==========================================================================
Ubuntu Security Notice USN-7288-2
February 25, 2025

linux-lowlatency-hwe-5.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-lowlatency-hwe-5.15: Linux low latency kernel

Details:

Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
  - ARM64 architecture;
  - x86 architecture;
  - Block layer subsystem;
  - ACPI drivers;
  - GPU drivers;
  - HID subsystem;
  - I2C subsystem;
  - IIO ADC drivers;
  - IIO subsystem;
  - InfiniBand drivers;
  - IOMMU subsystem;
  - IRQ chip drivers;
  - Multiple devices driver;
  - Media drivers;
  - Network drivers;
  - STMicroelectronics network drivers;
  - Parport drivers;
  - Pin controllers subsystem;
  - Direct Digital Synthesis drivers;
  - TCM subsystem;
  - TTY drivers;
  - USB Dual Role (OTG-ready) Controller drivers;
  - USB Serial drivers;
  - USB Type-C support driver;
  - USB Type-C Connector System Software Interface driver;
  - BTRFS file system;
  - File systems infrastructure;
  - Network file system (NFS) client;
  - NILFS2 file system;
  - NTFS3 file system;
  - SMB network file system;
  - User-space API (UAPI);
  - io_uring subsystem;
  - BPF subsystem;
  - Timer substystem drivers;
  - Tracing infrastructure;
  - Closures library;
  - Memory management;
  - Amateur Radio drivers;
  - Bluetooth subsystem;
  - Networking core;
  - IPv4 networking;
  - MAC80211 subsystem;
  - Multipath TCP;
  - Netfilter;
  - Network traffic control;
  - SCTP protocol;
  - XFRM subsystem;
  - Key management;
  - FireWire sound drivers;
  - HD-audio driver;
  - QCOM ASoC drivers;
  - STMicroelectronics SoC drivers;
  - KVM core;
(CVE-2024-50151, CVE-2024-50195, CVE-2024-50117, CVE-2024-53104,
CVE-2024-50171, CVE-2024-53059, CVE-2024-50160, CVE-2024-50163,
CVE-2024-50103, CVE-2024-50245, CVE-2024-50282, CVE-2024-50233,
CVE-2024-50218, CVE-2024-50201, CVE-2024-53058, CVE-2024-50115,
CVE-2024-53101, CVE-2024-50268, CVE-2024-50127, CVE-2024-50182,
CVE-2024-50148, CVE-2024-50295, CVE-2024-53061, CVE-2024-50232,
CVE-2024-50010, CVE-2024-50273, CVE-2024-50267, CVE-2024-50198,
CVE-2024-53097, CVE-2024-50150, CVE-2024-50278, CVE-2024-50301,
CVE-2024-50290, CVE-2024-50185, CVE-2024-50036, CVE-2024-50296,
CVE-2024-50082, CVE-2024-50058, CVE-2024-53063, CVE-2024-50192,
CVE-2024-50208, CVE-2024-53052, CVE-2024-50162, CVE-2024-50247,
CVE-2024-50302, CVE-2024-50153, CVE-2024-50143, CVE-2024-41080,
CVE-2024-50287, CVE-2024-39497, CVE-2024-50156, CVE-2024-42252,
CVE-2024-53055, CVE-2024-50265, CVE-2024-50230, CVE-2024-50269,
CVE-2024-50167, CVE-2024-50237, CVE-2024-50168, CVE-2023-52913,
CVE-2024-35887, CVE-2024-50299, CVE-2024-53088, CVE-2024-50209,
CVE-2024-50234, CVE-2024-50131, CVE-2024-50141, CVE-2024-40965,
CVE-2024-41066, CVE-2024-50251, CVE-2024-50292, CVE-2024-50194,
CVE-2024-50085, CVE-2024-50154, CVE-2024-50202, CVE-2024-50074,
CVE-2024-50199, CVE-2024-50110, CVE-2024-26718, CVE-2024-50205,
CVE-2024-53042, CVE-2024-50279, CVE-2024-50101, CVE-2024-50116,
CVE-2024-50236, CVE-2024-50083, CVE-2024-50262, CVE-2024-40953,
CVE-2024-50142, CVE-2024-50128, CVE-2024-50099, CVE-2024-50086,
CVE-2024-42291, CVE-2024-50257, CVE-2024-50229, CVE-2024-50134,
CVE-2024-50244, CVE-2024-50249, CVE-2024-50193, CVE-2024-50072,
CVE-2024-50259, CVE-2024-50196, CVE-2024-53066)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
  linux-image-5.15.0-133-lowlatency  5.15.0-133.143~20.04.1
  linux-image-5.15.0-133-lowlatency-64k  5.15.0-133.143~20.04.1
  linux-image-lowlatency-64k-hwe-20.04  5.15.0.133.143~20.04.1
  linux-image-lowlatency-hwe-20.04  5.15.0.133.143~20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://ubuntu.com/security/notices/USN-7288-2
  https://ubuntu.com/security/notices/USN-7288-1
  CVE-2023-52913, CVE-2024-26718, CVE-2024-35887, CVE-2024-39497,
  CVE-2024-40953, CVE-2024-40965, CVE-2024-41066, CVE-2024-41080,
  CVE-2024-42252, CVE-2024-42291, CVE-2024-50010, CVE-2024-50036,
  CVE-2024-50058, CVE-2024-50072, CVE-2024-50074, CVE-2024-50082,
  CVE-2024-50083, CVE-2024-50085, CVE-2024-50086, CVE-2024-50099,
  CVE-2024-50101, CVE-2024-50103, CVE-2024-50110, CVE-2024-50115,
  CVE-2024-50116, CVE-2024-50117, CVE-2024-50127, CVE-2024-50128,
  CVE-2024-50131, CVE-2024-50134, CVE-2024-50141, CVE-2024-50142,
  CVE-2024-50143, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151,
  CVE-2024-50153, CVE-2024-50154, CVE-2024-50156, CVE-2024-50160,
  CVE-2024-50162, CVE-2024-50163, CVE-2024-50167, CVE-2024-50168,
  CVE-2024-50171, CVE-2024-50182, CVE-2024-50185, CVE-2024-50192,
  CVE-2024-50193, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196,
  CVE-2024-50198, CVE-2024-50199, CVE-2024-50201, CVE-2024-50202,
  CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50218,
  CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233,
  CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50244,
  CVE-2024-50245, CVE-2024-50247, CVE-2024-50249, CVE-2024-50251,
  CVE-2024-50257, CVE-2024-50259, CVE-2024-50262, CVE-2024-50265,
  CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50273,
  CVE-2024-50278, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287,
  CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296,
  CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042,
  CVE-2024-53052, CVE-2024-53055, CVE-2024-53058, CVE-2024-53059,
  CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53088,
  CVE-2024-53097, CVE-2024-53101, CVE-2024-53104, CVE-2025-0927

Package Information:
  
https://launchpad.net/ubuntu/+source/linux-lowlatency-hwe-5.15/5.15.0-133.143~20.04.1

Attachment: signature.asc
Description: PGP signature



Reply via email to