Ubuntu

USN-7277-1: Linux kernel vulnerabilities

18 hours 3 minutes ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - Buffer Sharing and Synchronization framework; - EDAC drivers; - FireWire subsystem; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Powercap sysfs driver; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - UBI file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Bluetooth subsystem; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Perf events; - Kernel fork() syscall; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Task handling mechanism; - Timer substystem drivers; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - IUCV driver; - L2TP protocol; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; - KVM core; (CVE-2024-50030, CVE-2024-47689, CVE-2024-50088, CVE-2024-50154, CVE-2024-49994, CVE-2024-50243, CVE-2024-50284, CVE-2024-50207, CVE-2024-53200, CVE-2024-53155, CVE-2024-50179, CVE-2024-50171, CVE-2024-53167, CVE-2024-49885, CVE-2024-49869, CVE-2024-49934, CVE-2024-53089, CVE-2024-50196, CVE-2024-53090, CVE-2024-47675, CVE-2024-47690, CVE-2024-56674, CVE-2024-50082, CVE-2024-47742, CVE-2024-53220, CVE-2024-50172, CVE-2024-50009, CVE-2024-49881, CVE-2024-50249, CVE-2024-47752, CVE-2024-56707, CVE-2024-53105, CVE-2024-53048, CVE-2024-50148, CVE-2024-50036, CVE-2024-53141, CVE-2024-50213, CVE-2024-49911, CVE-2024-50285, CVE-2024-56535, CVE-2024-49882, CVE-2024-50225, CVE-2024-50090, CVE-2024-53063, CVE-2024-56703, CVE-2024-47687, CVE-2024-53079, CVE-2024-47744, CVE-2024-50020, CVE-2024-53078, CVE-2024-53176, CVE-2024-53183, CVE-2024-50248, CVE-2024-50283, CVE-2024-49907, CVE-2024-50084, CVE-2024-56541, CVE-2024-49979, CVE-2024-53175, CVE-2024-49871, CVE-2024-47678, CVE-2024-47720, CVE-2024-53059, CVE-2024-56685, CVE-2024-56702, CVE-2024-50071, CVE-2024-56534, CVE-2024-56745, CVE-2024-53154, CVE-2024-47736, CVE-2024-49965, CVE-2024-47701, CVE-2024-50159, CVE-2024-50040, CVE-2024-50274, CVE-2024-49876, CVE-2024-49895, CVE-2024-50189, CVE-2024-56704, CVE-2024-47681, CVE-2024-53106, CVE-2024-56744, CVE-2024-53197, CVE-2024-50120, CVE-2024-50204, CVE-2024-50184, CVE-2024-53095, CVE-2024-50101, CVE-2024-53146, CVE-2024-50256, CVE-2024-53226, CVE-2024-47712, CVE-2024-50137, CVE-2024-53131, CVE-2024-49888, CVE-2024-50235, CVE-2024-50047, CVE-2024-50224, CVE-2024-50142, CVE-2024-50200, CVE-2024-53085, CVE-2024-49892, CVE-2024-50263, CVE-2024-53150, CVE-2024-53121, CVE-2024-49977, CVE-2024-50144, CVE-2024-50127, CVE-2024-53092, CVE-2024-50265, CVE-2024-56691, CVE-2024-53069, CVE-2024-49902, CVE-2024-47715, CVE-2024-56720, CVE-2024-53127, CVE-2024-53142, CVE-2024-49862, CVE-2024-49918, CVE-2024-56684, CVE-2024-50208, CVE-2024-53189, CVE-2024-50103, CVE-2024-56756, CVE-2024-50273, CVE-2024-56536, CVE-2024-53068, CVE-2024-49878, CVE-2024-47705, CVE-2024-53113, CVE-2024-50129, CVE-2024-49942, CVE-2024-50100, CVE-2024-49930, CVE-2024-50043, CVE-2024-53198, CVE-2024-49861, CVE-2024-50124, CVE-2024-50209, CVE-2024-53187, CVE-2024-49864, CVE-2024-56689, CVE-2024-50294, CVE-2024-47706, CVE-2024-50186, CVE-2024-53086, CVE-2024-49954, CVE-2024-56692, CVE-2024-47679, CVE-2024-53109, CVE-2024-50001, CVE-2024-49983, CVE-2024-56679, CVE-2024-50034, CVE-2024-50276, CVE-2024-56680, CVE-2024-49988, CVE-2024-53099, CVE-2024-50021, CVE-2024-50022, CVE-2024-50136, CVE-2024-53193, CVE-2024-50220, CVE-2024-49858, CVE-2024-50229, CVE-2024-50074, CVE-2024-50002, CVE-2024-53117, CVE-2024-50176, CVE-2024-50075, CVE-2024-50045, CVE-2024-49924, CVE-2024-47686, CVE-2024-50104, CVE-2024-47714, CVE-2024-50291, CVE-2024-49929, CVE-2024-53215, CVE-2024-50157, CVE-2024-50147, CVE-2024-49898, CVE-2024-50164, CVE-2024-47711, CVE-2024-53082, CVE-2024-50230, CVE-2024-50152, CVE-2024-53218, CVE-2024-53199, CVE-2024-50253, CVE-2024-47754, CVE-2024-49910, CVE-2024-53137, CVE-2024-50128, CVE-2024-50044, CVE-2024-47719, CVE-2024-53188, CVE-2024-53061, CVE-2024-49944, CVE-2024-50091, CVE-2024-49945, CVE-2024-50119, CVE-2024-50133, CVE-2024-50033, CVE-2024-53083, CVE-2024-50138, CVE-2024-49872, CVE-2024-50140, CVE-2024-56727, CVE-2024-50003, CVE-2024-50015, CVE-2024-50303, CVE-2024-50258, CVE-2024-49867, CVE-2024-50116, CVE-2024-47716, CVE-2024-50132, CVE-2024-50055, CVE-2024-49950, CVE-2024-50203, CVE-2024-47695, CVE-2024-50250, CVE-2024-50165, CVE-2024-50156, CVE-2024-56700, CVE-2024-49913, CVE-2024-50281, CVE-2024-53045, CVE-2024-49998, CVE-2024-53180, CVE-2024-50271, CVE-2024-50286, CVE-2024-49887, CVE-2024-53168, CVE-2024-47676, CVE-2024-47726, CVE-2024-47732, CVE-2024-47704, CVE-2024-49980, CVE-2024-49931, CVE-2024-53229, CVE-2024-50141, CVE-2024-50282, CVE-2024-50233, CVE-2024-56725, CVE-2024-50239, CVE-2024-50299, CVE-2024-50218, CVE-2024-53072, CVE-2024-49903, CVE-2024-50163, CVE-2024-53100, CVE-2024-50146, CVE-2024-49859, CVE-2024-50227, CVE-2024-50188, CVE-2024-56739, CVE-2024-53217, CVE-2024-53118, CVE-2024-49946, CVE-2024-53212, CVE-2024-49926, CVE-2024-53177, CVE-2024-56741, CVE-2024-53234, CVE-2024-49932, CVE-2024-50095, CVE-2024-50190, CVE-2024-49995, CVE-2024-49976, CVE-2024-49906, CVE-2024-49996, CVE-2024-53049, CVE-2024-47751, CVE-2024-56677, CVE-2024-56724, CVE-2024-47746, CVE-2024-50245, CVE-2024-53236, CVE-2024-53191, CVE-2024-50112, CVE-2024-49937, CVE-2024-50234, CVE-2024-50067, CVE-2024-53112, CVE-2024-50017, CVE-2024-50008, CVE-2024-50194, CVE-2024-50076, CVE-2024-47697, CVE-2024-56693, CVE-2024-50280, CVE-2024-50182, CVE-2024-53237, CVE-2024-50011, CVE-2024-49912, CVE-2024-50217, CVE-2024-56532, CVE-2024-53221, CVE-2024-50206, CVE-2024-47700, CVE-2024-56537, CVE-2024-49959, CVE-2024-56681, CVE-2024-49936, CVE-2024-49900, CVE-2024-53077, CVE-2024-56705, CVE-2024-53125, CVE-2024-49968, CVE-2024-49969, CVE-2024-56545, CVE-2024-50106, CVE-2024-53160, CVE-2024-50013, CVE-2024-49880, CVE-2024-53228, CVE-2024-50177, CVE-2024-47684, CVE-2024-47739, CVE-2024-50029, CVE-2024-53194, CVE-2024-50237, CVE-2024-50035, CVE-2024-49941, CVE-2024-49947, CVE-2024-50289, CVE-2024-49949, CVE-2024-50023, CVE-2024-50139, CVE-2024-49886, CVE-2024-50026, CVE-2024-56748, CVE-2024-53080, CVE-2024-56754, CVE-2024-49999, CVE-2024-49963, CVE-2024-49855, CVE-2024-50252, CVE-2024-49975, CVE-2024-50107, CVE-2024-56749, CVE-2024-49928, CVE-2024-49865, CVE-2024-50125, CVE-2024-49899, CVE-2024-47750, CVE-2024-53152, CVE-2024-50081, CVE-2024-49891, CVE-2024-49927, CVE-2024-49852, CVE-2024-50085, CVE-2024-50185, CVE-2024-50205, CVE-2024-49896, CVE-2024-50278, CVE-2024-49866, CVE-2024-53190, CVE-2024-50251, CVE-2024-50269, CVE-2024-49889, CVE-2024-50037, CVE-2024-53144, CVE-2024-53138, CVE-2024-50087, CVE-2024-56678, CVE-2024-53087, CVE-2024-50180, CVE-2024-49940, CVE-2024-50019, CVE-2024-53149, CVE-2024-50122, CVE-2024-50038, CVE-2024-53156, CVE-2024-49943, CVE-2024-50113, CVE-2024-47721, CVE-2024-53076, CVE-2024-50115, CVE-2024-50178, CVE-2024-50268, CVE-2024-50279, CVE-2024-53134, CVE-2024-50199, CVE-2024-49989, CVE-2024-47671, CVE-2024-49909, CVE-2024-53173, CVE-2024-53053, CVE-2024-53088, CVE-2024-50078, CVE-2024-50105, CVE-2024-50223, CVE-2024-50126, CVE-2024-47680, CVE-2024-47724, CVE-2024-53047, CVE-2024-50060, CVE-2024-53056, CVE-2024-49987, CVE-2024-49879, CVE-2024-53128, CVE-2024-53123, CVE-2024-49981, CVE-2024-50277, CVE-2024-50166, CVE-2024-53067, CVE-2024-49964, CVE-2024-56728, CVE-2024-49853, CVE-2024-53064, CVE-2024-56531, CVE-2024-53213, CVE-2024-50246, CVE-2024-50192, CVE-2024-53184, CVE-2024-56697, CVE-2024-47710, CVE-2024-53052, CVE-2024-47718, CVE-2024-49938, CVE-2024-49893, CVE-2024-53133, CVE-2024-50096, CVE-2024-53129, CVE-2024-49951, CVE-2024-53181, CVE-2024-50059, CVE-2024-50193, CVE-2024-53120, CVE-2024-50114, CVE-2024-49962, CVE-2024-49921, CVE-2024-50298, CVE-2024-50255, CVE-2024-53219, CVE-2024-49905, CVE-2024-50211, CVE-2024-49860, CVE-2024-47727, CVE-2024-50028, CVE-2024-47723, CVE-2024-53081, CVE-2024-56683, CVE-2024-49897, CVE-2024-50065, CVE-2024-56708, CVE-2024-50151, CVE-2023-52917, CVE-2024-56538, CVE-2024-47691, CVE-2024-53196, CVE-2024-50150, CVE-2024-50069, CVE-2024-50301, CVE-2024-50131, CVE-2024-53110, CVE-2024-56701, CVE-2024-53115, CVE-2024-53062, CVE-2024-50058, CVE-2024-53148, CVE-2024-53147, CVE-2024-50226, CVE-2024-56540, CVE-2024-53124, CVE-2024-50170, CVE-2024-50266, CVE-2024-50296, CVE-2024-49953, CVE-2024-47692, CVE-2024-49916, CVE-2024-53239, CVE-2024-50173, CVE-2024-49868, CVE-2024-47677, CVE-2024-49972, CVE-2024-50130, CVE-2024-56698, CVE-2024-50231, CVE-2024-50272, CVE-2024-53153, CVE-2024-50158, CVE-2024-53046, CVE-2024-49908, CVE-2024-47709, CVE-2024-53058, CVE-2024-50006, CVE-2024-49948, CVE-2024-47685, CVE-2024-47693, CVE-2024-50260, CVE-2024-50079, CVE-2024-50149, CVE-2024-53151, CVE-2024-47757, CVE-2024-49917, CVE-2024-50288, CVE-2024-50117, CVE-2024-50039, CVE-2024-56690, CVE-2024-50293, CVE-2024-50145, CVE-2024-53166, CVE-2024-47713, CVE-2024-53158, CVE-2024-50068, CVE-2024-53074, CVE-2024-49914, CVE-2024-49870, CVE-2024-50031, CVE-2024-47735, CVE-2024-50007, CVE-2024-49915, CVE-2024-47699, CVE-2024-50244, CVE-2024-50216, CVE-2024-53114, CVE-2024-53043, CVE-2024-47688, CVE-2024-47734, CVE-2024-53230, CVE-2024-53122, CVE-2024-50123, CVE-2024-53116, CVE-2024-56726, CVE-2024-56747, CVE-2024-56548, CVE-2024-50174, CVE-2024-53042, CVE-2024-53135, CVE-2024-50080, CVE-2024-49997, CVE-2024-49974, CVE-2024-53145, CVE-2024-53075, CVE-2024-47730, CVE-2024-50304, CVE-2024-50161, CVE-2024-49883, CVE-2024-53111, CVE-2024-53233, CVE-2024-47698, CVE-2024-50012, CVE-2024-50240, CVE-2024-53163, CVE-2024-53071, CVE-2024-50168, CVE-2024-47740, CVE-2024-50275, CVE-2024-49961, CVE-2024-50183, CVE-2024-53203, CVE-2024-47738, CVE-2024-49856, CVE-2024-50014, CVE-2024-50191, CVE-2024-46869, CVE-2024-56721, CVE-2024-50056, CVE-2024-53210, CVE-2024-49978, CVE-2024-53161, CVE-2024-50155, CVE-2024-50270, CVE-2024-50169, CVE-2024-49952, CVE-2024-50236, CVE-2024-49863, CVE-2024-49857, CVE-2024-53140, CVE-2024-53107, CVE-2024-50247, CVE-2024-53084, CVE-2024-50077, CVE-2024-50121, CVE-2024-53091, CVE-2024-49925, CVE-2024-47745, CVE-2024-50086, CVE-2024-53101, CVE-2024-56729, CVE-2024-56751, CVE-2024-50016, CVE-2024-49901, CVE-2024-47694, CVE-2024-53098, CVE-2024-53232, CVE-2024-50108, CVE-2024-50197, CVE-2024-50242, CVE-2024-50222, CVE-2024-53132, CVE-2024-50212, CVE-2024-49933, CVE-2024-53169, CVE-2024-49957, CVE-2024-56533, CVE-2024-47708, CVE-2024-50267, CVE-2024-56723, CVE-2024-50110, CVE-2024-50064, CVE-2024-56722, CVE-2024-53130, CVE-2024-53208, CVE-2024-50102, CVE-2024-50153, CVE-2024-49939, CVE-2024-53094, CVE-2024-50262, CVE-2024-49850, CVE-2024-53195, CVE-2024-53170, CVE-2024-50093, CVE-2024-53223, CVE-2024-53093, CVE-2024-56699, CVE-2024-50070, CVE-2024-49992, CVE-2024-50111, CVE-2024-47728, CVE-2024-53202, CVE-2024-47741, CVE-2024-49920, CVE-2024-56694, CVE-2024-53126, CVE-2024-49851, CVE-2024-50099, CVE-2024-50302, CVE-2024-50214, CVE-2024-49973, CVE-2024-50024, CVE-2024-50162, CVE-2024-53214, CVE-2024-50073, CVE-2024-50061, CVE-2024-56549, CVE-2024-56688, CVE-2024-49960, CVE-2024-56543, CVE-2024-53178, CVE-2024-50027, CVE-2024-50295, CVE-2024-53104, CVE-2024-53065, CVE-2024-47747, CVE-2024-49991, CVE-2024-50202, CVE-2024-49935, CVE-2024-50062, CVE-2024-50094, CVE-2024-56544, CVE-2024-50010, CVE-2024-49971, CVE-2024-50083, CVE-2024-56687, CVE-2024-47753, CVE-2024-50297, CVE-2024-47733, CVE-2024-50135, CVE-2024-50066, CVE-2024-50118, CVE-2024-56746, CVE-2024-47682, CVE-2024-53165, CVE-2024-50025, CVE-2024-49875, CVE-2024-47717, CVE-2024-49894, CVE-2024-50198, CVE-2024-50167, CVE-2024-49958, CVE-2024-49966, CVE-2024-50254, CVE-2024-49904, CVE-2024-50041, CVE-2024-50005, CVE-2024-53066, CVE-2024-50000, CVE-2024-50215, CVE-2024-47748, CVE-2024-56742, CVE-2024-50259, CVE-2024-50092, CVE-2024-47737, CVE-2024-53238, CVE-2024-50300, CVE-2024-53192, CVE-2024-47696, CVE-2024-50134, CVE-2024-50201, CVE-2024-50181, CVE-2024-49873, CVE-2024-50187, CVE-2024-53171, CVE-2024-50160, CVE-2024-49923, CVE-2024-50063, CVE-2024-53174, CVE-2024-50143, CVE-2024-49982, CVE-2024-56546, CVE-2024-50109, CVE-2024-53119, CVE-2024-47707, CVE-2024-56696, CVE-2024-53108, CVE-2024-47731, CVE-2024-50261, CVE-2024-50042, CVE-2024-49884, CVE-2024-53162, CVE-2024-56755, CVE-2024-49919, CVE-2024-53216, CVE-2024-50287, CVE-2024-53143, CVE-2024-50257, CVE-2024-49890, CVE-2024-53172, CVE-2024-53209, CVE-2024-49956, CVE-2024-50238, CVE-2024-49955, CVE-2024-50046, CVE-2024-50098, CVE-2024-50232, CVE-2024-50292, CVE-2024-56752, CVE-2024-50195, CVE-2024-47743, CVE-2024-53044, CVE-2024-50049, CVE-2024-49986, CVE-2024-53055, CVE-2024-56539, CVE-2024-50048, CVE-2024-49985, CVE-2024-53227, CVE-2024-49970, CVE-2024-47702, CVE-2024-49874, CVE-2024-47703, CVE-2024-53139, CVE-2024-50072, CVE-2024-53224, CVE-2024-49877, CVE-2024-49922, CVE-2024-50290, CVE-2024-47756, CVE-2024-50221, CVE-2024-50057, CVE-2022-49034, CVE-2024-53157, CVE-2024-47749, CVE-2024-53231)

USN-7276-1: Linux kernel vulnerabilities

18 hours 38 minutes ago
Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - PowerPC architecture; - RISC-V architecture; - S390 architecture; - SuperH RISC architecture; - User-Mode Linux (UML); - x86 architecture; - Block layer subsystem; - Cryptographic API; - Compute Acceleration Framework; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - RAM backed block device driver; - Network block device driver; - Ublk userspace block driver; - Compressed RAM block device driver; - Bluetooth drivers; - TPM device driver; - Clock framework and drivers; - Data acquisition framework and drivers; - CPU frequency scaling framework; - Hardware crypto device drivers; - CXL (Compute Express Link) drivers; - DAX dirext access to differentiated memory framework; - Buffer Sharing and Synchronization framework; - EDAC drivers; - FireWire subsystem; - ARM SCMI message protocol; - ARM SCPI message protocol; - EFI core; - Qualcomm firmware drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - I3C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - IRQ chip drivers; - Mailbox framework; - Multiple devices driver; - Media drivers; - Multifunction device drivers; - MMC subsystem; - MTD block device drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - Virtio pmem driver; - NVME drivers; - Parport drivers; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - PHY drivers; - Pin controllers subsystem; - x86 platform drivers; - i.MX PM domains; - Powercap sysfs driver; - Voltage and Current Regulator drivers; - Remote Processor subsystem; - StarFive reset controller drivers; - Real Time Clock drivers; - SCSI subsystem; - SuperH / SH-Mobile drivers; - QCOM SoC drivers; - Xilinx SoC drivers; - SPI subsystem; - Direct Digital Synthesis drivers; - Media staging drivers; - TCM subsystem; - Thermal drivers; - Thunderbolt and USB4 drivers; - TTY drivers; - UFS subsystem; - USB Device Class drivers; - DesignWare USB3 driver; - USB Gadget drivers; - USB Host Controller drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Port Controller Manager driver; - TI TPS6598x USB Power Delivery controller driver; - USB Type-C Connector System Software Interface driver; - vDPA drivers; - VFIO drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - Virtio drivers; - Xen hypervisor drivers; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - EROFS file system; - Ext4 file system; - F2FS file system; - GFS2 file system; - JFS file system; - Network file systems library; - Network file system (NFS) client; - Network file system (NFS) server daemon; - NILFS2 file system; - File system notification infrastructure; - NTFS3 file system; - Proc file system; - SMB network file system; - UBI file system; - BPF subsystem; - Network file system (NFS) superblock; - Virtio network driver; - Bluetooth subsystem; - Network traffic control; - Network sockets; - TCP network protocol; - Tracing infrastructure; - User-space API (UAPI); - Kernel init infrastructure; - io_uring subsystem; - IPC subsystem; - Perf events; - Kernel fork() syscall; - Kernel thread helper (kthread); - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Scheduler infrastructure; - Signal handling mechanism; - Static call mechanism; - Task handling mechanism; - Timer substystem drivers; - Maple Tree data structure library; - Memory management; - 9P file system network protocol; - Ethernet bridge; - CAN network layer; - Networking core; - DCCP (Datagram Congestion Control Protocol); - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - IUCV driver; - L2TP protocol; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - Multipath TCP; - NCSI (Network Controller Sideband Interface) driver; - Netfilter; - Netlink; - RxRPC session sockets; - SCTP protocol; - SMC sockets; - Sun RPC protocol; - TIPC protocol; - Unix domain sockets; - VMware vSockets driver; - Wireless networking; - eXpress Data Path; - XFRM subsystem; - AppArmor security module; - Integrity Measurement Architecture(IMA) framework; - Key management; - ALSA framework; - FireWire sound drivers; - AudioScience HPI driver; - HD-audio driver; - SoC Audio for Freescale CPUs drivers; - Intel ASoC drivers; - MediaTek ASoC drivers; - QCOM ASoC drivers; - SoC audio core drivers; - STMicroelectronics SoC drivers; - USB sound devices; - KVM core; (CVE-2024-53192, CVE-2024-53130, CVE-2024-53234, CVE-2024-49986, CVE-2024-49948, CVE-2024-49976, CVE-2024-53158, CVE-2024-50142, CVE-2024-53160, CVE-2024-50124, CVE-2024-50055, CVE-2024-56744, CVE-2024-53128, CVE-2024-50204, CVE-2024-50176, CVE-2024-50294, CVE-2024-50166, CVE-2024-49906, CVE-2024-50074, CVE-2024-47734, CVE-2024-50249, CVE-2024-53216, CVE-2024-53162, CVE-2024-50189, CVE-2024-53196, CVE-2024-49969, CVE-2024-53210, CVE-2024-50300, CVE-2024-47714, CVE-2024-50158, CVE-2024-49983, CVE-2024-49959, CVE-2024-49985, CVE-2024-53078, CVE-2024-53180, CVE-2024-50099, CVE-2024-50009, CVE-2024-53059, CVE-2024-49962, CVE-2024-56755, CVE-2024-50106, CVE-2024-53184, CVE-2024-53063, CVE-2024-50161, CVE-2024-50289, CVE-2024-56705, CVE-2024-56697, CVE-2024-53135, CVE-2024-47676, CVE-2024-53084, CVE-2024-50270, CVE-2024-50078, CVE-2024-50247, CVE-2024-50075, CVE-2024-49946, CVE-2024-50209, CVE-2024-53048, CVE-2024-53071, CVE-2024-49930, CVE-2024-50174, CVE-2024-50039, CVE-2024-50115, CVE-2024-56680, CVE-2024-49901, CVE-2024-49971, CVE-2024-50180, CVE-2024-50061, CVE-2024-47681, CVE-2024-50107, CVE-2024-49972, CVE-2024-49889, CVE-2024-49872, CVE-2024-50067, CVE-2024-47718, CVE-2024-50246, CVE-2024-53090, CVE-2024-49961, CVE-2024-56549, CVE-2024-47688, CVE-2024-50073, CVE-2024-47716, CVE-2024-49952, CVE-2024-56749, CVE-2024-47737, CVE-2024-56739, CVE-2024-56752, CVE-2024-47700, CVE-2024-56741, CVE-2024-50196, CVE-2024-49881, CVE-2024-50230, CVE-2024-50020, CVE-2024-49992, CVE-2024-56534, CVE-2024-49883, CVE-2024-50233, CVE-2024-50057, CVE-2024-53091, CVE-2024-49886, CVE-2024-53144, CVE-2024-50029, CVE-2024-50240, CVE-2024-56720, CVE-2024-50282, CVE-2024-50036, CVE-2024-53126, CVE-2024-56702, CVE-2024-50101, CVE-2024-56696, CVE-2024-50193, CVE-2024-53089, CVE-2024-50263, CVE-2024-47707, CVE-2024-49925, CVE-2024-50178, CVE-2024-47690, CVE-2024-53119, CVE-2024-49939, CVE-2024-50274, CVE-2024-50168, CVE-2024-49963, CVE-2024-50220, CVE-2024-50250, CVE-2024-49966, CVE-2024-50104, CVE-2024-49968, CVE-2024-47685, CVE-2024-50281, CVE-2024-50190, CVE-2024-50181, CVE-2024-50304, CVE-2022-49034, CVE-2024-47726, CVE-2024-50159, CVE-2024-49851, CVE-2024-49933, CVE-2024-50277, CVE-2024-56729, CVE-2024-49885, CVE-2024-53068, CVE-2024-50162, CVE-2024-50179, CVE-2024-53072, CVE-2024-47742, CVE-2024-53083, CVE-2024-50025, CVE-2023-52917, CVE-2024-50269, CVE-2024-50302, CVE-2024-50293, CVE-2024-50177, CVE-2024-53075, CVE-2024-50257, CVE-2024-49995, CVE-2024-53076, CVE-2024-49940, CVE-2024-50114, CVE-2024-50043, CVE-2024-47713, CVE-2024-53081, CVE-2024-50151, CVE-2024-50211, CVE-2024-53047, CVE-2024-50016, CVE-2024-56679, CVE-2024-56689, CVE-2024-50008, CVE-2024-47723, CVE-2024-50285, CVE-2024-49899, CVE-2024-50098, CVE-2024-50000, CVE-2024-53098, CVE-2024-53175, CVE-2024-49888, CVE-2024-50132, CVE-2024-49964, CVE-2024-53042, CVE-2024-50295, CVE-2024-50038, CVE-2024-49905, CVE-2024-50012, CVE-2024-47754, CVE-2024-50017, CVE-2024-53095, CVE-2024-49978, CVE-2024-56541, CVE-2024-49891, CVE-2024-50033, CVE-2024-50292, CVE-2024-50037, CVE-2024-53145, CVE-2024-56747, CVE-2024-50260, CVE-2024-53177, CVE-2024-53229, CVE-2024-53221, CVE-2024-56677, CVE-2024-53171, CVE-2024-50299, CVE-2024-50202, CVE-2024-53208, CVE-2024-53105, CVE-2024-50006, CVE-2024-50149, CVE-2024-50275, CVE-2024-47753, CVE-2024-50212, CVE-2024-49855, CVE-2024-50145, CVE-2024-53120, CVE-2024-53061, CVE-2024-53217, CVE-2024-53198, CVE-2024-50165, CVE-2024-49866, CVE-2024-49994, CVE-2024-50109, CVE-2024-50137, CVE-2024-50245, CVE-2024-53154, CVE-2024-56724, CVE-2024-53187, CVE-2024-53202, CVE-2024-49927, CVE-2024-50163, CVE-2024-50152, CVE-2024-53220, CVE-2024-47741, CVE-2024-50102, CVE-2024-53188, CVE-2024-53116, CVE-2024-47695, CVE-2024-47702, CVE-2024-49970, CVE-2024-50155, CVE-2024-53058, CVE-2024-49908, CVE-2024-50256, CVE-2024-53161, CVE-2024-49893, CVE-2024-53074, CVE-2024-50144, CVE-2024-53219, CVE-2024-49869, CVE-2024-53133, CVE-2024-50041, CVE-2024-49974, CVE-2024-50287, CVE-2024-50133, CVE-2024-53183, CVE-2024-49997, CVE-2024-47749, CVE-2024-53153, CVE-2024-50063, CVE-2024-49852, CVE-2024-50259, CVE-2024-50013, CVE-2024-56751, CVE-2024-53236, CVE-2024-49999, CVE-2024-50076, CVE-2024-49923, CVE-2024-50288, CVE-2024-49867, CVE-2024-49887, CVE-2024-53101, CVE-2024-56725, CVE-2024-56745, CVE-2024-49863, CVE-2024-49890, CVE-2024-50187, CVE-2024-50200, CVE-2024-47679, CVE-2024-50077, CVE-2024-50069, CVE-2024-53114, CVE-2024-50071, CVE-2024-50072, CVE-2024-47705, CVE-2024-50205, CVE-2024-49975, CVE-2024-50237, CVE-2024-53092, CVE-2024-49917, CVE-2024-49853, CVE-2024-50103, CVE-2024-53190, CVE-2024-53215, CVE-2024-50280, CVE-2024-50014, CVE-2024-47756, CVE-2024-53231, CVE-2024-49856, CVE-2024-50023, CVE-2024-53123, CVE-2024-56756, CVE-2024-50140, CVE-2024-56699, CVE-2024-47703, CVE-2024-49958, CVE-2024-56692, CVE-2024-50082, CVE-2024-53181, CVE-2024-47699, CVE-2024-50154, CVE-2024-49960, CVE-2024-53226, CVE-2024-56683, CVE-2024-53239, CVE-2024-53104, CVE-2024-50044, CVE-2024-50255, CVE-2024-50021, CVE-2024-50070, CVE-2024-47740, CVE-2024-49882, CVE-2024-50232, CVE-2024-47708, CVE-2024-47747, CVE-2024-49929, CVE-2024-56693, CVE-2024-53124, CVE-2024-50223, CVE-2024-50265, CVE-2024-53172, CVE-2024-50197, CVE-2024-49915, CVE-2024-53224, CVE-2024-47684, CVE-2024-50217, CVE-2024-50286, CVE-2024-47677, CVE-2024-49942, CVE-2024-50026, CVE-2024-50236, CVE-2024-50086, CVE-2024-50153, CVE-2024-47675, CVE-2024-53112, CVE-2024-50138, CVE-2024-53045, CVE-2024-53170, CVE-2024-50095, CVE-2024-50188, CVE-2024-50173, CVE-2024-50019, CVE-2024-50117, CVE-2024-47746, CVE-2024-50172, CVE-2024-53166, CVE-2024-56721, CVE-2024-50266, CVE-2024-47696, CVE-2024-47719, CVE-2024-49892, CVE-2024-56678, CVE-2024-47680, CVE-2024-50296, CVE-2024-53152, CVE-2024-56536, CVE-2024-50042, CVE-2024-49894, CVE-2024-49897, CVE-2024-47671, CVE-2024-53064, CVE-2024-53077, CVE-2024-49903, CVE-2024-53169, CVE-2024-50011, CVE-2024-47710, CVE-2024-53046, CVE-2024-50046, CVE-2024-53131, CVE-2024-53237, CVE-2024-56707, CVE-2024-49950, CVE-2024-53079, CVE-2024-56694, CVE-2024-53106, CVE-2024-49900, CVE-2024-47745, CVE-2024-50301, CVE-2024-50040, CVE-2024-50183, CVE-2024-56532, CVE-2024-56698, CVE-2024-53139, CVE-2024-47721, CVE-2024-50062, CVE-2024-50129, CVE-2024-50027, CVE-2024-49941, CVE-2024-53199, CVE-2024-50185, CVE-2024-49858, CVE-2024-50024, CVE-2024-50146, CVE-2024-50088, CVE-2024-53111, CVE-2024-50244, CVE-2024-47697, CVE-2024-53108, CVE-2024-49896, CVE-2024-49859, CVE-2024-56748, CVE-2024-50111, CVE-2024-53056, CVE-2024-50283, CVE-2024-49955, CVE-2024-47706, CVE-2024-53214, CVE-2024-47712, CVE-2024-47678, CVE-2024-53125, CVE-2024-53178, CVE-2024-53232, CVE-2024-49928, CVE-2024-47731, CVE-2024-53121, CVE-2024-56540, CVE-2024-50271, CVE-2024-53044, CVE-2024-53132, CVE-2024-53052, CVE-2024-50195, CVE-2024-50191, CVE-2024-47694, CVE-2024-49973, CVE-2024-49910, CVE-2024-56746, CVE-2024-56674, CVE-2024-49871, CVE-2024-50258, CVE-2024-50049, CVE-2024-49951, CVE-2024-50182, CVE-2024-53174, CVE-2024-50143, CVE-2024-53203, CVE-2024-53129, CVE-2024-50224, CVE-2024-49943, CVE-2024-50131, CVE-2024-50221, CVE-2024-53143, CVE-2024-56531, CVE-2024-53055, CVE-2024-50135, CVE-2024-50279, CVE-2024-50120, CVE-2024-53140, CVE-2024-50272, CVE-2024-47728, CVE-2024-53167, CVE-2024-56691, CVE-2024-53223, CVE-2024-49919, CVE-2024-53082, CVE-2024-53213, CVE-2024-50298, CVE-2024-56681, CVE-2024-53069, CVE-2024-50001, CVE-2024-50083, CVE-2024-50056, CVE-2024-56544, CVE-2024-49989, CVE-2024-50251, CVE-2024-50121, CVE-2024-53228, CVE-2024-56700, CVE-2024-49862, CVE-2024-49870, CVE-2024-50148, CVE-2024-53138, CVE-2024-50160, CVE-2024-50002, CVE-2024-56533, CVE-2024-46869, CVE-2024-50118, CVE-2024-50276, CVE-2024-50226, CVE-2024-53146, CVE-2024-53134, CVE-2024-53165, CVE-2024-56728, CVE-2024-49931, CVE-2024-50261, CVE-2024-50064, CVE-2024-47711, CVE-2024-53157, CVE-2024-53113, CVE-2024-49898, CVE-2024-50214, CVE-2024-53085, CVE-2024-49924, CVE-2024-49944, CVE-2024-47686, CVE-2024-53238, CVE-2024-56754, CVE-2024-50066, CVE-2024-53189, CVE-2024-49864, CVE-2024-50093, CVE-2024-50060, CVE-2024-56684, CVE-2024-49861, CVE-2024-50243, CVE-2024-50007, CVE-2024-50227, CVE-2024-50238, CVE-2024-49918, CVE-2024-53227, CVE-2024-50119, CVE-2024-53088, CVE-2024-53100, CVE-2024-47693, CVE-2024-53197, CVE-2024-49932, CVE-2024-53163, CVE-2024-53118, CVE-2024-47733, CVE-2024-49913, CVE-2024-56545, CVE-2024-47739, CVE-2024-47709, CVE-2024-50015, CVE-2024-56690, CVE-2024-56535, CVE-2024-50167, CVE-2024-49965, CVE-2024-53043, CVE-2024-50092, CVE-2024-50128, CVE-2024-53080, CVE-2024-56539, CVE-2024-50222, CVE-2024-47724, CVE-2024-49980, CVE-2024-49860, CVE-2024-50034, CVE-2024-47682, CVE-2024-49949, CVE-2024-49935, CVE-2024-49914, CVE-2024-47732, CVE-2024-47701, CVE-2024-53200, CVE-2024-50123, CVE-2024-50100, CVE-2024-56704, CVE-2024-53115, CVE-2024-49879, CVE-2024-50096, CVE-2024-53062, CVE-2024-50094, CVE-2024-50105, CVE-2024-49947, CVE-2024-50252, CVE-2024-56537, CVE-2024-49953, CVE-2024-53067, CVE-2024-50091, CVE-2024-53148, CVE-2024-50164, CVE-2024-50231, CVE-2024-49874, CVE-2024-47750, CVE-2024-50206, CVE-2024-50207, CVE-2024-56742, CVE-2024-50005, CVE-2024-56687, CVE-2024-50157, CVE-2024-50201, CVE-2024-49921, CVE-2024-56727, CVE-2024-50136, CVE-2024-50126, CVE-2024-50239, CVE-2024-50268, CVE-2024-50234, CVE-2024-50085, CVE-2024-47736, CVE-2024-49911, CVE-2024-50198, CVE-2024-47704, CVE-2024-53233, CVE-2024-49981, CVE-2024-53053, CVE-2024-50139, CVE-2024-49895, CVE-2024-56688, CVE-2024-50031, CVE-2024-49916, CVE-2024-53155, CVE-2024-50035, CVE-2024-53230, CVE-2024-47738, CVE-2024-53099, CVE-2024-53212, CVE-2024-47743, CVE-2024-56701, CVE-2024-53151, CVE-2024-49934, CVE-2024-53141, CVE-2024-50059, CVE-2024-49922, CVE-2024-50215, CVE-2024-50022, CVE-2024-50229, CVE-2024-50184, CVE-2024-50065, CVE-2024-50242, CVE-2024-50003, CVE-2024-47715, CVE-2024-53093, CVE-2024-49956, CVE-2024-49868, CVE-2024-49878, CVE-2024-56722, CVE-2024-53156, CVE-2024-49857, CVE-2024-53110, CVE-2024-47735, CVE-2024-53168, CVE-2024-56543, CVE-2024-50080, CVE-2024-50068, CVE-2024-49909, CVE-2024-56708, CVE-2024-50134, CVE-2024-50262, CVE-2024-50303, CVE-2024-50203, CVE-2024-49957, CVE-2024-50087, CVE-2024-53065, CVE-2024-49920, CVE-2024-49880, CVE-2024-50110, CVE-2024-49877, CVE-2024-47692, CVE-2024-50127, CVE-2024-49907, CVE-2024-49937, CVE-2024-49987, CVE-2024-50141, CVE-2024-56538, CVE-2024-49865, CVE-2024-47689, CVE-2024-50218, CVE-2024-47720, CVE-2024-53191, CVE-2024-53194, CVE-2024-50216, CVE-2024-50213, CVE-2024-49988, CVE-2024-53094, CVE-2024-50186, CVE-2024-50010, CVE-2024-50169, CVE-2024-53107, CVE-2024-47698, CVE-2024-53142, CVE-2024-49945, CVE-2024-49873, CVE-2024-53176, CVE-2024-49884, CVE-2024-50112, CVE-2024-50199, CVE-2024-53122, CVE-2024-50284, CVE-2024-50208, CVE-2024-53218, CVE-2024-50045, CVE-2024-50028, CVE-2024-50122, CVE-2024-50291, CVE-2024-50047, CVE-2024-50090, CVE-2024-49876, CVE-2024-47730, CVE-2024-53195, CVE-2024-56703, CVE-2024-49996, CVE-2024-49954, CVE-2024-47757, CVE-2024-47717, CVE-2024-49850, CVE-2024-50273, CVE-2024-47752, CVE-2024-53149, CVE-2024-53173, CVE-2024-50235, CVE-2024-50150, CVE-2024-50030, CVE-2024-50079, CVE-2024-56546, CVE-2024-53086, CVE-2024-53150, CVE-2024-49979, CVE-2024-50058, CVE-2024-50171, CVE-2024-56685, CVE-2024-50254, CVE-2024-47751, CVE-2024-53193, CVE-2024-53209, CVE-2024-49926, CVE-2024-47748, CVE-2024-53109, CVE-2024-53066, CVE-2024-50225, CVE-2024-53137, CVE-2024-50113, CVE-2024-49912, CVE-2024-49998, CVE-2024-50116, CVE-2024-49977, CVE-2024-47687, CVE-2024-50084, CVE-2024-49982, CVE-2024-50253, CVE-2024-50290, CVE-2024-47727, CVE-2024-50248, CVE-2024-50170, CVE-2024-47691, CVE-2024-53147, CVE-2024-50192, CVE-2024-53117, CVE-2024-49938, CVE-2024-47744, CVE-2024-50147, CVE-2024-49991, CVE-2024-50048, CVE-2024-53127, CVE-2024-49902, CVE-2024-50156, CVE-2024-53087, CVE-2024-56548, CVE-2024-50125, CVE-2024-56723, CVE-2024-50108, CVE-2024-53049, CVE-2024-50081, CVE-2024-56726, CVE-2024-49875, CVE-2024-50194, CVE-2024-50278, CVE-2024-49904, CVE-2024-50267, CVE-2024-50297, CVE-2024-50130, CVE-2024-49936)

USN-7275-1: Libtasn1 vulnerability

1 day 15 hours ago
Bing Shi discovered that Libtasn1 inefficiently handled certificates. An attacker could possibly use this issue to increase resource utilization leading to a denial of service.

USN-7270-2: OpenSSH vulnerability

1 day 16 hours ago
USN-7270-1 fixed a vulnerability in OpenSSH. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465)

USN-7274-1: Atril vulnerabilities

1 day 16 hours ago
It was discovered that Atril incorrectly handled certain PDF files. An attacker could possibly use this issue to cause a denial of service or to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2019-1010006) Andy Nguyen discovered that Atril incorrectly handled certain images. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 16.04 LTS. (CVE-2019-11459) Febin Mon Saji discovered that Atril incorrectly handled certain compressed files. A remote attacker could possibly use this issue to cause a denial of service or to execute arbitrary code. (CVE-2023-51698)

USN-7273-1: libsndfile vulnerabilities

1 day 18 hours ago
It was discovered that libsndfile incorrectly handled memory when executing its FLAC codec. If a user or automated system were tricked into processing a specially crafted sound file, an attacker could possibly use this issue to cause a denial of service or obtain sensitive information. (CVE-2021-4156) It was discovered that libsndfile incorrectly handled certain malformed OggVorbis files. An attacker could possibly use this issue to cause libsndfile to crash, resulting in a denial of service. (CVE-2024-50612)

USN-7272-1: Symfony vulnerabilities

1 day 18 hours ago
Soner Sayakci discovered that Symfony incorrectly handled cookie storage in the web cache. An attacker could possibly use this issue to obtain sensitive information and access unauthorized resources. (CVE-2022-24894) Marco Squarcina discovered that Symfony incorrectly handled the storage of user session information. An attacker could possibly use this issue to perform a cross-site request forgery (CSRF) attack. (CVE-2022-24895) Pierre Rudloff discovered that Symfony incorrectly checked HTML input. An attacker could possibly use this issue to perform cross site scripting. (CVE-2023-46734) Vladimir Dusheyko discovered that Symfony incorrectly sanitized special input with a PHP directive in URL query strings. An attacker could possibly use this issue to expose sensitive information or cause a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50340) Oleg Andreyev, Antoine Makdessi, and Moritz Rauch discovered that Symfony incorrectly handled user authentication. An attacker could possibly use this issue to access unauthorized resources and expose sensitive information. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-50341, CVE-2024-51996) Linus Karlsson and Chris Smith discovered that Symfony returned internal host information during host resolution. An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 24.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-50342) It was discovered that Symfony incorrectly parsed user input through regular expressions. An attacker could possibly use this issue to expose sensitive information. (CVE-2024-50343) Sam Mush discovered that Symfony incorrectly parsed URIs with special characters. An attacker could possibly use this issue to perform phishing attacks. (CVE-2024-50345)

USN-7271-1: virtualenv vulnerability

1 day 21 hours ago
It was discovered that virtualenv incorrectly handled paths when activating virtual environments. An attacker could possibly use this issue to execute arbitrary code.

USN-7270-1: OpenSSH vulnerabilities

1 day 21 hours ago
It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465) It was discovered that OpenSSH incorrectly handled the transport-level ping facility. A remote attacker could possibly use this issue to cause OpenSSH clients and servers to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-26466)

USN-7161-2: Docker vulnerabilities

2 days 2 hours ago
USN-7161-1 fixed CVE-2024-29018 in Ubuntu 24.04 LTS. This update fixes it in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 24.10, and Ubuntu 24.04 LTS. USN-7161-1 fixed CVE-2024-41110 in Ubuntu 24.10, Ubuntu 24.04 LTS, and Ubuntu 18.04 LTS. This updates fixes it in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. Original advisory details: Yair Zak discovered that Docker could unexpectedly forward DNS requests from internal networks in an unexpected manner. An attacker could possibly use this issue to exfiltrate data by encoding information in DNS queries to controlled nameservers. This issue was only addressed in Ubuntu 24.04 LTS. (CVE-2024-29018) Cory Snider discovered that Docker did not properly handle authorization plugin request processing. An attacker could possibly use this issue to bypass authorization controls by forwarding API requests without their full body, leading to unauthorized actions. (CVE-2024-41110)

USN-7269-1: Intel Microcode vulnerabilities

3 days 7 hours ago
Ke Sun, Paul Grosen and Alyssa Milburn discovered that some Intel® Processors did not properly implement Finite State Machines (FSMs) in Hardware Logic. A local privileged attacker could use this issue to cause a denial of service. (CVE-2024-31068) It was discovered that some Intel® Processors with Intel® SGX did not properly restrict access to the EDECCSSA user leaf function. A local authenticated attacker could use this issue to cause a denial of service. (CVE-2024-36293) Ke Sun, Alyssa Milburn, Benoit Morgan, and Erik Bjorge discovered that the UEFI firmware for some Intel® processors did not properly restrict access. An authenticated local attacker could use this issue to cause a denial of service. (CVE-2024-39279)

USN-7268-1: Apache ActiveMQ vulnerabilities

6 days ago
It was discovered that Apache ActiveMQ incorrectly handled authentication. A remote attacker could possibly use this issue to run arbitrary code. (CVE-2022-41678) It was discovered that Apache ActiveMQ incorrectly handled deserialization. A remote attacker could possibly use this issue to run arbitrary shell commands. (CVE-2023-46604)

USN-7267-1: libsndfile vulnerability

6 days 19 hours ago
It was discovered that libsndfile incorrectly handled certain malformed OggVorbis files. An attacker could possibly use this issue to cause libsndfile to crash, resulting in a denial of service.

USN-6846-3: Ansible regression

1 week ago
USN-6846-1 fixed vulnerabilities in ansible. The update introduced a regression in ansible. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that Ansible incorrectly handled certain inputs when using tower_callback parameter. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-3697) It was discovered that Ansible incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to perform a Template Injection. (CVE-2023-5764)

USN-7266-1: digiKam vulnerabilities

1 week ago
Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in digiKam, did not correctly parse certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2017-0691) It was discovered that Platinum Upnp SDK, vendored in digiKam, was vulnerable to a path traversal attack. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-19858) It was discovered that LibRaw, vendored in digiKam, did not correctly handle certain memory operations. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-22628) It was discovered that LibRaw, vendored in digiKam, did not correctly handle certain memory operations. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-35530, CVE-2020-35531, CVE-2020-35532, CVE-2020-35533) It was discovered that LibRaw, vendored in digiKam, did not correctly handle certain memory operations. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-32142) It was discovered that LibRaw, vendored in digiKam, did not correctly handle certain memory operations. If a user or automated system were tricked into opening a specially crafted file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-1729)

USN-7256-2: Ruby regression

1 week ago
USN-7256-1 fixed vulnerabilities in Ruby. The update introduced a minor regression. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that Ruby incorrectly handled parsing of an XML document that has specific XML characters in an attribute value using REXML gem. An attacker could use this issue to cause Ruby to crash, resulting in a denial of service.

USN-7234-4: Linux kernel (AWS) vulnerabilities

1 week ago
Ye Zhang and Nicolas Wu discovered that the io_uring subsystem in the Linux kernel did not properly handle locking for rings with IOPOLL, leading to a double-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-21400) Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - TTY drivers; - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53141, CVE-2024-53103, CVE-2024-40967, CVE-2024-53164)

USN-7235-3: Linux kernel (AWS) vulnerabilities

1 week ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)

USN-7236-3: Linux kernel (Azure) vulnerabilities

1 week ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Netfilter; - Network traffic control; - VMware vSockets driver; (CVE-2024-53164, CVE-2024-53103, CVE-2024-53141)

USN-7238-4: Linux kernel (AWS) vulnerabilities

1 week ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Network traffic control; - VMware vSockets driver; (CVE-2024-53103, CVE-2024-53164)
Checked
1 hour 40 minutes ago
Recent content on Ubuntu security notices
Subscribe to Ubuntu feed
Categrory