Ubuntu Security Advisories

USN-7451-1: Linux kernel vulnerabilities

2 weeks 3 days ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - TTY drivers; - UFS subsystem; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - Ext4 file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - Network file system (NFS) superblock; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Network namespace; - Netfilter; - Network traffic control; - Network sockets; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - Kernel thread helper (kthread); - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Netlink; - Packet sockets; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-49914, CVE-2024-53158, CVE-2024-50225, CVE-2024-50224, CVE-2024-53139, CVE-2024-56720, CVE-2024-53680, CVE-2024-56650, CVE-2024-53113, CVE-2024-53138, CVE-2024-53131, CVE-2024-56614, CVE-2024-56586, CVE-2024-50095, CVE-2024-56578, CVE-2024-50131, CVE-2024-56748, CVE-2024-50280, CVE-2024-56637, CVE-2024-57850, CVE-2024-56651, CVE-2024-52332, CVE-2024-56707, CVE-2024-53166, CVE-2024-47794, CVE-2024-53118, CVE-2024-50099, CVE-2024-53089, CVE-2024-50216, CVE-2024-50292, CVE-2024-53047, CVE-2024-56627, CVE-2024-50108, CVE-2024-50289, CVE-2024-56672, CVE-2024-50291, CVE-2024-56785, CVE-2024-53119, CVE-2024-50152, CVE-2024-56589, CVE-2024-50229, CVE-2024-53221, CVE-2024-53157, CVE-2024-50201, CVE-2024-56679, CVE-2024-50125, CVE-2024-56701, CVE-2024-50128, CVE-2024-53230, CVE-2024-56576, CVE-2024-50215, CVE-2024-56606, CVE-2024-50146, CVE-2024-50272, CVE-2024-53233, CVE-2024-56782, CVE-2024-50009, CVE-2024-56604, CVE-2024-50258, CVE-2024-50140, CVE-2024-50232, CVE-2024-53107, CVE-2024-50218, CVE-2024-50221, CVE-2024-50143, CVE-2024-56739, CVE-2024-53201, CVE-2024-50130, CVE-2024-50141, CVE-2024-53134, CVE-2024-53173, CVE-2024-50063, CVE-2024-53060, CVE-2024-53093, CVE-2024-50162, CVE-2024-50111, CVE-2024-50153, CVE-2024-53198, CVE-2024-50039, CVE-2024-50180, CVE-2024-56568, CVE-2024-56746, CVE-2024-50263, CVE-2024-56575, CVE-2024-50040, CVE-2024-56681, CVE-2024-50210, CVE-2024-56566, CVE-2024-56611, CVE-2024-53188, CVE-2024-56641, CVE-2024-50240, CVE-2024-50252, CVE-2024-56603, CVE-2024-56539, CVE-2024-53187, CVE-2024-50223, CVE-2024-53117, CVE-2024-50268, CVE-2024-49921, CVE-2024-57876, CVE-2024-56579, CVE-2024-49972, CVE-2024-50239, CVE-2024-50148, CVE-2024-50078, CVE-2024-50061, CVE-2024-56626, CVE-2024-50286, CVE-2024-56543, CVE-2024-50088, CVE-2024-50069, CVE-2024-41935, CVE-2024-57843, CVE-2024-53059, CVE-2024-56605, CVE-2024-53234, CVE-2024-53121, CVE-2024-56772, CVE-2024-53120, CVE-2024-50171, CVE-2024-56780, CVE-2024-47143, CVE-2024-50065, CVE-2024-50124, CVE-2024-56691, CVE-2024-50056, CVE-2024-56645, CVE-2024-53200, CVE-2024-50295, CVE-2024-56551, CVE-2024-56565, CVE-2024-50118, CVE-2024-50206, CVE-2024-50116, CVE-2024-56545, CVE-2024-50211, CVE-2024-50025, CVE-2024-53129, CVE-2024-49569, CVE-2024-56781, CVE-2024-56574, CVE-2024-50244, CVE-2024-50103, CVE-2024-50112, CVE-2024-47726, CVE-2024-53154, CVE-2024-53090, CVE-2024-50064, CVE-2024-50231, CVE-2024-56572, CVE-2024-56649, CVE-2024-50195, CVE-2024-49899, CVE-2024-53050, CVE-2024-53063, CVE-2025-21702, CVE-2024-50233, CVE-2024-49920, CVE-2024-44955, CVE-2024-50049, CVE-2024-50087, CVE-2024-56631, CVE-2024-50196, CVE-2024-50183, CVE-2024-50115, CVE-2024-53148, CVE-2024-53083, CVE-2024-50220, CVE-2024-53076, CVE-2024-50075, CVE-2024-53171, CVE-2024-50237, CVE-2024-50251, CVE-2024-50245, CVE-2024-56581, CVE-2024-50032, CVE-2024-56642, CVE-2024-50051, CVE-2024-56635, CVE-2024-56596, CVE-2024-56726, CVE-2024-57798, CVE-2024-50235, CVE-2024-50248, CVE-2024-53237, CVE-2024-50120, CVE-2024-56629, CVE-2024-56776, CVE-2024-47809, CVE-2024-50024, CVE-2024-50189, CVE-2024-50283, CVE-2024-53160, CVE-2024-50304, CVE-2024-53178, CVE-2024-56698, CVE-2024-50090, CVE-2024-50070, CVE-2025-21701, CVE-2024-53126, CVE-2024-53087, CVE-2024-56773, CVE-2024-50194, CVE-2024-56561, CVE-2024-50154, CVE-2024-50158, CVE-2024-50147, CVE-2024-53133, CVE-2024-50187, CVE-2024-53180, CVE-2024-50279, CVE-2024-49893, CVE-2024-50138, CVE-2024-53066, CVE-2024-50242, CVE-2024-47141, CVE-2024-53115, CVE-2024-50059, CVE-2024-56540, CVE-2024-53220, CVE-2024-50288, CVE-2024-57874, CVE-2024-50026, CVE-2024-56689, CVE-2024-50042, CVE-2024-49865, CVE-2024-50047, CVE-2024-50164, CVE-2024-56549, CVE-2024-56765, CVE-2024-56587, CVE-2024-56567, CVE-2024-48875, CVE-2024-56570, CVE-2024-50126, CVE-2024-53140, CVE-2024-50167, CVE-2024-57872, CVE-2024-53055, CVE-2024-56745, CVE-2024-56633, CVE-2024-53108, CVE-2024-53150, CVE-2024-53174, CVE-2024-50077, CVE-2024-56747, CVE-2024-50294, CVE-2024-53091, CVE-2024-56742, CVE-2024-56573, CVE-2024-50270, CVE-2024-50028, CVE-2024-50285, CVE-2024-56694, CVE-2024-50274, CVE-2024-50222, CVE-2024-56634, CVE-2024-50027, CVE-2024-56562, CVE-2024-50066, CVE-2024-50301, CVE-2024-53231, CVE-2024-56538, CVE-2024-53044, CVE-2024-53106, CVE-2024-41014, CVE-2024-50202, CVE-2024-56583, CVE-2024-50267, CVE-2024-53219, CVE-2024-50298, CVE-2024-47711, CVE-2024-53048, CVE-2024-56602, CVE-2024-50048, CVE-2024-56598, CVE-2024-53105, CVE-2024-53072, CVE-2024-53094, CVE-2024-50137, CVE-2024-50269, CVE-2024-53109, CVE-2024-56755, CVE-2024-53208, CVE-2024-53165, CVE-2024-56724, CVE-2024-56774, CVE-2024-53202, CVE-2024-56752, CVE-2024-53228, CVE-2024-56532, CVE-2024-53147, CVE-2024-56582, CVE-2024-56723, CVE-2024-56778, CVE-2024-50096, CVE-2024-56599, CVE-2024-56632, CVE-2024-53191, CVE-2024-56616, CVE-2024-50080, CVE-2025-21993, CVE-2024-56647, CVE-2024-56648, CVE-2024-56722, CVE-2024-53176, CVE-2024-50234, CVE-2024-50256, CVE-2024-53145, CVE-2024-50182, CVE-2024-50160, CVE-2024-53123, CVE-2024-53227, CVE-2024-50020, CVE-2024-56644, CVE-2024-50045, CVE-2024-50036, CVE-2024-56783, CVE-2024-53184, CVE-2024-53142, CVE-2024-56725, CVE-2024-49906, CVE-2024-56751, CVE-2024-56584, CVE-2024-56663, CVE-2024-53042, CVE-2024-50188, CVE-2024-53169, CVE-2024-53085, CVE-2024-56690, CVE-2024-50186, CVE-2024-53156, CVE-2024-50250, CVE-2024-56787, CVE-2024-50076, CVE-2024-53122, CVE-2024-56643, CVE-2024-50084, CVE-2024-50271, CVE-2024-53045, CVE-2024-53058, CVE-2024-50238, CVE-2024-50300, CVE-2024-56621, CVE-2024-56729, CVE-2024-50284, CVE-2024-53135, CVE-2024-50287, CVE-2024-53161, CVE-2024-56727, CVE-2024-50044, CVE-2024-56601, CVE-2024-53194, CVE-2024-50209, CVE-2024-50145, CVE-2024-53067, CVE-2024-53215, CVE-2024-56608, CVE-2024-56557, CVE-2025-21756, CVE-2024-53229, CVE-2024-53112, CVE-2024-50133, CVE-2024-50169, CVE-2025-21700, CVE-2024-50191, CVE-2024-57838, CVE-2024-56693, CVE-2024-53183, CVE-2024-50278, CVE-2024-53111, CVE-2024-50151, CVE-2024-53053, CVE-2024-56630, CVE-2024-50060, CVE-2024-56580, CVE-2024-50230, CVE-2024-53099, CVE-2024-56533, CVE-2024-56640, CVE-2024-50282, CVE-2024-50159, CVE-2024-56658, CVE-2024-50021, CVE-2024-50275, CVE-2024-50192, CVE-2024-50302, CVE-2024-50139, CVE-2024-53096, CVE-2024-50290, CVE-2024-50246, CVE-2024-50127, CVE-2024-56569, CVE-2024-50029, CVE-2024-53168, CVE-2025-21831, CVE-2024-53052, CVE-2024-56704, CVE-2024-57849, CVE-2024-50022, CVE-2024-50208, CVE-2024-53177, CVE-2024-56771, CVE-2024-50134, CVE-2024-53151, CVE-2024-50098, CVE-2024-53214, CVE-2024-56754, CVE-2024-43098, CVE-2024-50299, CVE-2024-50255, CVE-2024-56687, CVE-2024-53196, CVE-2024-53217, CVE-2024-48873, CVE-2024-53062, CVE-2024-53101, CVE-2024-56592, CVE-2024-53086, CVE-2024-50207, CVE-2024-50035, CVE-2024-50067, CVE-2024-50072, CVE-2024-56619, CVE-2024-53088, CVE-2024-53210, CVE-2024-56721, CVE-2024-56531, CVE-2024-56705, CVE-2024-50085, CVE-2024-53222, CVE-2024-50262, CVE-2024-50156, CVE-2024-45828, CVE-2024-53181, CVE-2024-50083, CVE-2024-53068, CVE-2024-53081, CVE-2024-50107, CVE-2022-49034, CVE-2024-50276, CVE-2024-50249, CVE-2024-50030, CVE-2024-53203, CVE-2024-50185, CVE-2024-50163, CVE-2024-50184, CVE-2024-53162, CVE-2024-56703, CVE-2024-56685, CVE-2024-56548, CVE-2024-53100, CVE-2024-56597, CVE-2024-53110, CVE-2024-50086, CVE-2024-56636, CVE-2024-56677, CVE-2024-50166, CVE-2024-50247, CVE-2024-53061, CVE-2024-56577, CVE-2024-50062, CVE-2024-56786, CVE-2024-50019, CVE-2024-56609, CVE-2024-48881, CVE-2024-53239, CVE-2024-53128, CVE-2024-56692, CVE-2024-50068, CVE-2024-56683, CVE-2024-56594, CVE-2024-53209, CVE-2024-50142, CVE-2024-56590, CVE-2024-56613, CVE-2024-53163, CVE-2024-50261, CVE-2024-53224, CVE-2024-56595, CVE-2024-50150, CVE-2024-53079, CVE-2024-56775, CVE-2024-53095, CVE-2024-50105, CVE-2024-50193, CVE-2024-53043, CVE-2024-53213, CVE-2024-56638, CVE-2024-50023, CVE-2024-50057, CVE-2024-50038, CVE-2024-56550, CVE-2024-53232, CVE-2024-50155, CVE-2024-53155, CVE-2024-53197, CVE-2024-50046, CVE-2024-50236, CVE-2024-50243, CVE-2024-53172, CVE-2024-53226, CVE-2024-53146, CVE-2024-42122, CVE-2024-50199, CVE-2024-50205, CVE-2024-50170, CVE-2024-50200, CVE-2024-56620, CVE-2024-50104, CVE-2024-56593, CVE-2024-53223, CVE-2024-53082, CVE-2024-50058, CVE-2024-56688, CVE-2024-56607, CVE-2024-53195, CVE-2024-41932, CVE-2024-56756, CVE-2024-53236, CVE-2024-56622, CVE-2024-50093, CVE-2024-53114, CVE-2024-56600, CVE-2024-53190, CVE-2024-53130, CVE-2024-53084, CVE-2024-56610, CVE-2024-53170, CVE-2024-53127, CVE-2024-49968, CVE-2024-50203, CVE-2024-50259, CVE-2024-50031, CVE-2024-53051, CVE-2024-50226, CVE-2024-56779, CVE-2024-56588, CVE-2024-56777, CVE-2024-50121, CVE-2024-50055, CVE-2024-50033, CVE-2024-50010, CVE-2024-53218, CVE-2024-56744, CVE-2024-50297, CVE-2024-50257, CVE-2024-56558, CVE-2024-50073, CVE-2024-56623, CVE-2024-50135, CVE-2024-50197, CVE-2024-56625, CVE-2024-56546, CVE-2024-53175, CVE-2024-50273, CVE-2024-50082, CVE-2024-56615, CVE-2024-53185, CVE-2024-50172, CVE-2024-50265, CVE-2024-56678, CVE-2024-48876, CVE-2024-50110, CVE-2024-50101, CVE-2024-50041, CVE-2024-53046, CVE-2024-50198, CVE-2024-50303, CVE-2024-56708, CVE-2024-56728, CVE-2024-50136, CVE-2024-56700, CVE-2024-50074, CVE-2024-50117, CVE-2024-50296)

USN-7450-1: Linux kernel vulnerabilities

2 weeks 3 days ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50051, CVE-2024-56546, CVE-2024-56551, CVE-2024-53236, CVE-2024-50244, CVE-2024-53043, CVE-2024-56694, CVE-2025-21700, CVE-2024-56700, CVE-2025-21993, CVE-2024-53224, CVE-2024-50105, CVE-2024-53100, CVE-2024-56690, CVE-2024-50150, CVE-2024-53223, CVE-2024-50285, CVE-2024-50269, CVE-2024-53089, CVE-2024-53044, CVE-2024-53175, CVE-2024-57849, CVE-2024-50296, CVE-2024-50120, CVE-2024-50147, CVE-2024-56540, CVE-2024-56602, CVE-2024-50289, CVE-2024-53127, CVE-2024-56786, CVE-2024-50108, CVE-2024-53045, CVE-2024-53067, CVE-2024-50138, CVE-2024-53173, CVE-2024-50143, CVE-2024-56678, CVE-2024-53130, CVE-2024-53157, CVE-2024-56723, CVE-2024-56623, CVE-2024-53234, CVE-2024-53088, CVE-2024-53068, CVE-2024-53195, CVE-2024-53188, CVE-2024-56613, CVE-2024-56561, CVE-2024-53218, CVE-2024-50215, CVE-2024-53227, CVE-2024-50139, CVE-2024-50170, CVE-2024-56640, CVE-2024-56720, CVE-2024-56780, CVE-2024-56705, CVE-2024-53131, CVE-2024-56597, CVE-2024-50224, CVE-2024-57843, CVE-2024-50251, CVE-2024-50243, CVE-2024-53200, CVE-2024-50280, CVE-2024-50303, CVE-2024-50107, CVE-2024-56606, CVE-2024-53237, CVE-2024-53161, CVE-2024-56685, CVE-2024-53185, CVE-2024-56785, CVE-2024-53150, CVE-2024-53166, CVE-2024-50141, CVE-2024-50158, CVE-2024-47143, CVE-2024-56773, CVE-2024-53090, CVE-2024-56778, CVE-2024-50142, CVE-2025-21701, CVE-2024-50301, CVE-2024-53050, CVE-2024-50211, CVE-2024-50246, CVE-2024-50252, CVE-2024-53122, CVE-2024-53085, CVE-2024-50104, CVE-2024-50288, CVE-2024-53151, CVE-2024-56728, CVE-2024-53086, CVE-2024-56568, CVE-2024-53133, CVE-2024-50290, CVE-2024-56774, CVE-2024-50278, CVE-2024-56565, CVE-2024-53147, CVE-2024-56775, CVE-2024-53239, CVE-2024-56533, CVE-2024-50225, CVE-2024-50124, CVE-2024-47794, CVE-2024-50163, CVE-2024-53680, CVE-2024-56574, CVE-2024-56605, CVE-2024-50112, CVE-2024-53221, CVE-2024-56751, CVE-2024-56538, CVE-2024-53123, CVE-2024-56688, CVE-2024-50239, CVE-2024-56742, CVE-2024-56752, CVE-2024-53059, CVE-2024-50282, CVE-2024-50238, CVE-2024-53108, CVE-2024-50152, CVE-2024-53214, CVE-2024-53226, CVE-2024-50292, CVE-2024-56580, CVE-2024-56621, CVE-2024-56593, CVE-2024-56689, CVE-2024-56649, CVE-2024-56650, CVE-2024-53203, CVE-2024-56626, CVE-2025-21831, CVE-2024-53053, CVE-2024-50257, CVE-2024-50203, CVE-2024-56643, CVE-2024-50231, CVE-2024-53066, CVE-2024-53105, CVE-2024-53233, CVE-2024-56703, CVE-2024-56725, CVE-2024-50172, CVE-2024-53160, CVE-2024-50131, CVE-2024-53196, CVE-2024-56645, CVE-2024-50304, CVE-2024-56746, CVE-2024-53232, CVE-2024-49906, CVE-2024-53129, CVE-2024-53135, CVE-2024-56545, CVE-2024-56600, CVE-2024-56642, CVE-2024-43098, CVE-2024-50291, CVE-2024-53219, CVE-2024-53197, CVE-2024-53084, CVE-2024-53155, CVE-2024-53094, CVE-2024-56581, CVE-2024-56531, CVE-2024-50300, CVE-2024-50232, CVE-2024-56590, CVE-2024-48881, CVE-2024-56708, CVE-2024-56632, CVE-2024-53051, CVE-2024-53177, CVE-2024-56698, CVE-2024-56707, CVE-2024-56693, CVE-2024-53213, CVE-2024-53121, CVE-2024-56681, CVE-2024-56607, CVE-2024-53120, CVE-2024-56615, CVE-2024-53109, CVE-2024-50209, CVE-2024-56592, CVE-2024-50103, CVE-2024-56722, CVE-2024-53046, CVE-2024-50155, CVE-2024-56765, CVE-2024-56572, CVE-2024-56611, CVE-2024-56679, CVE-2024-50259, CVE-2024-50111, CVE-2024-53217, CVE-2024-53113, CVE-2024-53101, CVE-2024-50208, CVE-2024-53115, CVE-2024-56691, CVE-2024-50137, CVE-2024-53194, CVE-2024-41935, CVE-2024-56584, CVE-2022-49034, CVE-2024-53072, CVE-2024-41932, CVE-2024-56729, CVE-2024-53095, CVE-2024-56755, CVE-2024-50268, CVE-2024-56631, CVE-2024-48875, CVE-2025-21756, CVE-2024-50127, CVE-2024-50136, CVE-2024-56562, CVE-2024-56683, CVE-2024-50250, CVE-2024-53184, CVE-2024-50205, CVE-2024-56543, CVE-2024-56787, CVE-2024-50116, CVE-2024-53096, CVE-2024-53169, CVE-2024-50154, CVE-2024-53230, CVE-2024-50247, CVE-2024-56570, CVE-2024-56583, CVE-2025-21702, CVE-2024-50126, CVE-2024-50151, CVE-2024-53208, CVE-2024-50153, CVE-2024-56619, CVE-2024-56532, CVE-2024-56776, CVE-2024-53093, CVE-2024-53139, CVE-2024-50263, CVE-2024-41014, CVE-2024-53126, CVE-2024-53052, CVE-2024-56636, CVE-2024-50299, CVE-2024-56601, CVE-2024-56569, CVE-2024-53168, CVE-2024-53112, CVE-2024-56576, CVE-2024-50230, CVE-2024-56630, CVE-2024-50010, CVE-2024-56599, CVE-2024-50156, CVE-2024-50286, CVE-2024-53174, CVE-2024-50216, CVE-2024-56744, CVE-2024-50265, CVE-2024-50255, CVE-2024-56567, CVE-2024-50118, CVE-2024-50276, CVE-2024-53099, CVE-2024-50234, CVE-2024-56745, CVE-2024-53114, CVE-2024-50273, CVE-2024-49899, CVE-2024-56608, CVE-2024-56625, CVE-2024-56577, CVE-2024-56596, CVE-2024-56634, CVE-2024-56777, CVE-2024-47141, CVE-2024-53180, CVE-2024-56701, CVE-2024-53158, CVE-2024-56566, CVE-2024-56616, CVE-2024-53117, CVE-2024-53181, CVE-2024-50115, CVE-2024-56772, CVE-2024-53163, CVE-2024-50140, CVE-2024-56633, CVE-2024-50262, CVE-2024-56677, CVE-2024-53201, CVE-2024-57850, CVE-2024-50271, CVE-2024-50279, CVE-2024-50226, CVE-2024-53191, CVE-2024-45828, CVE-2024-53106, CVE-2024-50275, CVE-2024-50245, CVE-2024-56783, CVE-2024-50261, CVE-2024-50283, CVE-2024-53062, CVE-2024-50240, CVE-2024-53183, CVE-2024-53222, CVE-2024-53119, CVE-2024-53138, CVE-2024-52332, CVE-2024-50167, CVE-2024-53042, CVE-2024-50169, CVE-2024-50162, CVE-2024-53087, CVE-2024-50298, CVE-2024-56610, CVE-2024-53060, CVE-2024-56578, CVE-2024-50272, CVE-2024-56604, CVE-2024-50287, CVE-2024-47809, CVE-2024-56603, CVE-2024-50237, CVE-2024-56647, CVE-2024-56747, CVE-2024-50221, CVE-2024-53215, CVE-2024-56550, CVE-2024-56748, CVE-2024-56557, CVE-2024-48873, CVE-2024-49569, CVE-2024-50206, CVE-2024-56781, CVE-2024-56638, CVE-2024-50218, CVE-2024-53055, CVE-2024-57838, CVE-2024-50267, CVE-2024-56575, CVE-2024-53202, CVE-2024-53154, CVE-2024-53176, CVE-2024-56779, CVE-2024-50210, CVE-2024-56589, CVE-2024-50130, CVE-2024-53190, CVE-2024-53082, CVE-2024-56549, CVE-2024-56594, CVE-2024-50294, CVE-2024-56754, CVE-2024-53142, CVE-2024-50295, CVE-2024-57872, CVE-2024-53081, CVE-2024-56629, CVE-2024-53209, CVE-2024-56558, CVE-2024-50164, CVE-2024-53162, CVE-2024-56539, CVE-2024-56721, CVE-2024-50121, CVE-2024-56651, CVE-2024-56609, CVE-2024-50207, CVE-2024-50220, CVE-2024-53228, CVE-2024-53171, CVE-2024-53110, CVE-2024-53146, CVE-2024-53148, CVE-2024-50284, CVE-2024-56739, CVE-2024-48876, CVE-2024-50222, CVE-2024-53079, CVE-2024-53048, CVE-2024-50135, CVE-2024-56726, CVE-2024-50110, CVE-2024-53145, CVE-2024-53198, CVE-2024-50249, CVE-2024-44955, CVE-2024-56573, CVE-2024-53047, CVE-2024-50133, CVE-2024-53091, CVE-2024-53134, CVE-2024-50128, CVE-2024-56648, CVE-2024-53111, CVE-2024-50258, CVE-2024-56587, CVE-2024-56644, CVE-2024-53229, CVE-2024-56727, CVE-2024-50159, CVE-2024-57874, CVE-2024-50166, CVE-2024-53210, CVE-2024-53172, CVE-2024-53107, CVE-2024-56620, CVE-2024-53076, CVE-2024-50236, CVE-2024-56627, CVE-2024-56771, CVE-2024-56724, CVE-2024-50235, CVE-2024-50270, CVE-2024-50160, CVE-2024-50067, CVE-2024-56641, CVE-2024-50297, CVE-2024-53178, CVE-2024-53231, CVE-2024-56692, CVE-2024-53128, CVE-2024-56635, CVE-2024-42122, CVE-2024-50223, CVE-2024-56586, CVE-2024-50242, CVE-2024-50256, CVE-2024-56756, CVE-2024-56782, CVE-2024-50145, CVE-2024-56704, CVE-2024-50146, CVE-2024-53058, CVE-2024-56588, CVE-2024-53187, CVE-2024-56548, CVE-2024-56579, CVE-2024-50248, CVE-2024-50125, CVE-2024-57876, CVE-2024-56687, CVE-2024-53061, CVE-2024-53118, CVE-2024-56622, CVE-2024-53083, CVE-2024-53220, CVE-2024-56637)

USN-7449-1: Linux kernel vulnerabilities

2 weeks 3 days ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - MIPS architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - RAM backed block device driver; - Compressed RAM block device driver; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - EDAC drivers; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - GPIO subsystem; - GPU drivers; - HID subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - LED subsystem; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NVME drivers; - PCI subsystem; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Voltage and Current Regulator drivers; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - i.MX SoC drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Media staging drivers; - TCM subsystem; - UFS subsystem; - DesignWare USB3 driver; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Framebuffer layer; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - EROFS file system; - F2FS file system; - JFFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - NTFS3 file system; - Overlay file system; - Proc file system; - Diskquota system; - SMB network file system; - UBI file system; - DRM display driver; - BPF subsystem; - StackDepot library; - Bluetooth subsystem; - IP tunnels definitions; - Netfilter; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - DMA mapping infrastructure; - Kernel fork() syscall; - KCSAN framework; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Task handling mechanism; - Timer subsystem; - KUnit library; - Memory management; - 9P file system network protocol; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Ethtool driver; - HSR network protocol; - IEEE802154.4 network protocol; - IPv4 networking; - IPv6 networking; - IUCV driver; - MAC80211 subsystem; - Multipath TCP; - Packet sockets; - RxRPC session sockets; - Network traffic control; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - HD-audio driver; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; (CVE-2024-50288, CVE-2024-56568, CVE-2024-50280, CVE-2024-56677, CVE-2024-56620, CVE-2024-53108, CVE-2024-53115, CVE-2024-53061, CVE-2024-53215, CVE-2024-50275, CVE-2024-53133, CVE-2024-50279, CVE-2025-21831, CVE-2025-21756, CVE-2024-56727, CVE-2024-50208, CVE-2024-50142, CVE-2024-53148, CVE-2024-56781, CVE-2024-53171, CVE-2024-56608, CVE-2024-53177, CVE-2024-56708, CVE-2024-50207, CVE-2024-50278, CVE-2024-50166, CVE-2024-56629, CVE-2024-56723, CVE-2024-50172, CVE-2024-56707, CVE-2024-50051, CVE-2024-56606, CVE-2024-56700, CVE-2024-56599, CVE-2024-53051, CVE-2024-56632, CVE-2024-47143, CVE-2024-53135, CVE-2024-53111, CVE-2024-56634, CVE-2024-50262, CVE-2024-56587, CVE-2024-50125, CVE-2024-53145, CVE-2024-53185, CVE-2024-56575, CVE-2024-53231, CVE-2024-53072, CVE-2024-50110, CVE-2024-53172, CVE-2024-50258, CVE-2024-53226, CVE-2024-50211, CVE-2024-43098, CVE-2024-50224, CVE-2024-56642, CVE-2024-53082, CVE-2024-50108, CVE-2024-53094, CVE-2024-53184, CVE-2024-56648, CVE-2024-50140, CVE-2024-53166, CVE-2024-53090, CVE-2024-50301, CVE-2024-56625, CVE-2024-50230, CVE-2024-56586, CVE-2024-53052, CVE-2024-56574, CVE-2024-53168, CVE-2024-53209, CVE-2024-56640, CVE-2024-49899, CVE-2024-50247, CVE-2024-50150, CVE-2024-53058, CVE-2024-50153, CVE-2024-56689, CVE-2024-50283, CVE-2024-50251, CVE-2024-56578, CVE-2024-50303, CVE-2024-56569, CVE-2024-53134, CVE-2024-50158, CVE-2024-56592, CVE-2024-50300, CVE-2024-57838, CVE-2024-50205, CVE-2024-56562, CVE-2024-57843, CVE-2024-53084, CVE-2024-56532, CVE-2024-50127, CVE-2024-56584, CVE-2024-53196, CVE-2024-56722, CVE-2024-50215, CVE-2022-49034, CVE-2024-47809, CVE-2024-56744, CVE-2024-50121, CVE-2024-53083, CVE-2024-56540, CVE-2024-50209, CVE-2024-56787, CVE-2024-48873, CVE-2024-53221, CVE-2024-56746, CVE-2024-50238, CVE-2024-50226, CVE-2024-52332, CVE-2024-56649, CVE-2024-56546, CVE-2024-53223, CVE-2024-50259, CVE-2024-50287, CVE-2024-56701, CVE-2024-56692, CVE-2024-50243, CVE-2024-53160, CVE-2024-56619, CVE-2024-50128, CVE-2024-53173, CVE-2024-53127, CVE-2024-56720, CVE-2024-56633, CVE-2024-48875, CVE-2024-56775, CVE-2024-50155, CVE-2024-56611, CVE-2024-56539, CVE-2024-50282, CVE-2024-56600, CVE-2024-53110, CVE-2024-50111, CVE-2024-56773, CVE-2024-53161, CVE-2024-56615, CVE-2024-56786, CVE-2024-56783, CVE-2024-56645, CVE-2024-50216, CVE-2024-56605, CVE-2024-56622, CVE-2024-56613, CVE-2024-50245, CVE-2024-50240, CVE-2024-53222, CVE-2024-53203, CVE-2024-53042, CVE-2024-56724, CVE-2024-57876, CVE-2024-49906, CVE-2024-56596, CVE-2024-50234, CVE-2024-41014, CVE-2024-53053, CVE-2024-48881, CVE-2024-56601, CVE-2024-56581, CVE-2024-56609, CVE-2024-56576, CVE-2024-53044, CVE-2024-53680, CVE-2024-50170, CVE-2024-50116, CVE-2024-56705, CVE-2024-53138, CVE-2024-53162, CVE-2024-50136, CVE-2024-53210, CVE-2024-50167, CVE-2024-50292, CVE-2024-53067, CVE-2024-53101, CVE-2024-56691, CVE-2024-53200, CVE-2024-50255, CVE-2024-53142, CVE-2025-21700, CVE-2024-50104, CVE-2024-56687, CVE-2024-50163, CVE-2024-56756, CVE-2024-50218, CVE-2024-56550, CVE-2024-53202, CVE-2024-50137, CVE-2024-50270, CVE-2024-56641, CVE-2024-53154, CVE-2024-53224, CVE-2024-53155, CVE-2024-50124, CVE-2024-41935, CVE-2024-50265, CVE-2024-53190, CVE-2024-50256, CVE-2024-53234, CVE-2024-56693, CVE-2024-50143, CVE-2024-53181, CVE-2024-50154, CVE-2024-53233, CVE-2024-56771, CVE-2024-53236, CVE-2024-53227, CVE-2024-56572, CVE-2024-53126, CVE-2024-56551, CVE-2024-50299, CVE-2024-53218, CVE-2024-50135, CVE-2024-53188, CVE-2024-56635, CVE-2024-53055, CVE-2024-56751, CVE-2024-56577, CVE-2024-50289, CVE-2024-56590, CVE-2024-56745, CVE-2024-53176, CVE-2024-56681, CVE-2024-50160, CVE-2024-56557, CVE-2024-53213, CVE-2024-50267, CVE-2024-50146, CVE-2024-56627, CVE-2024-50290, CVE-2024-56565, CVE-2024-56752, CVE-2024-56603, CVE-2024-50246, CVE-2024-56690, CVE-2024-50222, CVE-2024-53087, CVE-2024-53091, CVE-2024-50115, CVE-2024-53106, CVE-2024-50250, CVE-2024-50242, CVE-2024-50248, CVE-2024-53229, CVE-2024-56588, CVE-2024-56785, CVE-2024-53195, CVE-2025-21702, CVE-2024-53059, CVE-2024-50107, CVE-2024-50139, CVE-2024-50276, CVE-2024-56543, CVE-2024-53228, CVE-2024-50232, CVE-2024-53128, CVE-2024-56651, CVE-2024-53047, CVE-2024-56726, CVE-2024-50159, CVE-2024-50231, CVE-2024-56545, CVE-2024-56778, CVE-2024-56602, CVE-2024-50221, CVE-2024-56754, CVE-2024-56704, CVE-2024-56650, CVE-2024-57850, CVE-2024-50206, CVE-2024-56573, CVE-2024-56703, CVE-2024-53208, CVE-2024-53158, CVE-2024-50274, CVE-2024-56638, CVE-2024-50151, CVE-2024-53239, CVE-2024-56742, CVE-2024-50237, CVE-2024-53066, CVE-2024-56580, CVE-2024-56688, CVE-2024-53089, CVE-2024-56777, CVE-2024-50138, CVE-2024-53198, CVE-2024-56589, CVE-2024-56694, CVE-2024-50261, CVE-2024-53147, CVE-2024-50263, CVE-2024-56644, CVE-2024-56597, CVE-2024-53197, CVE-2024-50164, CVE-2024-53191, CVE-2024-56549, CVE-2024-50284, CVE-2024-57849, CVE-2024-56594, CVE-2024-56782, CVE-2024-50235, CVE-2024-49569, CVE-2024-53237, CVE-2024-56643, CVE-2024-53109, CVE-2024-53157, CVE-2024-56637, CVE-2024-56623, CVE-2024-56683, CVE-2024-50257, CVE-2024-56765, CVE-2024-53201, CVE-2024-53050, CVE-2024-53120, CVE-2024-53121, CVE-2024-50126, CVE-2024-56774, CVE-2024-53219, CVE-2024-56616, CVE-2024-50223, CVE-2024-41932, CVE-2024-50271, CVE-2024-56593, CVE-2024-50285, CVE-2024-53113, CVE-2025-21993, CVE-2024-56607, CVE-2024-50252, CVE-2024-56610, CVE-2024-53043, CVE-2024-50120, CVE-2024-44955, CVE-2024-50118, CVE-2024-53130, CVE-2024-56566, CVE-2024-53146, CVE-2024-56721, CVE-2024-53079, CVE-2024-56685, CVE-2024-50145, CVE-2024-56755, CVE-2024-50268, CVE-2024-53046, CVE-2024-50010, CVE-2024-56531, CVE-2024-53129, CVE-2024-47794, CVE-2024-53119, CVE-2024-50297, CVE-2024-56728, CVE-2025-21701, CVE-2024-53163, CVE-2024-56739, CVE-2024-56538, CVE-2024-50294, CVE-2024-53183, CVE-2024-53131, CVE-2024-56626, CVE-2024-50133, CVE-2024-53151, CVE-2024-56679, CVE-2024-50225, CVE-2024-50152, CVE-2024-53174, CVE-2024-56698, CVE-2024-53105, CVE-2024-53085, CVE-2024-53220, CVE-2024-53180, CVE-2024-53060, CVE-2024-53139, CVE-2024-56631, CVE-2024-53175, CVE-2024-57872, CVE-2024-56779, CVE-2024-50220, CVE-2024-50169, CVE-2024-56772, CVE-2024-53230, CVE-2024-53122, CVE-2024-50067, CVE-2024-56558, CVE-2024-45828, CVE-2024-57874, CVE-2024-50239, CVE-2024-53214, CVE-2024-56621, CVE-2024-50156, CVE-2024-56583, CVE-2024-56776, CVE-2024-50298, CVE-2024-56533, CVE-2024-56748, CVE-2024-53114, CVE-2024-53187, CVE-2024-50269, CVE-2024-50286, CVE-2024-56579, CVE-2024-56548, CVE-2024-50210, CVE-2024-50244, CVE-2024-50291, CVE-2024-56567, CVE-2024-56780, CVE-2024-53150, CVE-2024-56636, CVE-2024-56561, CVE-2024-53194, CVE-2024-53093, CVE-2024-53117, CVE-2024-53062, CVE-2024-53123, CVE-2024-50236, CVE-2024-56630, CVE-2024-56678, CVE-2024-48876, CVE-2024-50249, CVE-2024-53099, CVE-2024-53048, CVE-2024-50296, CVE-2024-50131, CVE-2024-50105, CVE-2024-50141, CVE-2024-56729, CVE-2024-53217, CVE-2024-50295, CVE-2024-50130, CVE-2024-56725, CVE-2024-42122, CVE-2024-56570, CVE-2024-53118, CVE-2024-50112, CVE-2024-50203, CVE-2024-53178, CVE-2024-53068, CVE-2024-50272, CVE-2024-53232, CVE-2024-53088, CVE-2024-56647, CVE-2024-53076, CVE-2024-53100, CVE-2024-53096, CVE-2024-56747, CVE-2024-53045, CVE-2024-53086, CVE-2024-50147, CVE-2024-53081, CVE-2024-50273, CVE-2024-50103, CVE-2024-53107, CVE-2024-53095, CVE-2024-47141, CVE-2024-56604, CVE-2024-50304, CVE-2024-53169, CVE-2024-50162, CVE-2024-53112)

USN-7448-1: Linux kernel vulnerabilities

2 weeks 3 days ago
It was discovered that the CIFS network file system implementation in the Linux kernel did not properly verify the target namespace when handling upcalls. An attacker could use this to expose sensitive information. (CVE-2025-2312) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21694, CVE-2025-21993, CVE-2025-21684, CVE-2025-21681, CVE-2025-21675, CVE-2025-21672, CVE-2025-21696, CVE-2025-21691, CVE-2025-21683, CVE-2025-21666, CVE-2025-21682, CVE-2025-21697, CVE-2025-21668, CVE-2025-21701, CVE-2025-21670, CVE-2025-21676, CVE-2025-21695, CVE-2025-21692, CVE-2025-21674, CVE-2025-21699, CVE-2024-57948, CVE-2025-21677, CVE-2024-57951, CVE-2025-21702, CVE-2025-21700, CVE-2024-57949, CVE-2025-21669, CVE-2025-21703, CVE-2025-21756, CVE-2025-21667, CVE-2024-57952, CVE-2024-57950, CVE-2025-21685, CVE-2025-21693, CVE-2025-21678, CVE-2025-21665, CVE-2025-21680, CVE-2025-21689, CVE-2025-21690, CVE-2025-21673)

USN-7447-1: Yelp vulnerability

2 weeks 3 days ago
It was discovered that Yelp incorrectly handled paths in ghelp URLs. A remote attacker could use this issue to trick users into opening malicious downloaded help files and exfiltrate sensitive information.

USN-7445-1: Linux kernel vulnerabilities

2 weeks 3 days ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - GPIO subsystem; - GPU drivers; - IRQ chip drivers; - Network drivers; - Mellanox network drivers; - x86 platform drivers; - i.MX PM domains; - SCSI subsystem; - USB Serial drivers; - AFS file system; - GFS2 file system; - File systems infrastructure; - Proc file system; - SMB network file system; - Timer subsystem; - Kernel CPU control infrastructure; - Memory management; - Networking core; - Ethtool driver; - IEEE 802.15.4 subsystem; - Open vSwitch; - Network traffic control; - VMware vSockets driver; (CVE-2025-21685, CVE-2025-21684, CVE-2025-21756, CVE-2025-21670, CVE-2024-57949, CVE-2025-21677, CVE-2025-21680, CVE-2025-21703, CVE-2024-57952, CVE-2025-21674, CVE-2025-21701, CVE-2025-21691, CVE-2025-21689, CVE-2025-21668, CVE-2025-21665, CVE-2025-21683, CVE-2025-21675, CVE-2025-21672, CVE-2024-57948, CVE-2025-21669, CVE-2025-21673, CVE-2025-21692, CVE-2025-21699, CVE-2025-21702, CVE-2025-21682, CVE-2025-21690, CVE-2025-21681, CVE-2025-21695, CVE-2025-21696, CVE-2025-21700, CVE-2025-21678, CVE-2025-21676, CVE-2024-57950, CVE-2025-21666, CVE-2025-21694, CVE-2025-21693, CVE-2025-21993, CVE-2024-57951, CVE-2025-21697, CVE-2025-21667)

USN-7434-2: Perl vulnerability

2 weeks 3 days ago
USN-7434-1 fixed a vulnerability in Perl. This update provides the corresponding update for Ubuntu 25.04. Original advisory details: It was discovered that Perl incorrectly handled transliterating non-ASCII bytes. A remote attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code.

USN-7431-2: HAProxy vulnerability

2 weeks 3 days ago
USN-7431-1 fixed a vulnerability in HAProxy. This update provides the corresponding update for Ubuntu 25.04. Original advisory details: Aleandro Prudenzano and Edoardo Geraci discovered that HAProxy incorrectly handled certain uncommon configurations that replace multiple short patterns with a longer one. A remote attacker could use this issue to cause HAProxy to crash, resulting in a denial of service, or possibly execute arbitrary code.

USN-7443-2: Erlang vulnerability

2 weeks 3 days ago
USN-7443-1 fixed a vulnerability in Erlang. This update provides the corresponding update for Ubuntu 25.04. Original advisory details: Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, and Jörg Schwenk discovered that Erlang OTP’s SSH module incorrect handled authentication. A remote attacker could use this issue to execute arbitrary commands without authentication, possibly leading to a system compromise.

USN-7402-5: Linux kernel (GCP) vulnerabilities

2 weeks 4 days ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; - GPU drivers; - HID subsystem; - Media drivers; - JFS file system; - Network namespace; - Networking core; - Netlink; (CVE-2024-57798, CVE-2024-53140, CVE-2024-56595, CVE-2024-56598, CVE-2024-50302, CVE-2024-56658, CVE-2024-56672, CVE-2024-53063)

USN-7444-1: Synapse vulnerabilities

2 weeks 4 days ago
It was discovered that Synapse network policies could be bypassed via specially crafted URLs. An attacker could possibly use this issue to bypass authentication mechanisms. (CVE-2023-32683) It was discovered that Synapse exposed cached device information. An attacker could possibly use this issue to gain access to sensitive information. (CVE-2023-43796) It was discovered that Synapse could be tricked into rejecting state changes in rooms. An attacker could possibly use this issue to cause Synapse to stop functioning properly, resulting in a denial of service. This issue was only fixed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39374) It was discovered that Synapse stored user credentials in a server's database temporarily. An attacker could possibly use this issue to gain access to sensitive information. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-41335) It was discovered that Synapse could incorrectly respond to server authorization events. An attacker could possibly use this issue to bypass authentication mechanisms. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2022-39335) It was discovered that Synapse could be manipulated to mark messages as read when they had not been viewed. An attacker could possibly use this issue to perform repudiation-based attacks. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-42453) It was discovered that Synapse had several memory-related issues. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-31208) It was discovered that Synapse could run external tools due to a unchecked thumbnail rendering routine. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service, or execute arbitrary code. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-53863)

USN-7443-1: Erlang vulnerability

3 weeks 2 days ago
Fabian Bäumer, Marcel Maehren, Marcus Brinkmann, and Jörg Schwenk discovered that Erlang OTP’s SSH module incorrect handled authentication. A remote attacker could use this issue to execute arbitrary commands without authentication, possibly leading to a system compromise.

USN-7442-1: Ruby vulnerabilities

3 weeks 2 days ago
It was discovered that the Ruby CGI gem incorrectly handled parsing certain cookies. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27219) It was discovered that the Ruby CGI gem incorrectly handled parsing certain regular expressions. A remote attacker could possibly use this issue to consume resources, leading to a denial of service. (CVE-2025-27220) It was discovered that the Ruby URI gem incorrectly handled certain URI handling methods. A remote attacker could possibly use this issue to leak authentication credentials. (CVE-2025-27221) It was discovered that the Ruby REXML gem incorrectly handled parsing XML documents containing many digits in a hex numeric character reference. A remote attacker could use this issue to consume resources, leading to a denial of service. (CVE-2024-49761)

USN-7441-1: Eclipse Mosquitto vulnerabilities

3 weeks 3 days ago
It was discovered that Eclipse Mosquitto client incorrectly handled memory when receiving a SUBACK packet. An attacker with a malicious broker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2024-10525) Xiangpu Song discovered that Eclipse Mosquitto broker did not properly manage memory under certain circumstances. A malicious client with a remote connection could possibly use this issue to cause the broker to crash resulting in a denial of service, or another unspecified impact. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-3935)

USN-7440-1: ImageMagick regression

3 weeks 3 days ago
USN-6200-2 fixed a vulnerability in ImageMagick. It was discovered that the fix for CVE-2023-34151 was incomplete. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that ImageMagick incorrectly handled memory under certain circumstances. If a user were tricked into opening a specially crafted image file, an attacker could possibly exploit this issue to cause a denial of service or other unspecified impact. (CVE-2023-34151)

LSN-0111-1: Kernel Live Patch Security Notice

3 weeks 3 days ago
It was discovered that the watch_queue event notification system contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or escalate their privileges.)(CVE-2022-0995) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-26928) In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in smb2_is_valid_lease_break() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.)(CVE-2024-35864) In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero- initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.)(CVE-2024-50302) In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set or not. When not set, dvb_register_device() won't check for boundaries, as it will rely that a previous call to dvb_register_adapter() would already be enforcing it. On a similar way, dvb_device_open() uses the assumption that the register functions already did the needed checks. This can be fragile if some device ends using different calls. This also generate warnings on static check analysers like Coverity. So, add explicit guards to prevent potential risk of OOM issues.)(CVE-2024-53063) In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we should bail out.)(CVE-2024-56595) In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.)(CVE-2024-56672) In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL. This could lead to a NULL deref/use-after-free of mst_primary in drm_dp_mst_handle_up_req(). Avoid the above by holding a reference for mst_primary in drm_dp_mst_handle_up_req() while it's used. v2: Fix kfreeing the request if getting an mst_primary reference fails.)(CVE-2024-57798)

USN-7439-1: QuickJS vulnerabilities

3 weeks 4 days ago
It was discovered that QuickJS could be forced to reference uninitialized memory in certain instances. An attacker could possibly use this issue to cause QuickJS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-48183) It was discovered that QuickJS incorrectly managed memory in certain circumstances. An attacker could possibly use this issue to exhaust system resources, resulting in a denial of service. (CVE-2023-48184) It was discovered that QuickJS could be forced to crash due to a failing test. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-33263)

USN-7438-1: 7-Zip vulnerabilities

3 weeks 4 days ago
Igor Pavlov discovered that 7-Zip had several memory-related issues. An attacker could possibly use these issues to cause 7-Zip to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2023-52168, CVE-2023-52169)

USN-7161-3: Docker vulnerability

3 weeks 4 days ago
USN-7161-1 and USN-7161-2 fixed CVE-2024-41110 for source package docker.io in Ubuntu 18.04 LTS and for source package docker.io-app in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. This update fixes it for source package docker.io in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 24.10. These updates only address the docker library and not the docker.io application itself, which was already patched in the previous USNs (USN-7161-1 and USN-7161-2). Original advisory details: Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed for the source package docker.io-app in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. This issue was only addressed for the source package docker.io-app in Ubuntu 24.10 and Ubuntu 24.04 LTS, and the source package docker.io in Ubuntu 18.04 LTS. (CVE-2024-41110)
Checked
56 minutes 55 seconds ago