --only-upgrade install linux*
linux-buildinfo-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-buildinfo-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-cloud-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb linux-cloud-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-cloud-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-cloud-tools-common_4.4.0-278.312_all.deb linux-doc_4.4.0-278.312_all.deb linux-headers-4.4.0-278-tuxcare.els49_4.4.0-278.312_all.deb linux-headers-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-headers-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-image-unsigned-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-image-unsigned-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-libc-dev_4.4.0-278.312_amd64.deb linux-modules-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-modules-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-modules-extra-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-source-4.4.0_4.4.0-278.312_all.deb linux-tools-4.4.0-278-tuxcare.els49_4.4.0-278.312_amd64.deb linux-tools-4.4.0-278-tuxcare.els49-generic_4.4.0-278.312_amd64.deb linux-tools-4.4.0-278-tuxcare.els49-lowlatency_4.4.0-278.312_amd64.deb linux-tools-common_4.4.0-278.312_all.deb linux-tools-host_4.4.0-278.312_all.deb