Ubuntu alert USN-7326-1 (linux-gcp, linux-gcp-6.8, linux-gke, linux-gkeop)
From: | Giampaolo Fresi Roglia <giampaolo.fresi.roglia@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-7326-1] Linux kernel vulnerabilities | |
Date: | Wed, 05 Mar 2025 13:36:10 +0100 | |
Message-ID: | <87wmd3wt6t.fsf@guybrush.castelldefels.cthulhu.home.arpa> |
========================================================================== Ubuntu Security Notice USN-7326-1 March 05, 2025 linux-gcp, linux-gcp-6.8, linux-gke, linux-gkeop vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems Details: Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Media drivers; - Network drivers; (CVE-2024-50274, CVE-2024-53104, CVE-2024-53064) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 24.04 LTS linux-image-6.8.0-1007-gkeop 6.8.0-1007.9 linux-image-6.8.0-1020-gke 6.8.0-1020.24 linux-image-6.8.0-1025-gcp 6.8.0-1025.27 linux-image-6.8.0-1025-gcp-64k 6.8.0-1025.27 linux-image-gcp 6.8.0-1025.27 linux-image-gcp-64k 6.8.0-1025.27 linux-image-gcp-64k-lts-24.04 6.8.0-1025.27 linux-image-gcp-lts-24.04 6.8.0-1025.27 linux-image-gke 6.8.0-1020.24 linux-image-gkeop 6.8.0-1007.9 linux-image-gkeop-6.8 6.8.0-1007.9 Ubuntu 22.04 LTS linux-image-6.8.0-1025-gcp 6.8.0-1025.27~22.04.1 linux-image-6.8.0-1025-gcp-64k 6.8.0-1025.27~22.04.1 linux-image-gcp 6.8.0-1025.27~22.04.1 linux-image-gcp-64k 6.8.0-1025.27~22.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7326-1 CVE-2024-50274, CVE-2024-53064, CVE-2024-53104, CVE-2025-0927 Package Information: https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1025.27 https://launchpad.net/ubuntu/+source/linux-gke/6.8.0-1020.24 https://launchpad.net/ubuntu/+source/linux-gkeop/6.8.0-10... https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-...
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmfIRTolHGdpYW1wYW9s by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92WxlBGDACYHmFb mrh0Y4MOgrBldEMqVLDh5YOgGQWwqKWim+0ozXGZfkn8JEB91cvtt2gwRBunyI83 5N0tDj4kKs3n7d3UN3R/FVDpOPWTJg3cvYYCKhySmeTVKBX3TBLlLyerreBjPOSF rDwEkOkhPQz4dClkQeLCfMD56jYiuNlwllsfCul4cKq0vOGg8ce44ZdEGNWPoKRh X367ZYZC4j2qlYIqOnpXFUD1DgSOOxYAjQE0zNdovZHdki7LxBGfFQfDS9MvHB6E XyemepZYv6cG1FVHeGVYMqYnXRomvTtr0f7noJH4jqj3zugv/XMbQr4+zh6GI8bv lgObgAAce1LnILtuRvUSaeaKjW9zZTTvQKU88hhsVj/yPnw2qtSaBpD2M2OMmOMn xK0/JkQnNAt7LyTYtNo4LGcOcSWiXDl/XbjMfFaUhihCtabvpV1kp6nz/HOfEaf6 Y96GZCod5KQnVB9AoX/3D1HmlV7Zpl3xit2gZMc7qR7nT4Zc9+AHqP0sdBk= =RHhG -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)