Description: | Summary: The remote host is missing an update for the 'linux, linux-hwe-5.4' package(s) announced via the USN-7293-1 advisory.
Vulnerability Insight: Attila Szasz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture, - Block layer subsystem, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - TPM device driver, - GPIO subsystem, - GPU drivers, - HID subsystem, - I2C subsystem, - InfiniBand drivers, - Mailbox framework, - Multiple devices driver, - Media drivers, - Network drivers, - NTB driver, - Virtio pmem driver, - Parport drivers, - PCI subsystem, - SPI subsystem, - Direct Digital Synthesis drivers, - USB Device Class drivers, - USB Dual Role (OTG-ready) Controller drivers, - USB Serial drivers, - USB Type-C support driver, - Framebuffer layer, - BTRFS file system, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - File systems infrastructure, - JFS file system, - Network file system (NFS) client, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - Network traffic control, - Network sockets, - TCP network protocol, - BPF subsystem, - Perf events, - Arbitrary resource management, - Timer substystem drivers, - Tracing infrastructure, - Closures library, - Memory management, - Amateur Radio drivers, - Bluetooth subsystem, - Ethernet bridge, - CAN network layer, - Networking core, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - Netfilter, - Netlink, - SCTP protocol, - TIPC protocol, - Wireless networking, - XFRM subsystem, - Key management, - FireWire sound drivers, - AudioScience HPI driver, - Amlogic Meson SoC drivers, - KVM core, (CVE-2024-50184, CVE-2024-47706, CVE-2024-49962, CVE-2024-35887, CVE-2024-53101, CVE-2024-50199, CVE-2024-47709, CVE-2024-50074, CVE-2024-41066, CVE-2024-42252, CVE-2024-43863, CVE-2024-47685, CVE-2024-47756, CVE-2024-50282, CVE-2024-50143, CVE-2024-50116, CVE-2024-47699, CVE-2024-47698, CVE-2024-50301, CVE-2024-47723, CVE-2024-50296, CVE-2024-50007, CVE-2024-49952, CVE-2024-50233, CVE-2023-52458, CVE-2024-53063, CVE-2024-49975, CVE-2024-50099, CVE-2024-47742, CVE-2024-50033, CVE-2024-50218, CVE-2024-50096, CVE-2024-49981, CVE-2024-40911, CVE-2024-47697, CVE-2024-49894, CVE-2024-49955, CVE-2024-53104, CVE-2024-49963, CVE-2024-49883, CVE-2024-47710, CVE-2024-49959, CVE-2024-49948, CVE-2024-50302, CVE-2024-49867, CVE-2024-50234, CVE-2024-49902, CVE-2024-50006, CVE-2024-47672, CVE-2024-50202, CVE-2024-49851, CVE-2024-35896, CVE-2024-50150, CVE-2024-53061, CVE-2024-46854, CVE-2024-50279, CVE-2024-50278, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux, linux-hwe-5.4' package(s) on Ubuntu 18.04, Ubuntu 20.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|