Descripción: | Summary: The remote host is missing an update for the 'linux-hwe-5.15' package(s) announced via the USN-7331-1 advisory.
Vulnerability Insight: Attila Szasz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - x86 architecture, - Block layer subsystem, - ACPI drivers, - GPU drivers, - HID subsystem, - I2C subsystem, - IIO ADC drivers, - IIO subsystem, - InfiniBand drivers, - IOMMU subsystem, - IRQ chip drivers, - Multiple devices driver, - Media drivers, - Network drivers, - STMicroelectronics network drivers, - Parport drivers, - Pin controllers subsystem, - Direct Digital Synthesis drivers, - TCM subsystem, - TTY drivers, - USB Dual Role (OTG-ready) Controller drivers, - USB Serial drivers, - USB Type-C support driver, - USB Type-C Connector System Software Interface driver, - BTRFS file system, - File systems infrastructure, - Network file system (NFS) client, - NILFS2 file system, - NTFS3 file system, - SMB network file system, - User-space API (UAPI), - io_uring subsystem, - BPF subsystem, - Timer substystem drivers, - Tracing infrastructure, - Closures library, - Memory management, - Amateur Radio drivers, - Bluetooth subsystem, - Networking core, - IPv4 networking, - MAC80211 subsystem, - Multipath TCP, - Netfilter, - Network traffic control, - SCTP protocol, - XFRM subsystem, - Key management, - FireWire sound drivers, - HD-audio driver, - QCOM ASoC drivers, - STMicroelectronics SoC drivers, - KVM core, (CVE-2024-50163, CVE-2024-53104, CVE-2024-50287, CVE-2024-41066, CVE-2024-53066, CVE-2024-53097, CVE-2024-50229, CVE-2024-50142, CVE-2024-50182, CVE-2024-50156, CVE-2024-50195, CVE-2024-50232, CVE-2024-53063, CVE-2024-50134, CVE-2024-50103, CVE-2024-50110, CVE-2024-50115, CVE-2024-50233, CVE-2024-50202, CVE-2024-50268, CVE-2024-50171, CVE-2024-50234, CVE-2024-50083, CVE-2024-53061, CVE-2024-50194, CVE-2024-40953, CVE-2024-50143, CVE-2024-50278, CVE-2024-50257, CVE-2024-56672, CVE-2024-50141, CVE-2024-50128, CVE-2024-50117, CVE-2024-50292, CVE-2024-50148, CVE-2024-53055, CVE-2024-35887, CVE-2024-50236, CVE-2024-50249, CVE-2024-50282, CVE-2024-50218, CVE-2023-52913, CVE-2024-50262, CVE-2024-50269, CVE-2024-50010, CVE-2024-50299, CVE-2024-39497, CVE-2024-50296, CVE-2024-53052, CVE-2024-53058, CVE-2024-50201, CVE-2024-42291, CVE-2024-50036, CVE-2024-50154, CVE-2024-50196, CVE-2024-50251, CVE-2024-41080, CVE-2024-50074, CVE-2024-50205, CVE-2024-50131, CVE-2024-42252, CVE-2024-50082, CVE-2024-50273, CVE-2024-50072, CVE-2024-50301, CVE-2024-53088, CVE-2024-50058, CVE-2024-50085, CVE-2024-50167, CVE-2024-50150, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux-hwe-5.15' package(s) on Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 6.8
CVSS Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
|