Ubuntu alert USN-7328-1 (linux-aws, linux-gkeop, linux-ibm, linux-intel-iotg, linux-intel-iotg-5.15, linux-oracle, linux-oracle-5.15, linux-raspi)
| From: | Giampaolo Fresi Roglia <giampaolo.fresi.roglia@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7328-1] Linux kernel vulnerabilities | |
| Date: | Wed, 05 Mar 2025 15:04:30 +0100 | |
| Message-ID: | <87r03bwp3l.fsf@guybrush.castelldefels.cthulhu.home.arpa> |
========================================================================== Ubuntu Security Notice USN-7328-1 March 05, 2025 linux-aws, linux-gkeop, linux-ibm, linux-intel-iotg, linux-intel-iotg-5.15, linux-oracle, linux-oracle-5.15, linux-raspi vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-intel-iotg: Linux kernel for Intel IoT platforms - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms - linux-oracle-5.15: Linux kernel for Oracle Cloud systems Details: Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Block layer subsystem; (CVE-2024-56672) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS linux-image-5.15.0-1061-gkeop 5.15.0-1061.69 linux-image-5.15.0-1071-ibm 5.15.0-1071.74 linux-image-5.15.0-1073-raspi 5.15.0-1073.76 linux-image-5.15.0-1074-intel-iotg 5.15.0-1074.80 linux-image-5.15.0-1076-oracle 5.15.0-1076.82 linux-image-5.15.0-1079-aws 5.15.0-1079.86 linux-image-aws-lts-22.04 5.15.0.1079.81 linux-image-gkeop 5.15.0.1061.60 linux-image-gkeop-5.15 5.15.0.1061.60 linux-image-ibm 5.15.0.1071.67 linux-image-intel-iotg 5.15.0.1074.74 linux-image-oracle-lts-22.04 5.15.0.1076.72 linux-image-raspi 5.15.0.1073.71 linux-image-raspi-nolpae 5.15.0.1073.71 Ubuntu 20.04 LTS linux-image-5.15.0-1074-intel-iotg 5.15.0-1074.80~20.04.1 linux-image-5.15.0-1076-oracle 5.15.0-1076.82~20.04.1 linux-image-intel 5.15.0.1074.80~20.04.1 linux-image-intel-iotg 5.15.0.1074.80~20.04.1 linux-image-oracle 5.15.0.1076.82~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7328-1 CVE-2024-56672, CVE-2025-0927 Package Information: https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-107... https://launchpad.net/ubuntu/+source/linux-gkeop/5.15.0-1... https://launchpad.net/ubuntu/+source/linux-ibm/5.15.0-107... https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.1... https://launchpad.net/ubuntu/+source/linux-oracle/5.15.0-... https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1... https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.1... https://launchpad.net/ubuntu/+source/linux-oracle-5.15/5....
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmfIWe4lHGdpYW1wYW9s by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92Wxs95DACW0h81 GohmsBpdwzGkKmVQmBi6fjXXsnvRoVG748Y2r+I+479aHst7bVotX56u9WfxIHfx EVOVTaDi0myd5wlljKceocG/h0EsxrJHLOH4q/R8A6yi+LKGSCN+9vSLvFCT8WDH LtTsgrJeqqE1jOtEuh5Na1OfcIXGcUMddJuNlpenxBcLQOiw9JxYzNTDh2gxq1oB BvB1+oFHdfZB+TB3jsjA97kt/Gx5QhEwIce9b4bWBorD2eAQqegP8MbE87AT0NTs 1f5cdxW0Voih2FQlqoiJ3QIYlq2ETfQl5B05kO7KKL9fuP1ljE6xQFGrUHnF8O96 spzbYD5RX+6zB3cjcfrw14Fa1gy3Hyp6n1r3d2s2vgOd+72XSB01+poLPLH4r4wl 4k8qQ8+PJo2ZxAsdcHwEXC2QTGdZjJFAWy9fXEWVx8Fosd0t2SLbNLtOiVIKEGJm MWnNG3XjrUY8db1lOLGODQYUZOuZCxI5eyAU/K+fueOkovH39m8KqPcHjUU= =DGYd -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)
