Description: | Summary: The remote host is missing an update for the 'linux, linux-lowlatency, linux-lowlatency-hwe-6.8' package(s) announced via the USN-7301-1 advisory.
Vulnerability Insight: Attila Szasz discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture, - x86 architecture, - Block layer subsystem, - Cryptographic API, - ACPI drivers, - Drivers core, - ATA over ethernet (AOE) driver, - Network block device driver, - TPM device driver, - Hardware crypto device drivers, - ARM SCMI message protocol, - EFI core, - GPU drivers, - I2C subsystem, - I3C subsystem, - InfiniBand drivers, - Input Device core drivers, - IOMMU subsystem, - Mailbox framework, - Media drivers, - Ethernet bonding driver, - Network drivers, - Mellanox network drivers, - STMicroelectronics network drivers, - NTB driver, - PCI subsystem, - Alibaba DDR Sub-System Driveway PMU driver, - x86 platform drivers, - Powercap sysfs driver, - Remote Processor subsystem, - SCSI subsystem, - USB Device Class drivers, - vDPA drivers, - Virtio Host (VHOST) subsystem, - Framebuffer layer, - AFS file system, - BTRFS file system, - File systems infrastructure, - Ceph distributed file system, - Ext4 file system, - F2FS file system, - JFS file system, - Network file systems library, - Network file system (NFS) server daemon, - NILFS2 file system, - SMB network file system, - BPF subsystem, - Virtio network driver, - TCP network protocol, - Perf events, - Padata parallel execution mechanism, - RCU subsystem, - Arbitrary resource management, - Static call mechanism, - Tracing infrastructure, - Memory management, - Bluetooth subsystem, - CAN network layer, - Networking core, - Distributed Switch Architecture, - IPv4 networking, - IPv6 networking, - MAC80211 subsystem, - IEEE 802.15.4 subsystem, - NCSI (Network Controller Sideband Interface) driver, - RxRPC session sockets, - SCTP protocol, - TIPC protocol, - Wireless networking, - AudioScience HPI driver, - KVM core, (CVE-2024-47748, CVE-2024-49935, CVE-2024-49892, CVE-2024-49960, CVE-2024-49886, CVE-2024-47757, CVE-2024-47741, CVE-2024-49879, CVE-2024-49983, CVE-2024-47687, CVE-2024-49948, CVE-2024-49902, CVE-2024-49969, CVE-2024-49903, CVE-2024-47675, CVE-2024-47713, CVE-2024-47750, CVE-2024-49951, CVE-2024-49936, CVE-2024-49913, CVE-2024-47684, CVE-2024-49917, CVE-2024-47693, CVE-2024-49871, CVE-2024-47740, CVE-2024-49927, CVE-2024-47698, CVE-2024-49996, CVE-2024-47682, CVE-2024-49889, CVE-2024-49888, CVE-2024-47737, CVE-2024-49881, CVE-2023-52917, CVE-2024-47695, CVE-2024-50015, CVE-2024-49965, CVE-2024-50179, CVE-2024-47677, ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'linux, linux-lowlatency, linux-lowlatency-hwe-6.8' package(s) on Ubuntu 22.04, Ubuntu 24.04.
Solution: Please install the updated package(s).
CVSS Score: 9.4
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:N/A:C
|