Ubuntu provides important Linux kernel updates for all supported versions

Recently, Canonical released a series of important Linux kernel updates for all supported Ubuntu releases to address more than 50 security vulnerabilities affecting various kernel components.

The new kernel security update is now available for 32-bit and 64-bit Ubuntu 18.04 LTS (Bionic Beaver), Ubuntu 16.04 LTS (Xenial Xerus) and Ubuntu 14.04 LTS (Trusty Tahr) operating systems, as well as Raspberry Pi 2, Amazon Web Services (AWS) ) Ubuntu use in systems, Google Cloud Platform (GCP) systems, and other cloud environments.

According to the security recommendations issued by Canonical (1,  2 and 3), this update fixes 18 security vulnerabilities in the Linux 4.15 kernel of Ubuntu 18.04 LTS, 9 security vulnerabilities in the Linux 4.4 kernel of Ubuntu 16.04 LTS, And 53 security vulnerabilities in the Linux 3.13 kernel of Ubuntu 14.04 LTS.

Linux kernel updates

Image: securityaffairs

Security vulnerabilities have been fixed in the XFS file system implementation of the Linux kernel, the EXT4 file system implementation, the procfs file system, the JFS file system implementation, the KVM implementation, the generic VESA framebuffer driver, and the implementation of the Linux kernel random seed data.

It also fixes stack-based buffer overflows in CDROM driver implementations, race conditions in socket handling code, and information leaks in generic SCSI drivers. It also fixes an information disclosure vulnerability in the ACPI implementation of the Linux kernel.

Users are advised to update immediately.

Canonical urges all Ubuntu 18.04 LTS, Ubuntu 16.04 LTS and Ubuntu 14.04 LTS users to follow the instructions. Kernel updates are also available for Ubuntu 16.04.5 LTS users running the Bionic HWE kernel and Ubuntu 14.04.5 LTS users using the Xenial HWE kernel.

Ubuntu 18.04 LTS 64-bit users must update to linux-image 4.15.0.33.35, Ubuntu 16.04 LTS 32-bit and 64-bit need to be updated to linux-image 4.4.0.134.140, while Ubuntu 14.04 LTS users must update to linux-image 3.13.0.157.167.