Ubuntu alert USN-7797-3 (linux-aws)
| From: | Rodrigo Figueiredo Zaiden <rodrigo.zaiden@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7797-3] Linux kernel (AWS) vulnerabilities | |
| Date: | Tue, 21 Oct 2025 19:27:10 -0300 | |
| Message-ID: | <9e34ef02-4e15-4b42-a732-b7641548410e@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7797-3 October 21, 2025 linux-aws vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-aws: Linux kernel for Amazon Web Services (AWS) systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Virtio block driver; - Media drivers; - Network drivers; - Framebuffer layer; - BTRFS file system; - Ext4 file system; - Network file system (NFS) server daemon; - Packet sockets; - VMware vSockets driver; (CVE-2025-38618, CVE-2024-35849, CVE-2025-37785, CVE-2024-49924, CVE-2025-38617, CVE-2024-27078, CVE-2021-47149, CVE-2021-47319, CVE-2025-21796, CVE-2021-47589) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS linux-image-4.4.0-1186-aws 4.4.0-1186.201 Available with Ubuntu Pro linux-image-aws 4.4.0.1186.190 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7797-3 https://ubuntu.com/security/notices/USN-7797-2 https://ubuntu.com/security/notices/USN-7797-1 CVE-2021-47149, CVE-2021-47319, CVE-2021-47589, CVE-2024-27078, CVE-2024-35849, CVE-2024-49924, CVE-2025-21796, CVE-2025-37785, CVE-2025-38617, CVE-2025-38618
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmj4CL4FAwAAAAAACgkQZ0GeRcM5nt24 Cwf+KPVYjO3z3OLMjj87mCvR1K4IIJPtBSaF1uI57bu9qznYXBzWGhUJdiLxVbWFecQenEuSnFRK 214sGdj9MHuxNeSBReGOGw/ipMOiSECOMGe89u6DUFUp0om/jT/idObLWDnC/wfVReKINNFAHybs PTSvb+Bm9UlxUxrzPR6YkZATFfx3ffMV0ZIaYTx3CEr7x0nF/VJVOTyRodjiTZ+Mc0chGSOzOOsy 4IPpxIvVwVxrDoI91pqkchHsE2xcYluH38tEAVTrDIxRv8LOuSLitHZ2ye3+6di2x0lb/7KrGnjN eYyRUx0Tf9ntZ8CC0nZa4Wp4uE4uni37YYQ5F49oUA== =KAUP -----END PGP SIGNATURE-----
