Friday, February 28, 2025

[USN-7309-1] Ruby SAML vulnerabilities

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=EqVE
-----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
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=QboQ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7309-1
February 28, 2025

Ruby SAML vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Ruby SAML.

Software Description:
- ruby-saml: SAML toolkit for Ruby on Rails

Details:

It was discovered that Ruby SAML did not properly validate SAML responses.
An unauthenticated attacker could use this vulnerability to log in as an
abitrary user. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-5697)

It was discovered that Ruby SAML incorrectly utilized the results of XML
DOM traversal and canonicalization APIs. An unauthenticated attacker could
use this vulnerability to log in as an abitrary user. This issue only
affected Ubuntu 16.04 LTS. (CVE-2017-11428)

It was discovered that Ruby SAML did not properly verify the signature of
the SAML Response, allowing multiple elements with the same ID. An
unauthenticated attacker could use this vulnerability to log in as an
abitrary user. (CVE-2024-45409)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  ruby-saml                       1.15.0-1ubuntu0.24.10.1

Ubuntu 24.04 LTS
  ruby-saml                       1.15.0-1ubuntu0.24.04.1

Ubuntu 22.04 LTS
  ruby-saml                       1.13.0-1ubuntu0.1

Ubuntu 20.04 LTS
  ruby-saml                       1.11.0-1ubuntu0.1

Ubuntu 18.04 LTS
  ruby-saml                       1.7.2-1ubuntu0.1~esm1
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  ruby-saml                       1.1.2-1ubuntu1+esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7309-1
  CVE-2016-5697, CVE-2017-11428, CVE-2024-45409

Package Information:
  https://launchpad.net/ubuntu/+source/ruby-saml/1.15.0-1ubuntu0.24.10.1
  https://launchpad.net/ubuntu/+source/ruby-saml/1.15.0-1ubuntu0.24.04.1
  https://launchpad.net/ubuntu/+source/ruby-saml/1.13.0-1ubuntu0.1
  https://launchpad.net/ubuntu/+source/ruby-saml/1.11.0-1ubuntu0.1

[USN-7311-1] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7311-1
February 28, 2025

linux-aws, linux-aws-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-aws-6.8: Linux kernel for Amazon Web Services (AWS) systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- Network block device driver;
- TPM device driver;
- Hardware crypto device drivers;
- ARM SCMI message protocol;
- EFI core;
- GPU drivers;
- I2C subsystem;
- I3C subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- IOMMU subsystem;
- Mailbox framework;
- Media drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- PCI subsystem;
- Alibaba DDR Sub-System Driveway PMU driver;
- x86 platform drivers;
- Powercap sysfs driver;
- Remote Processor subsystem;
- SCSI subsystem;
- USB Device Class drivers;
- vDPA drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- SMB network file system;
- BPF subsystem;
- Virtio network driver;
- TCP network protocol;
- Perf events;
- Padata parallel execution mechanism;
- RCU subsystem;
- Arbitrary resource management;
- Static call mechanism;
- Tracing infrastructure;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- NCSI (Network Controller Sideband Interface) driver;
- Netfilter;
- RxRPC session sockets;
- Network traffic control;
- SCTP protocol;
- TIPC protocol;
- VMware vSockets driver;
- Wireless networking;
- AudioScience HPI driver;
- KVM core;
(CVE-2024-49867, CVE-2024-47675, CVE-2024-49999, CVE-2024-49884,
CVE-2024-49992, CVE-2024-49945, CVE-2024-49889, CVE-2024-49890,
CVE-2024-49900, CVE-2024-49934, CVE-2024-49976, CVE-2024-49878,
CVE-2024-50008, CVE-2024-49919, CVE-2024-47698, CVE-2024-47731,
CVE-2024-47673, CVE-2024-49959, CVE-2024-47715, CVE-2024-49912,
CVE-2024-47702, CVE-2024-50007, CVE-2024-49953, CVE-2024-49929,
CVE-2024-47730, CVE-2024-49966, CVE-2024-47756, CVE-2024-47687,
CVE-2024-50002, CVE-2024-49911, CVE-2024-47714, CVE-2024-47704,
CVE-2024-50017, CVE-2024-47709, CVE-2024-49858, CVE-2024-47712,
CVE-2024-49870, CVE-2024-49883, CVE-2024-47672, CVE-2024-49963,
CVE-2024-49926, CVE-2024-49860, CVE-2024-47748, CVE-2024-49928,
CVE-2024-49931, CVE-2024-47749, CVE-2024-49913, CVE-2024-49957,
CVE-2024-49948, CVE-2024-47732, CVE-2024-47753, CVE-2024-47727,
CVE-2024-49896, CVE-2024-47707, CVE-2024-47743, CVE-2024-49915,
CVE-2024-47695, CVE-2024-49960, CVE-2024-49935, CVE-2024-49868,
CVE-2024-49918, CVE-2024-49969, CVE-2024-53164, CVE-2024-49879,
CVE-2024-50012, CVE-2024-50000, CVE-2024-49974, CVE-2024-49998,
CVE-2024-49933, CVE-2024-47733, CVE-2024-49924, CVE-2024-47757,
CVE-2024-47699, CVE-2024-49983, CVE-2024-50016, CVE-2024-49907,
CVE-2024-49965, CVE-2024-49859, CVE-2024-50013, CVE-2024-49871,
CVE-2024-49994, CVE-2024-49850, CVE-2024-49947, CVE-2024-49955,
CVE-2024-49962, CVE-2024-47692, CVE-2024-53141, CVE-2024-50014,
CVE-2024-47689, CVE-2024-49874, CVE-2024-50005, CVE-2024-47741,
CVE-2024-49880, CVE-2024-47738, CVE-2024-47745, CVE-2024-49917,
CVE-2024-47728, CVE-2024-49856, CVE-2024-49925, CVE-2024-47671,
CVE-2023-52917, CVE-2024-47679, CVE-2024-49975, CVE-2024-47734,
CVE-2024-47720, CVE-2024-47686, CVE-2024-49892, CVE-2024-49936,
CVE-2024-49888, CVE-2024-49909, CVE-2024-49986, CVE-2024-49930,
CVE-2024-47740, CVE-2024-49923, CVE-2024-47754, CVE-2024-50179,
CVE-2024-49978, CVE-2024-47735, CVE-2024-49886, CVE-2024-49903,
CVE-2024-47681, CVE-2024-49897, CVE-2024-49951, CVE-2024-49946,
CVE-2024-49954, CVE-2024-47691, CVE-2024-49863, CVE-2024-47719,
CVE-2024-47693, CVE-2024-47713, CVE-2024-50006, CVE-2024-49855,
CVE-2024-49851, CVE-2024-49894, CVE-2024-49895, CVE-2024-49987,
CVE-2024-47700, CVE-2024-47688, CVE-2024-49982, CVE-2024-47685,
CVE-2024-53144, CVE-2024-47670, CVE-2024-47696, CVE-2024-47710,
CVE-2024-47737, CVE-2024-49988, CVE-2024-47684, CVE-2024-47718,
CVE-2024-49876, CVE-2024-49852, CVE-2024-49980, CVE-2024-49877,
CVE-2024-50175, CVE-2024-49981, CVE-2024-47677, CVE-2024-49973,
CVE-2024-49922, CVE-2024-50015, CVE-2024-49938, CVE-2024-47752,
CVE-2024-49902, CVE-2024-49944, CVE-2024-49952, CVE-2024-47747,
CVE-2024-41016, CVE-2024-50001, CVE-2024-49891, CVE-2024-47703,
CVE-2024-47744, CVE-2024-49861, CVE-2024-49875, CVE-2024-49901,
CVE-2024-49881, CVE-2024-49937, CVE-2024-47706, CVE-2024-47690,
CVE-2024-49958, CVE-2024-49961, CVE-2024-49882, CVE-2024-47739,
CVE-2024-49996, CVE-2024-49905, CVE-2024-47705, CVE-2024-49942,
CVE-2024-47697, CVE-2024-47723, CVE-2024-49853, CVE-2024-49862,
CVE-2024-47751, CVE-2024-49950, CVE-2024-50176, CVE-2024-49939,
CVE-2024-49864, CVE-2024-49997, CVE-2024-49995, CVE-2024-49885,
CVE-2024-49949, CVE-2024-53103, CVE-2024-49991, CVE-2024-49866,
CVE-2024-49977, CVE-2024-47682, CVE-2024-49927, CVE-2024-49985,
CVE-2024-49898, CVE-2024-47678, CVE-2024-47701, CVE-2024-47742,
CVE-2024-47750, CVE-2024-47716, CVE-2024-49989)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1023-aws 6.8.0-1023.25
linux-image-aws 6.8.0-1023.25
linux-image-aws-lts-24.04 6.8.0-1023.25

Ubuntu 22.04 LTS
linux-image-6.8.0-1023-aws 6.8.0-1023.25~22.04.1
linux-image-aws 6.8.0-1023.25~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7311-1
CVE-2023-52917, CVE-2024-41016, CVE-2024-47670, CVE-2024-47671,
CVE-2024-47672, CVE-2024-47673, CVE-2024-47675, CVE-2024-47677,
CVE-2024-47678, CVE-2024-47679, CVE-2024-47681, CVE-2024-47682,
CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687,
CVE-2024-47688, CVE-2024-47689, CVE-2024-47690, CVE-2024-47691,
CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696,
CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47700,
CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47704,
CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709,
CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714,
CVE-2024-47715, CVE-2024-47716, CVE-2024-47718, CVE-2024-47719,
CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728,
CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47733,
CVE-2024-47734, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738,
CVE-2024-47739, CVE-2024-47740, CVE-2024-47741, CVE-2024-47742,
CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747,
CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751,
CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756,
CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852,
CVE-2024-49853, CVE-2024-49855, CVE-2024-49856, CVE-2024-49858,
CVE-2024-49859, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862,
CVE-2024-49863, CVE-2024-49864, CVE-2024-49866, CVE-2024-49867,
CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874,
CVE-2024-49875, CVE-2024-49876, CVE-2024-49877, CVE-2024-49878,
CVE-2024-49879, CVE-2024-49880, CVE-2024-49881, CVE-2024-49882,
CVE-2024-49883, CVE-2024-49884, CVE-2024-49885, CVE-2024-49886,
CVE-2024-49888, CVE-2024-49889, CVE-2024-49890, CVE-2024-49891,
CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896,
CVE-2024-49897, CVE-2024-49898, CVE-2024-49900, CVE-2024-49901,
CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49907,
CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913,
CVE-2024-49915, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919,
CVE-2024-49922, CVE-2024-49923, CVE-2024-49924, CVE-2024-49925,
CVE-2024-49926, CVE-2024-49927, CVE-2024-49928, CVE-2024-49929,
CVE-2024-49930, CVE-2024-49931, CVE-2024-49933, CVE-2024-49934,
CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938,
CVE-2024-49939, CVE-2024-49942, CVE-2024-49944, CVE-2024-49945,
CVE-2024-49946, CVE-2024-49947, CVE-2024-49948, CVE-2024-49949,
CVE-2024-49950, CVE-2024-49951, CVE-2024-49952, CVE-2024-49953,
CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958,
CVE-2024-49959, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962,
CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49969,
CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976,
CVE-2024-49977, CVE-2024-49978, CVE-2024-49980, CVE-2024-49981,
CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49986,
CVE-2024-49987, CVE-2024-49988, CVE-2024-49989, CVE-2024-49991,
CVE-2024-49992, CVE-2024-49994, CVE-2024-49995, CVE-2024-49996,
CVE-2024-49997, CVE-2024-49998, CVE-2024-49999, CVE-2024-50000,
CVE-2024-50001, CVE-2024-50002, CVE-2024-50005, CVE-2024-50006,
CVE-2024-50007, CVE-2024-50008, CVE-2024-50012, CVE-2024-50013,
CVE-2024-50014, CVE-2024-50015, CVE-2024-50016, CVE-2024-50017,
CVE-2024-50175, CVE-2024-50176, CVE-2024-50179, CVE-2024-53103,
CVE-2024-53141, CVE-2024-53144, CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/6.8.0-1023.25
https://launchpad.net/ubuntu/+source/linux-aws-6.8/6.8.0-1023.25~22.04.1

[USN-7310-1] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7310-1
February 28, 2025

linux-oem-6.11 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-6.11: Linux kernel for OEM systems

Details:

Attila Szász discovered that the HFS+ file system implementation in the
Linux Kernel contained a heap overflow vulnerability. An attacker could use
a specially crafted file system image that, when mounted, could cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2025-0927)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- RISC-V architecture;
- S390 architecture;
- SuperH RISC architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- RAM backed block device driver;
- Network block device driver;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bluetooth drivers;
- TPM device driver;
- Clock framework and drivers;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- CXL (Compute Express Link) drivers;
- DAX dirext access to differentiated memory framework;
- Buffer Sharing and Synchronization framework;
- EDAC drivers;
- FireWire subsystem;
- ARM SCMI message protocol;
- ARM SCPI message protocol;
- EFI core;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- I3C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Multifunction device drivers;
- MMC subsystem;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- Virtio pmem driver;
- NVME drivers;
- Parport drivers;
- PCI subsystem;
- Alibaba DDR Sub-System Driveway PMU driver;
- PHY drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- i.MX PM domains;
- Powercap sysfs driver;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- StarFive reset controller drivers;
- Real Time Clock drivers;
- SCSI subsystem;
- SuperH / SH-Mobile drivers;
- QCOM SoC drivers;
- Xilinx SoC drivers;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- Media staging drivers;
- TCM subsystem;
- Thermal drivers;
- Thunderbolt and USB4 drivers;
- TTY drivers;
- UFS subsystem;
- USB Device Class drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Port Controller Manager driver;
- TI TPS6598x USB Power Delivery controller driver;
- USB Type-C Connector System Software Interface driver;
- vDPA drivers;
- VFIO drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Virtio drivers;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- EROFS file system;
- Ext4 file system;
- F2FS file system;
- GFS2 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- File system notification infrastructure;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- UBI file system;
- BPF subsystem;
- Network file system (NFS) superblock;
- Virtio network driver;
- Bluetooth subsystem;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- Tracing infrastructure;
- User-space API (UAPI);
- Kernel init infrastructure;
- io_uring subsystem;
- IPC subsystem;
- Perf events;
- Kernel fork() syscall;
- Kernel thread helper (kthread);
- Padata parallel execution mechanism;
- RCU subsystem;
- Arbitrary resource management;
- Scheduler infrastructure;
- Signal handling mechanism;
- Static call mechanism;
- Task handling mechanism;
- Timer substystem drivers;
- Maple Tree data structure library;
- Memory management;
- 9P file system network protocol;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- IUCV driver;
- L2TP protocol;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- Multipath TCP;
- NCSI (Network Controller Sideband Interface) driver;
- Netfilter;
- Netlink;
- RxRPC session sockets;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- AppArmor security module;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- ALSA framework;
- FireWire sound drivers;
- AudioScience HPI driver;
- HD-audio driver;
- SoC Audio for Freescale CPUs drivers;
- MediaTek ASoC drivers;
- QCOM ASoC drivers;
- SoC audio core drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
- KVM core;
(CVE-2024-50244, CVE-2024-56754, CVE-2024-50082, CVE-2024-47737,
CVE-2024-50300, CVE-2024-49872, CVE-2024-50180, CVE-2024-50218,
CVE-2024-49956, CVE-2024-53189, CVE-2024-56705, CVE-2024-50119,
CVE-2024-53192, CVE-2024-49950, CVE-2024-56722, CVE-2024-49943,
CVE-2024-50031, CVE-2024-47685, CVE-2024-50296, CVE-2024-49939,
CVE-2024-47696, CVE-2024-47752, CVE-2024-49937, CVE-2024-53140,
CVE-2024-50236, CVE-2024-50151, CVE-2024-50069, CVE-2024-50170,
CVE-2024-50246, CVE-2024-50217, CVE-2024-53125, CVE-2024-50084,
CVE-2024-50005, CVE-2024-53137, CVE-2024-50233, CVE-2024-49991,
CVE-2024-50067, CVE-2024-50290, CVE-2024-47735, CVE-2024-53133,
CVE-2024-50289, CVE-2024-49855, CVE-2024-49868, CVE-2024-56728,
CVE-2024-56726, CVE-2024-50012, CVE-2024-53078, CVE-2024-50223,
CVE-2024-50143, CVE-2024-50287, CVE-2024-49971, CVE-2024-49900,
CVE-2024-50263, CVE-2024-50206, CVE-2024-47707, CVE-2024-47751,
CVE-2024-56747, CVE-2024-50260, CVE-2024-50173, CVE-2024-47680,
CVE-2024-50009, CVE-2024-53219, CVE-2024-53144, CVE-2024-50008,
CVE-2024-53208, CVE-2024-49966, CVE-2024-50104, CVE-2024-50030,
CVE-2024-53049, CVE-2024-53201, CVE-2024-50130, CVE-2024-49856,
CVE-2024-53095, CVE-2024-50033, CVE-2024-47730, CVE-2024-53216,
CVE-2024-50286, CVE-2024-50284, CVE-2024-47744, CVE-2023-52917,
CVE-2024-50275, CVE-2024-53114, CVE-2024-49968, CVE-2024-50111,
CVE-2024-50000, CVE-2024-53081, CVE-2024-49857, CVE-2024-50262,
CVE-2024-50281, CVE-2024-53156, CVE-2024-50225, CVE-2024-53239,
CVE-2024-50036, CVE-2024-50187, CVE-2024-53165, CVE-2024-49931,
CVE-2024-53111, CVE-2024-49862, CVE-2024-47701, CVE-2024-53091,
CVE-2024-50103, CVE-2024-53046, CVE-2024-56678, CVE-2024-56749,
CVE-2024-53175, CVE-2024-49970, CVE-2024-50035, CVE-2024-50088,
CVE-2024-50297, CVE-2024-47721, CVE-2024-50240, CVE-2024-50076,
CVE-2024-56683, CVE-2024-53120, CVE-2024-50074, CVE-2024-50095,
CVE-2024-49963, CVE-2024-50158, CVE-2024-50020, CVE-2024-53083,
CVE-2024-50029, CVE-2024-56755, CVE-2024-49969, CVE-2024-50022,
CVE-2024-50278, CVE-2024-50125, CVE-2024-47706, CVE-2024-50204,
CVE-2024-56543, CVE-2024-53108, CVE-2024-49885, CVE-2024-50128,
CVE-2024-50062, CVE-2024-50139, CVE-2024-50183, CVE-2024-50288,
CVE-2024-56729, CVE-2024-49945, CVE-2024-47695, CVE-2024-56533,
CVE-2024-53234, CVE-2024-50002, CVE-2024-50040, CVE-2024-49903,
CVE-2024-47702, CVE-2024-47728, CVE-2024-49874, CVE-2024-47718,
CVE-2024-53142, CVE-2024-49983, CVE-2024-50211, CVE-2024-50294,
CVE-2024-50132, CVE-2024-53236, CVE-2024-50042, CVE-2024-49999,
CVE-2024-50001, CVE-2024-50046, CVE-2024-50133, CVE-2024-50256,
CVE-2024-49869, CVE-2024-49852, CVE-2024-47717, CVE-2024-56704,
CVE-2024-50102, CVE-2024-50150, CVE-2024-49880, CVE-2024-50235,
CVE-2024-49892, CVE-2024-53194, CVE-2024-53104, CVE-2024-50232,
CVE-2024-50226, CVE-2024-56684, CVE-2024-47713, CVE-2024-50191,
CVE-2024-49850, CVE-2024-50277, CVE-2024-53113, CVE-2024-50013,
CVE-2024-53221, CVE-2024-50220, CVE-2024-49960, CVE-2024-53228,
CVE-2024-50152, CVE-2024-56689, CVE-2024-53220, CVE-2024-50209,
CVE-2024-50285, CVE-2024-50197, CVE-2024-53072, CVE-2024-50273,
CVE-2024-49928, CVE-2024-53132, CVE-2024-56720, CVE-2024-50194,
CVE-2024-50112, CVE-2024-53079, CVE-2024-56696, CVE-2024-47750,
CVE-2024-53212, CVE-2024-56541, CVE-2024-50024, CVE-2024-53168,
CVE-2024-50247, CVE-2024-50193, CVE-2024-47754, CVE-2024-56540,
CVE-2024-50026, CVE-2024-53047, CVE-2024-53151, CVE-2024-50176,
CVE-2024-49975, CVE-2024-50034, CVE-2024-50126, CVE-2024-49863,
CVE-2024-47693, CVE-2024-49954, CVE-2024-49938, CVE-2024-50171,
CVE-2024-50185, CVE-2024-50200, CVE-2024-50201, CVE-2024-53184,
CVE-2024-47709, CVE-2024-50138, CVE-2024-49935, CVE-2024-50049,
CVE-2024-56537, CVE-2024-50057, CVE-2024-56677, CVE-2024-47743,
CVE-2024-50293, CVE-2024-50099, CVE-2024-47720, CVE-2024-50021,
CVE-2024-50059, CVE-2024-49871, CVE-2024-49884, CVE-2024-47694,
CVE-2024-56723, CVE-2024-47724, CVE-2024-50038, CVE-2024-53123,
CVE-2024-53177, CVE-2024-49932, CVE-2024-50196, CVE-2024-50234,
CVE-2024-50078, CVE-2024-53043, CVE-2024-49926, CVE-2024-49988,
CVE-2024-53187, CVE-2024-53056, CVE-2024-53217, CVE-2024-56745,
CVE-2024-47726, CVE-2024-50063, CVE-2024-49987, CVE-2024-49955,
CVE-2024-50179, CVE-2024-49866, CVE-2024-50283, CVE-2024-49997,
CVE-2024-47742, CVE-2024-56691, CVE-2024-50253, CVE-2024-56690,
CVE-2024-47710, CVE-2024-53129, CVE-2024-50190, CVE-2024-50090,
CVE-2024-56702, CVE-2024-50148, CVE-2024-53183, CVE-2024-50070,
CVE-2024-50154, CVE-2024-50243, CVE-2024-50003, CVE-2024-50117,
CVE-2024-56751, CVE-2024-56697, CVE-2024-53166, CVE-2024-53196,
CVE-2024-47677, CVE-2024-56679, CVE-2024-49996, CVE-2024-47681,
CVE-2024-53181, CVE-2024-47700, CVE-2024-53071, CVE-2024-50015,
CVE-2024-53126, CVE-2024-50165, CVE-2024-50172, CVE-2024-53063,
CVE-2024-53200, CVE-2024-53135, CVE-2024-49974, CVE-2024-53088,
CVE-2024-49936, CVE-2024-53121, CVE-2024-50166, CVE-2024-50087,
CVE-2024-53065, CVE-2024-53214, CVE-2024-53076, CVE-2024-53059,
CVE-2024-50230, CVE-2024-49985, CVE-2024-50092, CVE-2024-53233,
CVE-2024-50047, CVE-2024-56685, CVE-2024-47682, CVE-2024-47705,
CVE-2024-50077, CVE-2024-53224, CVE-2024-49887, CVE-2024-49940,
CVE-2024-47741, CVE-2024-49858, CVE-2024-56536, CVE-2024-53055,
CVE-2024-56687, CVE-2024-50100, CVE-2024-53075, CVE-2024-47699,
CVE-2024-53213, CVE-2024-49977, CVE-2024-50268, CVE-2024-53146,
CVE-2024-50304, CVE-2024-50096, CVE-2024-53162, CVE-2024-56725,
CVE-2024-49953, CVE-2024-53077, CVE-2024-50107, CVE-2024-53226,
CVE-2024-53134, CVE-2024-49873, CVE-2024-56548, CVE-2024-53145,
CVE-2024-53141, CVE-2024-56741, CVE-2024-53067, CVE-2024-53152,
CVE-2024-50072, CVE-2024-50282, CVE-2024-53232, CVE-2024-50140,
CVE-2024-53198, CVE-2024-53150, CVE-2024-49876, CVE-2024-50302,
CVE-2024-53115, CVE-2024-47692, CVE-2024-50301, CVE-2024-50202,
CVE-2024-50155, CVE-2024-56693, CVE-2024-53082, CVE-2024-53167,
CVE-2024-56748, CVE-2024-53064, CVE-2024-50227, CVE-2024-56539,
CVE-2024-50215, CVE-2024-50043, CVE-2024-50146, CVE-2024-50147,
CVE-2024-56699, CVE-2024-50122, CVE-2024-53044, CVE-2024-47712,
CVE-2024-53230, CVE-2024-50121, CVE-2024-50216, CVE-2024-53084,
CVE-2024-56703, CVE-2024-50178, CVE-2024-49934, CVE-2024-47678,
CVE-2024-50271, CVE-2024-50144, CVE-2024-50252, CVE-2024-47734,
CVE-2024-47711, CVE-2024-50214, CVE-2024-53100, CVE-2024-56680,
CVE-2024-50198, CVE-2024-50025, CVE-2024-50044, CVE-2024-50098,
CVE-2024-47745, CVE-2024-49860, CVE-2024-49881, CVE-2024-53048,
CVE-2024-56721, CVE-2024-56756, CVE-2024-53171, CVE-2024-49901,
CVE-2024-53109, CVE-2024-53061, CVE-2024-49929, CVE-2024-47691,
CVE-2024-50045, CVE-2024-47723, CVE-2024-56546, CVE-2024-50157,
CVE-2024-53169, CVE-2024-47716, CVE-2024-53093, CVE-2024-50224,
CVE-2024-53193, CVE-2024-49895, CVE-2024-47698, CVE-2024-49942,
CVE-2024-50167, CVE-2024-53202, CVE-2024-49870, CVE-2024-50291,
CVE-2024-50156, CVE-2024-53153, CVE-2024-50272, CVE-2024-50145,
CVE-2024-50298, CVE-2024-50274, CVE-2024-56694, CVE-2024-50108,
CVE-2024-50222, CVE-2024-53163, CVE-2024-50164, CVE-2024-53062,
CVE-2024-50212, CVE-2024-53127, CVE-2024-47688, CVE-2024-49959,
CVE-2024-50203, CVE-2024-49927, CVE-2024-50083, CVE-2024-53227,
CVE-2024-47697, CVE-2024-53053, CVE-2024-53172, CVE-2024-56752,
CVE-2024-50207, CVE-2024-50169, CVE-2024-53176, CVE-2024-53089,
CVE-2024-56707, CVE-2024-53195, CVE-2024-49851, CVE-2024-53209,
CVE-2024-49972, CVE-2024-53130, CVE-2024-53157, CVE-2024-53094,
CVE-2024-50182, CVE-2024-49879, CVE-2024-53191, CVE-2024-49925,
CVE-2024-49949, CVE-2024-56534, CVE-2024-47714, CVE-2024-53161,
CVE-2024-49992, CVE-2024-47732, CVE-2024-53143, CVE-2024-53119,
CVE-2024-50064, CVE-2024-50039, CVE-2024-53087, CVE-2024-49886,
CVE-2024-49979, CVE-2024-50041, CVE-2024-50184, CVE-2024-49958,
CVE-2024-50221, CVE-2024-56688, CVE-2024-49941, CVE-2024-50245,
CVE-2024-50017, CVE-2024-53180, CVE-2024-56535, CVE-2024-50142,
CVE-2024-50295, CVE-2024-56708, CVE-2024-50016, CVE-2024-49902,
CVE-2024-50120, CVE-2024-47748, CVE-2024-49982, CVE-2024-50257,
CVE-2024-50086, CVE-2024-50261, CVE-2024-53188, CVE-2024-49888,
CVE-2024-53106, CVE-2024-50073, CVE-2024-50186, CVE-2024-56544,
CVE-2024-47739, CVE-2024-50238, CVE-2024-56739, CVE-2024-49964,
CVE-2024-47686, CVE-2024-46869, CVE-2024-53116, CVE-2024-50014,
CVE-2024-53231, CVE-2024-53138, CVE-2024-50213, CVE-2024-50265,
CVE-2024-49998, CVE-2024-50292, CVE-2024-50137, CVE-2024-50114,
CVE-2024-53237, CVE-2024-49952, CVE-2024-53074, CVE-2024-49981,
CVE-2024-47733, CVE-2024-50019, CVE-2024-47719, CVE-2024-53068,
CVE-2024-49944, CVE-2024-50066, CVE-2024-50007, CVE-2024-53155,
CVE-2024-47756, CVE-2024-49947, CVE-2024-49951, CVE-2024-50065,
CVE-2024-49957, CVE-2024-50116, CVE-2024-50188, CVE-2024-50255,
CVE-2024-53197, CVE-2024-50267, CVE-2024-50124, CVE-2024-53069,
CVE-2024-53139, CVE-2024-47676, CVE-2024-56545, CVE-2024-53085,
CVE-2024-50163, CVE-2024-53092, CVE-2024-53099, CVE-2024-49889,
CVE-2024-53052, CVE-2024-49995, CVE-2024-49976, CVE-2024-50110,
CVE-2024-50192, CVE-2024-50208, CVE-2024-50276, CVE-2024-53170,
CVE-2024-50259, CVE-2024-47731, CVE-2024-49924, CVE-2024-56532,
CVE-2024-50048, CVE-2024-49965, CVE-2024-53147, CVE-2024-50205,
CVE-2024-49859, CVE-2024-53066, CVE-2024-47687, CVE-2024-50149,
CVE-2024-49864, CVE-2024-49867, CVE-2024-50160, CVE-2024-53058,
CVE-2024-47753, CVE-2024-49883, CVE-2024-53199, CVE-2024-56746,
CVE-2024-50094, CVE-2024-49946, CVE-2024-50006, CVE-2024-53101,
CVE-2024-49891, CVE-2024-50075, CVE-2024-47747, CVE-2024-47740,
CVE-2024-50248, CVE-2024-50162, CVE-2024-53090, CVE-2024-53203,
CVE-2024-50242, CVE-2024-49961, CVE-2024-50085, CVE-2024-50299,
CVE-2024-49980, CVE-2024-50280, CVE-2024-53107, CVE-2024-50199,
CVE-2024-53122, CVE-2024-56674, CVE-2024-50079, CVE-2024-50060,
CVE-2024-53210, CVE-2024-50177, CVE-2024-53223, CVE-2024-50127,
CVE-2024-53190, CVE-2022-49034, CVE-2024-56744, CVE-2024-50136,
CVE-2024-47675, CVE-2024-50303, CVE-2024-50123, CVE-2024-47738,
CVE-2024-50239, CVE-2024-50135, CVE-2024-53218, CVE-2024-50109,
CVE-2024-56724, CVE-2024-56681, CVE-2024-50027, CVE-2024-50081,
CVE-2024-50068, CVE-2024-50101, CVE-2024-50071, CVE-2024-50129,
CVE-2024-50091, CVE-2024-53112, CVE-2024-50181, CVE-2024-50080,
CVE-2024-47703, CVE-2024-47727, CVE-2024-53215, CVE-2024-53105,
CVE-2024-50174, CVE-2024-50105, CVE-2024-56700, CVE-2024-53173,
CVE-2024-49865, CVE-2024-49973, CVE-2024-56538, CVE-2024-50251,
CVE-2024-56692, CVE-2024-47671, CVE-2024-50189, CVE-2024-49853,
CVE-2024-50153, CVE-2024-53124, CVE-2024-56549, CVE-2024-53160,
CVE-2024-53174, CVE-2024-53117, CVE-2024-50279, CVE-2024-50118,
CVE-2024-47757, CVE-2024-50055, CVE-2024-49875, CVE-2024-50141,
CVE-2024-49890, CVE-2024-49878, CVE-2024-50134, CVE-2024-53042,
CVE-2024-56727, CVE-2024-49861, CVE-2024-49948, CVE-2024-50010,
CVE-2024-49930, CVE-2024-49877, CVE-2024-47690, CVE-2024-50115,
CVE-2024-50254, CVE-2024-50250, CVE-2024-47679, CVE-2024-50258,
CVE-2024-53128, CVE-2024-49994, CVE-2024-53154, CVE-2024-50037,
CVE-2024-53149, CVE-2024-50266, CVE-2024-50061, CVE-2024-56698,
CVE-2024-53118, CVE-2024-47689, CVE-2024-47708, CVE-2024-50131,
CVE-2024-50168, CVE-2024-53158, CVE-2024-49894, CVE-2024-50056,
CVE-2024-50231, CVE-2024-50270, CVE-2024-50269, CVE-2024-50237,
CVE-2024-56742, CVE-2024-49882, CVE-2024-47749, CVE-2024-49962,
CVE-2024-49933, CVE-2024-53045, CVE-2024-50028, CVE-2024-53178,
CVE-2024-50229, CVE-2024-50023, CVE-2024-50161, CVE-2024-56701,
CVE-2024-49978, CVE-2024-50093, CVE-2024-50195, CVE-2024-49986,
CVE-2024-53098, CVE-2024-53131, CVE-2024-47684, CVE-2024-53148,
CVE-2024-50058, CVE-2024-53086, CVE-2024-50113, CVE-2024-49989,
CVE-2024-50106, CVE-2024-53080, CVE-2024-53229, CVE-2024-50159,
CVE-2024-56531, CVE-2024-53110, CVE-2024-47736, CVE-2024-56542,
CVE-2024-47746)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.11.0-1015-oem 6.11.0-1015.15
linux-image-oem-24.04b 6.11.0-1015.15

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7310-1
CVE-2022-49034, CVE-2023-52917, CVE-2024-46869, CVE-2024-47671,
CVE-2024-47675, CVE-2024-47676, CVE-2024-47677, CVE-2024-47678,
CVE-2024-47679, CVE-2024-47680, CVE-2024-47681, CVE-2024-47682,
CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687,
CVE-2024-47688, CVE-2024-47689, CVE-2024-47690, CVE-2024-47691,
CVE-2024-47692, CVE-2024-47693, CVE-2024-47694, CVE-2024-47695,
CVE-2024-47696, CVE-2024-47697, CVE-2024-47698, CVE-2024-47699,
CVE-2024-47700, CVE-2024-47701, CVE-2024-47702, CVE-2024-47703,
CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47708,
CVE-2024-47709, CVE-2024-47710, CVE-2024-47711, CVE-2024-47712,
CVE-2024-47713, CVE-2024-47714, CVE-2024-47716, CVE-2024-47717,
CVE-2024-47718, CVE-2024-47719, CVE-2024-47720, CVE-2024-47721,
CVE-2024-47723, CVE-2024-47724, CVE-2024-47726, CVE-2024-47727,
CVE-2024-47728, CVE-2024-47730, CVE-2024-47731, CVE-2024-47732,
CVE-2024-47733, CVE-2024-47734, CVE-2024-47735, CVE-2024-47736,
CVE-2024-47737, CVE-2024-47738, CVE-2024-47739, CVE-2024-47740,
CVE-2024-47741, CVE-2024-47742, CVE-2024-47743, CVE-2024-47744,
CVE-2024-47745, CVE-2024-47746, CVE-2024-47747, CVE-2024-47748,
CVE-2024-47749, CVE-2024-47750, CVE-2024-47751, CVE-2024-47752,
CVE-2024-47753, CVE-2024-47754, CVE-2024-47756, CVE-2024-47757,
CVE-2024-49850, CVE-2024-49851, CVE-2024-49852, CVE-2024-49853,
CVE-2024-49855, CVE-2024-49856, CVE-2024-49857, CVE-2024-49858,
CVE-2024-49859, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862,
CVE-2024-49863, CVE-2024-49864, CVE-2024-49865, CVE-2024-49866,
CVE-2024-49867, CVE-2024-49868, CVE-2024-49869, CVE-2024-49870,
CVE-2024-49871, CVE-2024-49872, CVE-2024-49873, CVE-2024-49874,
CVE-2024-49875, CVE-2024-49876, CVE-2024-49877, CVE-2024-49878,
CVE-2024-49879, CVE-2024-49880, CVE-2024-49881, CVE-2024-49882,
CVE-2024-49883, CVE-2024-49884, CVE-2024-49885, CVE-2024-49886,
CVE-2024-49887, CVE-2024-49888, CVE-2024-49889, CVE-2024-49890,
CVE-2024-49891, CVE-2024-49892, CVE-2024-49894, CVE-2024-49895,
CVE-2024-49900, CVE-2024-49901, CVE-2024-49902, CVE-2024-49903,
CVE-2024-49924, CVE-2024-49925, CVE-2024-49926, CVE-2024-49927,
CVE-2024-49928, CVE-2024-49929, CVE-2024-49930, CVE-2024-49931,
CVE-2024-49932, CVE-2024-49933, CVE-2024-49934, CVE-2024-49935,
CVE-2024-49936, CVE-2024-49937, CVE-2024-49938, CVE-2024-49939,
CVE-2024-49940, CVE-2024-49941, CVE-2024-49942, CVE-2024-49943,
CVE-2024-49944, CVE-2024-49945, CVE-2024-49946, CVE-2024-49947,
CVE-2024-49948, CVE-2024-49949, CVE-2024-49950, CVE-2024-49951,
CVE-2024-49952, CVE-2024-49953, CVE-2024-49954, CVE-2024-49955,
CVE-2024-49956, CVE-2024-49957, CVE-2024-49958, CVE-2024-49959,
CVE-2024-49960, CVE-2024-49961, CVE-2024-49962, CVE-2024-49963,
CVE-2024-49964, CVE-2024-49965, CVE-2024-49966, CVE-2024-49968,
CVE-2024-49969, CVE-2024-49970, CVE-2024-49971, CVE-2024-49972,
CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976,
CVE-2024-49977, CVE-2024-49978, CVE-2024-49979, CVE-2024-49980,
CVE-2024-49981, CVE-2024-49982, CVE-2024-49983, CVE-2024-49985,
CVE-2024-49986, CVE-2024-49987, CVE-2024-49988, CVE-2024-49989,
CVE-2024-49991, CVE-2024-49992, CVE-2024-49994, CVE-2024-49995,
CVE-2024-49996, CVE-2024-49997, CVE-2024-49998, CVE-2024-49999,
CVE-2024-50000, CVE-2024-50001, CVE-2024-50002, CVE-2024-50003,
CVE-2024-50005, CVE-2024-50006, CVE-2024-50007, CVE-2024-50008,
CVE-2024-50009, CVE-2024-50010, CVE-2024-50012, CVE-2024-50013,
CVE-2024-50014, CVE-2024-50015, CVE-2024-50016, CVE-2024-50017,
CVE-2024-50019, CVE-2024-50020, CVE-2024-50021, CVE-2024-50022,
CVE-2024-50023, CVE-2024-50024, CVE-2024-50025, CVE-2024-50026,
CVE-2024-50027, CVE-2024-50028, CVE-2024-50029, CVE-2024-50030,
CVE-2024-50031, CVE-2024-50033, CVE-2024-50034, CVE-2024-50035,
CVE-2024-50036, CVE-2024-50037, CVE-2024-50038, CVE-2024-50039,
CVE-2024-50040, CVE-2024-50041, CVE-2024-50042, CVE-2024-50043,
CVE-2024-50044, CVE-2024-50045, CVE-2024-50046, CVE-2024-50047,
CVE-2024-50048, CVE-2024-50049, CVE-2024-50055, CVE-2024-50056,
CVE-2024-50057, CVE-2024-50058, CVE-2024-50059, CVE-2024-50060,
CVE-2024-50061, CVE-2024-50062, CVE-2024-50063, CVE-2024-50064,
CVE-2024-50065, CVE-2024-50066, CVE-2024-50067, CVE-2024-50068,
CVE-2024-50069, CVE-2024-50070, CVE-2024-50071, CVE-2024-50072,
CVE-2024-50073, CVE-2024-50074, CVE-2024-50075, CVE-2024-50076,
CVE-2024-50077, CVE-2024-50078, CVE-2024-50079, CVE-2024-50080,
CVE-2024-50081, CVE-2024-50082, CVE-2024-50083, CVE-2024-50084,
CVE-2024-50085, CVE-2024-50086, CVE-2024-50087, CVE-2024-50088,
CVE-2024-50090, CVE-2024-50091, CVE-2024-50092, CVE-2024-50093,
CVE-2024-50094, CVE-2024-50095, CVE-2024-50096, CVE-2024-50098,
CVE-2024-50099, CVE-2024-50100, CVE-2024-50101, CVE-2024-50102,
CVE-2024-50103, CVE-2024-50104, CVE-2024-50105, CVE-2024-50106,
CVE-2024-50107, CVE-2024-50108, CVE-2024-50109, CVE-2024-50110,
CVE-2024-50111, CVE-2024-50112, CVE-2024-50113, CVE-2024-50114,
CVE-2024-50115, CVE-2024-50116, CVE-2024-50117, CVE-2024-50118,
CVE-2024-50119, CVE-2024-50120, CVE-2024-50121, CVE-2024-50122,
CVE-2024-50123, CVE-2024-50124, CVE-2024-50125, CVE-2024-50126,
CVE-2024-50127, CVE-2024-50128, CVE-2024-50129, CVE-2024-50130,
CVE-2024-50131, CVE-2024-50132, CVE-2024-50133, CVE-2024-50134,
CVE-2024-50135, CVE-2024-50136, CVE-2024-50137, CVE-2024-50138,
CVE-2024-50139, CVE-2024-50140, CVE-2024-50141, CVE-2024-50142,
CVE-2024-50143, CVE-2024-50144, CVE-2024-50145, CVE-2024-50146,
CVE-2024-50147, CVE-2024-50148, CVE-2024-50149, CVE-2024-50150,
CVE-2024-50151, CVE-2024-50152, CVE-2024-50153, CVE-2024-50154,
CVE-2024-50155, CVE-2024-50156, CVE-2024-50157, CVE-2024-50158,
CVE-2024-50159, CVE-2024-50160, CVE-2024-50161, CVE-2024-50162,
CVE-2024-50163, CVE-2024-50164, CVE-2024-50165, CVE-2024-50166,
CVE-2024-50167, CVE-2024-50168, CVE-2024-50169, CVE-2024-50170,
CVE-2024-50171, CVE-2024-50172, CVE-2024-50173, CVE-2024-50174,
CVE-2024-50176, CVE-2024-50177, CVE-2024-50178, CVE-2024-50179,
CVE-2024-50180, CVE-2024-50181, CVE-2024-50182, CVE-2024-50183,
CVE-2024-50184, CVE-2024-50185, CVE-2024-50186, CVE-2024-50187,
CVE-2024-50188, CVE-2024-50189, CVE-2024-50190, CVE-2024-50191,
CVE-2024-50192, CVE-2024-50193, CVE-2024-50194, CVE-2024-50195,
CVE-2024-50196, CVE-2024-50197, CVE-2024-50198, CVE-2024-50199,
CVE-2024-50200, CVE-2024-50201, CVE-2024-50202, CVE-2024-50203,
CVE-2024-50204, CVE-2024-50205, CVE-2024-50206, CVE-2024-50207,
CVE-2024-50208, CVE-2024-50209, CVE-2024-50211, CVE-2024-50212,
CVE-2024-50213, CVE-2024-50214, CVE-2024-50215, CVE-2024-50216,
CVE-2024-50217, CVE-2024-50218, CVE-2024-50220, CVE-2024-50221,
CVE-2024-50222, CVE-2024-50223, CVE-2024-50224, CVE-2024-50225,
CVE-2024-50226, CVE-2024-50227, CVE-2024-50229, CVE-2024-50230,
CVE-2024-50231, CVE-2024-50232, CVE-2024-50233, CVE-2024-50234,
CVE-2024-50235, CVE-2024-50236, CVE-2024-50237, CVE-2024-50238,
CVE-2024-50239, CVE-2024-50240, CVE-2024-50242, CVE-2024-50243,
CVE-2024-50244, CVE-2024-50245, CVE-2024-50246, CVE-2024-50247,
CVE-2024-50248, CVE-2024-50250, CVE-2024-50251, CVE-2024-50252,
CVE-2024-50253, CVE-2024-50254, CVE-2024-50255, CVE-2024-50256,
CVE-2024-50257, CVE-2024-50258, CVE-2024-50259, CVE-2024-50260,
CVE-2024-50261, CVE-2024-50262, CVE-2024-50263, CVE-2024-50265,
CVE-2024-50266, CVE-2024-50267, CVE-2024-50268, CVE-2024-50269,
CVE-2024-50270, CVE-2024-50271, CVE-2024-50272, CVE-2024-50273,
CVE-2024-50274, CVE-2024-50275, CVE-2024-50276, CVE-2024-50277,
CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50281,
CVE-2024-50282, CVE-2024-50283, CVE-2024-50284, CVE-2024-50285,
CVE-2024-50286, CVE-2024-50287, CVE-2024-50288, CVE-2024-50289,
CVE-2024-50290, CVE-2024-50291, CVE-2024-50292, CVE-2024-50293,
CVE-2024-50294, CVE-2024-50295, CVE-2024-50296, CVE-2024-50297,
CVE-2024-50298, CVE-2024-50299, CVE-2024-50300, CVE-2024-50301,
CVE-2024-50302, CVE-2024-50303, CVE-2024-50304, CVE-2024-53042,
CVE-2024-53043, CVE-2024-53044, CVE-2024-53045, CVE-2024-53046,
CVE-2024-53047, CVE-2024-53048, CVE-2024-53049, CVE-2024-53052,
CVE-2024-53053, CVE-2024-53055, CVE-2024-53056, CVE-2024-53058,
CVE-2024-53059, CVE-2024-53061, CVE-2024-53062, CVE-2024-53063,
CVE-2024-53064, CVE-2024-53065, CVE-2024-53066, CVE-2024-53067,
CVE-2024-53068, CVE-2024-53069, CVE-2024-53071, CVE-2024-53072,
CVE-2024-53074, CVE-2024-53075, CVE-2024-53076, CVE-2024-53077,
CVE-2024-53078, CVE-2024-53079, CVE-2024-53080, CVE-2024-53081,
CVE-2024-53082, CVE-2024-53083, CVE-2024-53084, CVE-2024-53085,
CVE-2024-53086, CVE-2024-53087, CVE-2024-53088, CVE-2024-53089,
CVE-2024-53090, CVE-2024-53091, CVE-2024-53092, CVE-2024-53093,
CVE-2024-53094, CVE-2024-53095, CVE-2024-53098, CVE-2024-53099,
CVE-2024-53100, CVE-2024-53101, CVE-2024-53104, CVE-2024-53105,
CVE-2024-53106, CVE-2024-53107, CVE-2024-53108, CVE-2024-53109,
CVE-2024-53110, CVE-2024-53111, CVE-2024-53112, CVE-2024-53113,
CVE-2024-53114, CVE-2024-53115, CVE-2024-53116, CVE-2024-53117,
CVE-2024-53118, CVE-2024-53119, CVE-2024-53120, CVE-2024-53121,
CVE-2024-53122, CVE-2024-53123, CVE-2024-53124, CVE-2024-53125,
CVE-2024-53126, CVE-2024-53127, CVE-2024-53128, CVE-2024-53129,
CVE-2024-53130, CVE-2024-53131, CVE-2024-53132, CVE-2024-53133,
CVE-2024-53134, CVE-2024-53135, CVE-2024-53137, CVE-2024-53138,
CVE-2024-53139, CVE-2024-53140, CVE-2024-53141, CVE-2024-53142,
CVE-2024-53143, CVE-2024-53144, CVE-2024-53145, CVE-2024-53146,
CVE-2024-53147, CVE-2024-53148, CVE-2024-53149, CVE-2024-53150,
CVE-2024-53151, CVE-2024-53152, CVE-2024-53153, CVE-2024-53154,
CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53158,
CVE-2024-53160, CVE-2024-53161, CVE-2024-53162, CVE-2024-53163,
CVE-2024-53165, CVE-2024-53166, CVE-2024-53167, CVE-2024-53168,
CVE-2024-53169, CVE-2024-53170, CVE-2024-53171, CVE-2024-53172,
CVE-2024-53173, CVE-2024-53174, CVE-2024-53175, CVE-2024-53176,
CVE-2024-53177, CVE-2024-53178, CVE-2024-53180, CVE-2024-53181,
CVE-2024-53183, CVE-2024-53184, CVE-2024-53187, CVE-2024-53188,
CVE-2024-53189, CVE-2024-53190, CVE-2024-53191, CVE-2024-53192,
CVE-2024-53193, CVE-2024-53194, CVE-2024-53195, CVE-2024-53196,
CVE-2024-53197, CVE-2024-53198, CVE-2024-53199, CVE-2024-53200,
CVE-2024-53201, CVE-2024-53202, CVE-2024-53203, CVE-2024-53208,
CVE-2024-53209, CVE-2024-53210, CVE-2024-53212, CVE-2024-53213,
CVE-2024-53214, CVE-2024-53215, CVE-2024-53216, CVE-2024-53217,
CVE-2024-53218, CVE-2024-53219, CVE-2024-53220, CVE-2024-53221,
CVE-2024-53223, CVE-2024-53224, CVE-2024-53226, CVE-2024-53227,
CVE-2024-53228, CVE-2024-53229, CVE-2024-53230, CVE-2024-53231,
CVE-2024-53232, CVE-2024-53233, CVE-2024-53234, CVE-2024-53236,
CVE-2024-53237, CVE-2024-53239, CVE-2024-56531, CVE-2024-56532,
CVE-2024-56533, CVE-2024-56534, CVE-2024-56535, CVE-2024-56536,
CVE-2024-56537, CVE-2024-56538, CVE-2024-56539, CVE-2024-56540,
CVE-2024-56541, CVE-2024-56542, CVE-2024-56543, CVE-2024-56544,
CVE-2024-56545, CVE-2024-56546, CVE-2024-56548, CVE-2024-56549,
CVE-2024-56674, CVE-2024-56677, CVE-2024-56678, CVE-2024-56679,
CVE-2024-56680, CVE-2024-56681, CVE-2024-56683, CVE-2024-56684,
CVE-2024-56685, CVE-2024-56687, CVE-2024-56688, CVE-2024-56689,
CVE-2024-56690, CVE-2024-56691, CVE-2024-56692, CVE-2024-56693,
CVE-2024-56694, CVE-2024-56696, CVE-2024-56697, CVE-2024-56698,
CVE-2024-56699, CVE-2024-56700, CVE-2024-56701, CVE-2024-56702,
CVE-2024-56703, CVE-2024-56704, CVE-2024-56705, CVE-2024-56707,
CVE-2024-56708, CVE-2024-56720, CVE-2024-56721, CVE-2024-56722,
CVE-2024-56723, CVE-2024-56724, CVE-2024-56725, CVE-2024-56726,
CVE-2024-56727, CVE-2024-56728, CVE-2024-56729, CVE-2024-56739,
CVE-2024-56741, CVE-2024-56742, CVE-2024-56744, CVE-2024-56745,
CVE-2024-56746, CVE-2024-56747, CVE-2024-56748, CVE-2024-56749,
CVE-2024-56751, CVE-2024-56752, CVE-2024-56754, CVE-2024-56755,
CVE-2024-56756, CVE-2025-0927

Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-6.11/6.11.0-1015.15

[USN-7303-2] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7303-2
February 28, 2025

linux-oracle, linux-oracle-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- Network block device driver;
- TPM device driver;
- Hardware crypto device drivers;
- ARM SCMI message protocol;
- EFI core;
- GPU drivers;
- I2C subsystem;
- I3C subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- IOMMU subsystem;
- Mailbox framework;
- Media drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- PCI subsystem;
- Alibaba DDR Sub-System Driveway PMU driver;
- x86 platform drivers;
- Powercap sysfs driver;
- Remote Processor subsystem;
- SCSI subsystem;
- USB Device Class drivers;
- vDPA drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- AFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- SMB network file system;
- BPF subsystem;
- Virtio network driver;
- TCP network protocol;
- Perf events;
- Padata parallel execution mechanism;
- RCU subsystem;
- Arbitrary resource management;
- Static call mechanism;
- Tracing infrastructure;
- Memory management;
- Bluetooth subsystem;
- CAN network layer;
- Networking core;
- Distributed Switch Architecture;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- IEEE 802.15.4 subsystem;
- NCSI (Network Controller Sideband Interface) driver;
- RxRPC session sockets;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- AudioScience HPI driver;
- KVM core;
(CVE-2024-47718, CVE-2024-49942, CVE-2024-49897, CVE-2024-49871,
CVE-2024-47687, CVE-2024-47692, CVE-2024-47740, CVE-2024-47691,
CVE-2024-49973, CVE-2024-49958, CVE-2024-49889, CVE-2024-49927,
CVE-2024-49883, CVE-2024-49885, CVE-2024-49912, CVE-2024-47686,
CVE-2024-49985, CVE-2024-47732, CVE-2024-47685, CVE-2024-49935,
CVE-2024-49995, CVE-2024-47731, CVE-2024-49931, CVE-2024-49886,
CVE-2024-53144, CVE-2024-49917, CVE-2024-49868, CVE-2024-49999,
CVE-2024-47684, CVE-2024-50013, CVE-2024-49962, CVE-2024-49981,
CVE-2024-49858, CVE-2024-49878, CVE-2024-49852, CVE-2024-49928,
CVE-2024-50006, CVE-2024-49988, CVE-2024-47697, CVE-2024-49923,
CVE-2024-47704, CVE-2024-49947, CVE-2024-47751, CVE-2024-47672,
CVE-2024-47737, CVE-2024-49909, CVE-2024-49992, CVE-2024-49944,
CVE-2024-49950, CVE-2024-49850, CVE-2024-49951, CVE-2024-49996,
CVE-2024-49934, CVE-2024-47705, CVE-2024-47741, CVE-2024-49957,
CVE-2024-47682, CVE-2024-49976, CVE-2024-49895, CVE-2024-47689,
CVE-2024-49937, CVE-2024-47702, CVE-2024-49959, CVE-2024-47719,
CVE-2024-49922, CVE-2024-47743, CVE-2024-47696, CVE-2024-50017,
CVE-2024-49864, CVE-2024-47747, CVE-2024-47748, CVE-2024-47701,
CVE-2024-49915, CVE-2024-49877, CVE-2024-41016, CVE-2024-49961,
CVE-2024-47730, CVE-2024-49924, CVE-2024-49974, CVE-2024-49875,
CVE-2024-49918, CVE-2024-47712, CVE-2024-50014, CVE-2024-47679,
CVE-2024-49894, CVE-2024-49911, CVE-2024-49855, CVE-2024-49948,
CVE-2024-49955, CVE-2023-52917, CVE-2024-50015, CVE-2024-47754,
CVE-2024-49929, CVE-2024-50005, CVE-2024-47742, CVE-2024-49991,
CVE-2024-49913, CVE-2024-49980, CVE-2024-47749, CVE-2024-49975,
CVE-2024-47671, CVE-2024-47677, CVE-2024-47727, CVE-2024-47716,
CVE-2024-47707, CVE-2024-49870, CVE-2024-47703, CVE-2024-47710,
CVE-2024-49977, CVE-2024-49997, CVE-2024-49853, CVE-2024-47681,
CVE-2024-49986, CVE-2024-49969, CVE-2024-50000, CVE-2024-47690,
CVE-2024-47709, CVE-2024-47713, CVE-2024-47720, CVE-2024-49879,
CVE-2024-47699, CVE-2024-47714, CVE-2024-50012, CVE-2024-49880,
CVE-2024-49946, CVE-2024-47735, CVE-2024-49876, CVE-2024-49963,
CVE-2024-50176, CVE-2024-49952, CVE-2024-49881, CVE-2024-49987,
CVE-2024-49919, CVE-2024-49860, CVE-2024-47744, CVE-2024-47723,
CVE-2024-50001, CVE-2024-47756, CVE-2024-49867, CVE-2024-47728,
CVE-2024-49933, CVE-2024-47752, CVE-2024-49998, CVE-2024-50179,
CVE-2024-47706, CVE-2024-49989, CVE-2024-47670, CVE-2024-49965,
CVE-2024-47673, CVE-2024-47700, CVE-2024-47688, CVE-2024-49953,
CVE-2024-50016, CVE-2024-49907, CVE-2024-49930, CVE-2024-50002,
CVE-2024-49859, CVE-2024-49939, CVE-2024-47675, CVE-2024-49861,
CVE-2024-50175, CVE-2024-47757, CVE-2024-49900, CVE-2024-49954,
CVE-2024-49982, CVE-2024-49891, CVE-2024-47678, CVE-2024-49936,
CVE-2024-49901, CVE-2024-49898, CVE-2024-47693, CVE-2024-50007,
CVE-2024-49896, CVE-2024-49863, CVE-2024-47750, CVE-2024-49949,
CVE-2024-49888, CVE-2024-47739, CVE-2024-49983, CVE-2024-47695,
CVE-2024-47738, CVE-2024-47734, CVE-2024-49892, CVE-2024-47698,
CVE-2024-49902, CVE-2024-47715, CVE-2024-49926, CVE-2024-49882,
CVE-2024-49978, CVE-2024-49945, CVE-2024-49925, CVE-2024-47733,
CVE-2024-49874, CVE-2024-49856, CVE-2024-49966, CVE-2024-49960,
CVE-2024-49905, CVE-2024-49866, CVE-2024-49903, CVE-2024-49862,
CVE-2024-50008, CVE-2024-49994, CVE-2024-49851, CVE-2024-47745,
CVE-2024-49884, CVE-2024-47753, CVE-2024-49938, CVE-2024-49890)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1020-oracle 6.8.0-1020.21
linux-image-6.8.0-1020-oracle-64k 6.8.0-1020.21
linux-image-oracle 6.8.0-1020.21
linux-image-oracle-64k 6.8.0-1020.21
linux-image-oracle-64k-lts-24.04 6.8.0-1020.21
linux-image-oracle-lts-24.04 6.8.0-1020.21

Ubuntu 22.04 LTS
linux-image-6.8.0-1020-oracle 6.8.0-1020.21~22.04.1
linux-image-6.8.0-1020-oracle-64k 6.8.0-1020.21~22.04.1
linux-image-oracle 6.8.0-1020.21~22.04.1
linux-image-oracle-64k 6.8.0-1020.21~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7303-2
https://ubuntu.com/security/notices/USN-7303-1
CVE-2023-52917, CVE-2024-41016, CVE-2024-47670, CVE-2024-47671,
CVE-2024-47672, CVE-2024-47673, CVE-2024-47675, CVE-2024-47677,
CVE-2024-47678, CVE-2024-47679, CVE-2024-47681, CVE-2024-47682,
CVE-2024-47684, CVE-2024-47685, CVE-2024-47686, CVE-2024-47687,
CVE-2024-47688, CVE-2024-47689, CVE-2024-47690, CVE-2024-47691,
CVE-2024-47692, CVE-2024-47693, CVE-2024-47695, CVE-2024-47696,
CVE-2024-47697, CVE-2024-47698, CVE-2024-47699, CVE-2024-47700,
CVE-2024-47701, CVE-2024-47702, CVE-2024-47703, CVE-2024-47704,
CVE-2024-47705, CVE-2024-47706, CVE-2024-47707, CVE-2024-47709,
CVE-2024-47710, CVE-2024-47712, CVE-2024-47713, CVE-2024-47714,
CVE-2024-47715, CVE-2024-47716, CVE-2024-47718, CVE-2024-47719,
CVE-2024-47720, CVE-2024-47723, CVE-2024-47727, CVE-2024-47728,
CVE-2024-47730, CVE-2024-47731, CVE-2024-47732, CVE-2024-47733,
CVE-2024-47734, CVE-2024-47735, CVE-2024-47737, CVE-2024-47738,
CVE-2024-47739, CVE-2024-47740, CVE-2024-47741, CVE-2024-47742,
CVE-2024-47743, CVE-2024-47744, CVE-2024-47745, CVE-2024-47747,
CVE-2024-47748, CVE-2024-47749, CVE-2024-47750, CVE-2024-47751,
CVE-2024-47752, CVE-2024-47753, CVE-2024-47754, CVE-2024-47756,
CVE-2024-47757, CVE-2024-49850, CVE-2024-49851, CVE-2024-49852,
CVE-2024-49853, CVE-2024-49855, CVE-2024-49856, CVE-2024-49858,
CVE-2024-49859, CVE-2024-49860, CVE-2024-49861, CVE-2024-49862,
CVE-2024-49863, CVE-2024-49864, CVE-2024-49866, CVE-2024-49867,
CVE-2024-49868, CVE-2024-49870, CVE-2024-49871, CVE-2024-49874,
CVE-2024-49875, CVE-2024-49876, CVE-2024-49877, CVE-2024-49878,
CVE-2024-49879, CVE-2024-49880, CVE-2024-49881, CVE-2024-49882,
CVE-2024-49883, CVE-2024-49884, CVE-2024-49885, CVE-2024-49886,
CVE-2024-49888, CVE-2024-49889, CVE-2024-49890, CVE-2024-49891,
CVE-2024-49892, CVE-2024-49894, CVE-2024-49895, CVE-2024-49896,
CVE-2024-49897, CVE-2024-49898, CVE-2024-49900, CVE-2024-49901,
CVE-2024-49902, CVE-2024-49903, CVE-2024-49905, CVE-2024-49907,
CVE-2024-49909, CVE-2024-49911, CVE-2024-49912, CVE-2024-49913,
CVE-2024-49915, CVE-2024-49917, CVE-2024-49918, CVE-2024-49919,
CVE-2024-49922, CVE-2024-49923, CVE-2024-49924, CVE-2024-49925,
CVE-2024-49926, CVE-2024-49927, CVE-2024-49928, CVE-2024-49929,
CVE-2024-49930, CVE-2024-49931, CVE-2024-49933, CVE-2024-49934,
CVE-2024-49935, CVE-2024-49936, CVE-2024-49937, CVE-2024-49938,
CVE-2024-49939, CVE-2024-49942, CVE-2024-49944, CVE-2024-49945,
CVE-2024-49946, CVE-2024-49947, CVE-2024-49948, CVE-2024-49949,
CVE-2024-49950, CVE-2024-49951, CVE-2024-49952, CVE-2024-49953,
CVE-2024-49954, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958,
CVE-2024-49959, CVE-2024-49960, CVE-2024-49961, CVE-2024-49962,
CVE-2024-49963, CVE-2024-49965, CVE-2024-49966, CVE-2024-49969,
CVE-2024-49973, CVE-2024-49974, CVE-2024-49975, CVE-2024-49976,
CVE-2024-49977, CVE-2024-49978, CVE-2024-49980, CVE-2024-49981,
CVE-2024-49982, CVE-2024-49983, CVE-2024-49985, CVE-2024-49986,
CVE-2024-49987, CVE-2024-49988, CVE-2024-49989, CVE-2024-49991,
CVE-2024-49992, CVE-2024-49994, CVE-2024-49995, CVE-2024-49996,
CVE-2024-49997, CVE-2024-49998, CVE-2024-49999, CVE-2024-50000,
CVE-2024-50001, CVE-2024-50002, CVE-2024-50005, CVE-2024-50006,
CVE-2024-50007, CVE-2024-50008, CVE-2024-50012, CVE-2024-50013,
CVE-2024-50014, CVE-2024-50015, CVE-2024-50016, CVE-2024-50017,
CVE-2024-50175, CVE-2024-50176, CVE-2024-50179, CVE-2024-53144

Package Information:
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1020.21
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1020.21~22.04.1

[USN-7294-3] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7294-3
February 28, 2025

linux-ibm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-ibm: Linux kernel for IBM cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- TPM device driver;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- InfiniBand drivers;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- NTB driver;
- Virtio pmem driver;
- Parport drivers;
- PCI subsystem;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- USB Device Class drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- Framebuffer layer;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- File systems infrastructure;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- SMB network file system;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- BPF subsystem;
- Perf events;
- Arbitrary resource management;
- Timer substystem drivers;
- Tracing infrastructure;
- Closures library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Netfilter;
- Netlink;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- XFRM subsystem;
- Key management;
- FireWire sound drivers;
- AudioScience HPI driver;
- Amlogic Meson SoC drivers;
- KVM core;
(CVE-2024-47698, CVE-2024-49868, CVE-2024-50006, CVE-2024-40965,
CVE-2024-50233, CVE-2024-47671, CVE-2024-49944, CVE-2024-47684,
CVE-2024-50134, CVE-2024-50279, CVE-2024-50302, CVE-2024-40953,
CVE-2024-50234, CVE-2024-41066, CVE-2024-50040, CVE-2024-47701,
CVE-2024-50033, CVE-2024-50007, CVE-2024-50143, CVE-2024-41016,
CVE-2024-53059, CVE-2024-50195, CVE-2024-50202, CVE-2024-47749,
CVE-2024-47685, CVE-2024-50267, CVE-2024-49965, CVE-2024-49903,
CVE-2024-49883, CVE-2024-50035, CVE-2024-46849, CVE-2024-53061,
CVE-2024-50151, CVE-2024-49995, CVE-2024-49867, CVE-2024-49962,
CVE-2024-50218, CVE-2024-50039, CVE-2024-50148, CVE-2024-49900,
CVE-2024-50287, CVE-2024-50150, CVE-2024-49879, CVE-2024-47757,
CVE-2024-49997, CVE-2024-50045, CVE-2024-47742, CVE-2024-47679,
CVE-2024-53063, CVE-2024-49878, CVE-2024-49860, CVE-2024-35896,
CVE-2024-40911, CVE-2024-42252, CVE-2024-47723, CVE-2024-47674,
CVE-2024-47737, CVE-2024-50282, CVE-2024-44931, CVE-2024-49938,
CVE-2024-49963, CVE-2024-50290, CVE-2024-49958, CVE-2021-47469,
CVE-2024-47670, CVE-2024-50116, CVE-2024-50262, CVE-2024-50082,
CVE-2023-52917, CVE-2024-50117, CVE-2024-50131, CVE-2024-47699,
CVE-2024-49896, CVE-2024-49957, CVE-2024-49952, CVE-2024-50273,
CVE-2024-50171, CVE-2024-50237, CVE-2024-49955, CVE-2024-50230,
CVE-2024-50194, CVE-2024-50278, CVE-2024-50127, CVE-2024-53066,
CVE-2024-38544, CVE-2024-49902, CVE-2024-49892, CVE-2024-46854,
CVE-2024-49966, CVE-2024-50167, CVE-2024-47697, CVE-2024-49985,
CVE-2024-47696, CVE-2024-50024, CVE-2024-50251, CVE-2024-47740,
CVE-2024-49882, CVE-2024-49851, CVE-2024-50059, CVE-2024-49973,
CVE-2024-35887, CVE-2024-50296, CVE-2024-47706, CVE-2024-50044,
CVE-2024-47712, CVE-2024-50301, CVE-2024-47709, CVE-2024-49975,
CVE-2024-49877, CVE-2024-47710, CVE-2024-50269, CVE-2024-46731,
CVE-2024-50099, CVE-2024-50184, CVE-2024-50299, CVE-2024-50008,
CVE-2024-50265, CVE-2024-49948, CVE-2024-50229, CVE-2024-50168,
CVE-2024-49894, CVE-2024-47692, CVE-2024-50074, CVE-2024-47713,
CVE-2024-49924, CVE-2024-53104, CVE-2024-50205, CVE-2024-47672,
CVE-2024-50096, CVE-2024-47747, CVE-2024-50199, CVE-2023-52458,
CVE-2024-49959, CVE-2024-50236, CVE-2024-53101, CVE-2024-43863,
CVE-2024-46853, CVE-2024-50179, CVE-2024-49981, CVE-2024-47756,
CVE-2024-49949, CVE-2024-50142, CVE-2024-49982, CVE-2024-50180)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1086-ibm 5.4.0-1086.91
linux-image-ibm-lts-20.04 5.4.0.1086.115

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7294-3
https://ubuntu.com/security/notices/USN-7294-2
https://ubuntu.com/security/notices/USN-7294-1
CVE-2021-47469, CVE-2023-52458, CVE-2023-52917, CVE-2024-35887,
CVE-2024-35896, CVE-2024-38544, CVE-2024-40911, CVE-2024-40953,
CVE-2024-40965, CVE-2024-41016, CVE-2024-41066, CVE-2024-42252,
CVE-2024-43863, CVE-2024-44931, CVE-2024-46731, CVE-2024-46849,
CVE-2024-46853, CVE-2024-46854, CVE-2024-47670, CVE-2024-47671,
CVE-2024-47672, CVE-2024-47674, CVE-2024-47679, CVE-2024-47684,
CVE-2024-47685, CVE-2024-47692, CVE-2024-47696, CVE-2024-47697,
CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47706,
CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713,
CVE-2024-47723, CVE-2024-47737, CVE-2024-47740, CVE-2024-47742,
CVE-2024-47747, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757,
CVE-2024-49851, CVE-2024-49860, CVE-2024-49867, CVE-2024-49868,
CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49882,
CVE-2024-49883, CVE-2024-49892, CVE-2024-49894, CVE-2024-49896,
CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49924,
CVE-2024-49938, CVE-2024-49944, CVE-2024-49948, CVE-2024-49949,
CVE-2024-49952, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958,
CVE-2024-49959, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965,
CVE-2024-49966, CVE-2024-49973, CVE-2024-49975, CVE-2024-49981,
CVE-2024-49982, CVE-2024-49985, CVE-2024-49995, CVE-2024-49997,
CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50024,
CVE-2024-50033, CVE-2024-50035, CVE-2024-50039, CVE-2024-50040,
CVE-2024-50044, CVE-2024-50045, CVE-2024-50059, CVE-2024-50074,
CVE-2024-50082, CVE-2024-50096, CVE-2024-50099, CVE-2024-50116,
CVE-2024-50117, CVE-2024-50127, CVE-2024-50131, CVE-2024-50134,
CVE-2024-50142, CVE-2024-50143, CVE-2024-50148, CVE-2024-50150,
CVE-2024-50151, CVE-2024-50167, CVE-2024-50168, CVE-2024-50171,
CVE-2024-50179, CVE-2024-50180, CVE-2024-50184, CVE-2024-50194,
CVE-2024-50195, CVE-2024-50199, CVE-2024-50202, CVE-2024-50205,
CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50233,
CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50251,
CVE-2024-50262, CVE-2024-50265, CVE-2024-50267, CVE-2024-50269,
CVE-2024-50273, CVE-2024-50278, CVE-2024-50279, CVE-2024-50282,
CVE-2024-50287, CVE-2024-50290, CVE-2024-50296, CVE-2024-50299,
CVE-2024-50301, CVE-2024-50302, CVE-2024-53059, CVE-2024-53061,
CVE-2024-53063, CVE-2024-53066, CVE-2024-53101, CVE-2024-53104

Package Information:
https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1086.91

Thursday, February 27, 2025

[lfs-announce] LFS-12.3-rc2 is released

The Linux From Scratch community announces the release of LFS Version 12.3-rc2. It is
a preliminary release of LFS-12.3.

Major changes from 12.3-rc1 include upgrades to systemd and udev from systemd (sysV
version) to incorporate changes inconsistent with the linux-6.12.4 kernel. Upgrades
to seven other packages are also included.

We encourage all users to read through this release of the book and test
the instructions so that we can make the final release as good as possible.

You can read the book online [0], or download [1] to read locally.

In coordination with this release, a new version of LFS using the systemd package is
also being released. This package implements the newer systemd style of system
initialization and control and is consistent with LFS in most packages.
>
> You can read the systemd version of the book online [2], or download [3]
> to read locally.
>
> -- Bruce
>
> [0] http://www.linuxfromscratch.org/lfs/view/12.3-rc2/
> [1] http://www.linuxfromscratch.org/lfs/downloads/12.3-rc2/
> [2] http://www.linuxfromscratch.org/lfs/view/12.3-systemd-rc2/
> [3] http://www.linuxfromscratch.org/lfs/downloads/12.3-systemd-rc2/

[USN-7207-2] Git vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=ZYqu
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7207-2
February 27, 2025

git vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Git.

Software Description:
- git: fast, scalable, distributed revision control system

Details:

USN-7207-1 fixed vulnerabilities in Git. This update provides the
corresponding updates for Ubuntu 20.04 LTS.

Original advisory details:

It was discovered that Git incorrectly handled certain URLs when
asking for credentials. An attacker could possibly use this
issue to mislead the user into typing passwords for trusted
sites that would then be sent to untrusted sites instead.
(CVE-2024-50349)
It was discovered that git incorrectly handled line endings when
using credential helpers. (CVE-2024-52006)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
git 1:2.25.1-1ubuntu3.14

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7207-2
https://ubuntu.com/security/notices/USN-7207-1
CVE-2024-50349, CVE-2024-52006

Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.25.1-1ubuntu3.14

[USN-7294-2] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7294-2
February 27, 2025

linux-aws, linux-oracle, linux-oracle-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-oracle-5.4: Linux kernel for Oracle Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- Block layer subsystem;
- ACPI drivers;
- Drivers core;
- ATA over ethernet (AOE) driver;
- TPM device driver;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- InfiniBand drivers;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- NTB driver;
- Virtio pmem driver;
- Parport drivers;
- PCI subsystem;
- SPI subsystem;
- Direct Digital Synthesis drivers;
- USB Device Class drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- Framebuffer layer;
- BTRFS file system;
- Ceph distributed file system;
- Ext4 file system;
- F2FS file system;
- File systems infrastructure;
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- SMB network file system;
- Network traffic control;
- Network sockets;
- TCP network protocol;
- BPF subsystem;
- Perf events;
- Arbitrary resource management;
- Timer substystem drivers;
- Tracing infrastructure;
- Closures library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Ethernet bridge;
- CAN network layer;
- Networking core;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Netfilter;
- Netlink;
- SCTP protocol;
- TIPC protocol;
- Wireless networking;
- XFRM subsystem;
- Key management;
- FireWire sound drivers;
- AudioScience HPI driver;
- Amlogic Meson SoC drivers;
- KVM core;
(CVE-2024-53063, CVE-2024-50236, CVE-2024-47699, CVE-2024-50044,
CVE-2024-49877, CVE-2024-47692, CVE-2024-50116, CVE-2024-47679,
CVE-2024-50134, CVE-2024-50045, CVE-2024-50301, CVE-2024-40965,
CVE-2024-47684, CVE-2024-49944, CVE-2024-43863, CVE-2024-50059,
CVE-2024-50007, CVE-2024-49973, CVE-2024-50251, CVE-2024-47674,
CVE-2024-49982, CVE-2024-50143, CVE-2024-49883, CVE-2024-49851,
CVE-2024-44931, CVE-2024-49949, CVE-2024-47747, CVE-2024-46853,
CVE-2024-50233, CVE-2024-49924, CVE-2024-50033, CVE-2024-50024,
CVE-2024-49995, CVE-2024-47737, CVE-2024-50194, CVE-2024-47712,
CVE-2024-50273, CVE-2024-50229, CVE-2024-49896, CVE-2024-50199,
CVE-2024-50202, CVE-2024-49868, CVE-2024-50035, CVE-2024-50184,
CVE-2024-49882, CVE-2024-49962, CVE-2024-50299, CVE-2024-35887,
CVE-2024-50287, CVE-2024-50265, CVE-2024-50148, CVE-2024-47757,
CVE-2024-47742, CVE-2024-49902, CVE-2024-50302, CVE-2024-50096,
CVE-2024-49952, CVE-2024-50099, CVE-2024-49963, CVE-2024-49900,
CVE-2024-46731, CVE-2024-50131, CVE-2024-47723, CVE-2024-50237,
CVE-2024-50269, CVE-2024-50142, CVE-2024-49867, CVE-2024-49985,
CVE-2024-47670, CVE-2024-50008, CVE-2024-49938, CVE-2024-49878,
CVE-2024-49955, CVE-2024-53104, CVE-2024-49894, CVE-2024-50039,
CVE-2024-50279, CVE-2024-50006, CVE-2024-40953, CVE-2024-50180,
CVE-2024-49860, CVE-2024-50117, CVE-2024-47701, CVE-2024-47698,
CVE-2024-50171, CVE-2024-50151, CVE-2024-50082, CVE-2024-50290,
CVE-2024-49975, CVE-2024-49903, CVE-2024-38544, CVE-2024-50218,
CVE-2024-49948, CVE-2024-50282, CVE-2024-49965, CVE-2024-49959,
CVE-2024-42252, CVE-2024-47749, CVE-2024-47756, CVE-2024-47672,
CVE-2024-50127, CVE-2024-46854, CVE-2024-50230, CVE-2024-41066,
CVE-2024-49957, CVE-2024-47713, CVE-2023-52458, CVE-2024-50167,
CVE-2024-49997, CVE-2024-47685, CVE-2024-49879, CVE-2024-53059,
CVE-2024-53101, CVE-2024-49958, CVE-2024-47710, CVE-2024-47706,
CVE-2024-50074, CVE-2024-50296, CVE-2024-49892, CVE-2024-46849,
CVE-2024-50205, CVE-2024-50168, CVE-2024-50267, CVE-2024-50262,
CVE-2024-47709, CVE-2024-50195, CVE-2024-35896, CVE-2024-47696,
CVE-2024-47740, CVE-2024-40911, CVE-2024-49966, CVE-2021-47469,
CVE-2024-49981, CVE-2024-50234, CVE-2024-50179, CVE-2024-47697,
CVE-2024-50150, CVE-2023-52917, CVE-2024-50040, CVE-2024-53061,
CVE-2024-50278, CVE-2024-47671, CVE-2024-53066, CVE-2024-41016)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.4.0-1138-oracle 5.4.0-1138.147
linux-image-5.4.0-1140-aws 5.4.0-1140.150
linux-image-aws-lts-20.04 5.4.0.1140.137
linux-image-oracle-lts-20.04 5.4.0.1138.131

Ubuntu 18.04 LTS
linux-image-5.4.0-1138-oracle 5.4.0-1138.147~18.04.1
Available with Ubuntu Pro
linux-image-oracle 5.4.0.1138.147~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7294-2
https://ubuntu.com/security/notices/USN-7294-1
CVE-2021-47469, CVE-2023-52458, CVE-2023-52917, CVE-2024-35887,
CVE-2024-35896, CVE-2024-38544, CVE-2024-40911, CVE-2024-40953,
CVE-2024-40965, CVE-2024-41016, CVE-2024-41066, CVE-2024-42252,
CVE-2024-43863, CVE-2024-44931, CVE-2024-46731, CVE-2024-46849,
CVE-2024-46853, CVE-2024-46854, CVE-2024-47670, CVE-2024-47671,
CVE-2024-47672, CVE-2024-47674, CVE-2024-47679, CVE-2024-47684,
CVE-2024-47685, CVE-2024-47692, CVE-2024-47696, CVE-2024-47697,
CVE-2024-47698, CVE-2024-47699, CVE-2024-47701, CVE-2024-47706,
CVE-2024-47709, CVE-2024-47710, CVE-2024-47712, CVE-2024-47713,
CVE-2024-47723, CVE-2024-47737, CVE-2024-47740, CVE-2024-47742,
CVE-2024-47747, CVE-2024-47749, CVE-2024-47756, CVE-2024-47757,
CVE-2024-49851, CVE-2024-49860, CVE-2024-49867, CVE-2024-49868,
CVE-2024-49877, CVE-2024-49878, CVE-2024-49879, CVE-2024-49882,
CVE-2024-49883, CVE-2024-49892, CVE-2024-49894, CVE-2024-49896,
CVE-2024-49900, CVE-2024-49902, CVE-2024-49903, CVE-2024-49924,
CVE-2024-49938, CVE-2024-49944, CVE-2024-49948, CVE-2024-49949,
CVE-2024-49952, CVE-2024-49955, CVE-2024-49957, CVE-2024-49958,
CVE-2024-49959, CVE-2024-49962, CVE-2024-49963, CVE-2024-49965,
CVE-2024-49966, CVE-2024-49973, CVE-2024-49975, CVE-2024-49981,
CVE-2024-49982, CVE-2024-49985, CVE-2024-49995, CVE-2024-49997,
CVE-2024-50006, CVE-2024-50007, CVE-2024-50008, CVE-2024-50024,
CVE-2024-50033, CVE-2024-50035, CVE-2024-50039, CVE-2024-50040,
CVE-2024-50044, CVE-2024-50045, CVE-2024-50059, CVE-2024-50074,
CVE-2024-50082, CVE-2024-50096, CVE-2024-50099, CVE-2024-50116,
CVE-2024-50117, CVE-2024-50127, CVE-2024-50131, CVE-2024-50134,
CVE-2024-50142, CVE-2024-50143, CVE-2024-50148, CVE-2024-50150,
CVE-2024-50151, CVE-2024-50167, CVE-2024-50168, CVE-2024-50171,
CVE-2024-50179, CVE-2024-50180, CVE-2024-50184, CVE-2024-50194,
CVE-2024-50195, CVE-2024-50199, CVE-2024-50202, CVE-2024-50205,
CVE-2024-50218, CVE-2024-50229, CVE-2024-50230, CVE-2024-50233,
CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50251,
CVE-2024-50262, CVE-2024-50265, CVE-2024-50267, CVE-2024-50269,
CVE-2024-50273, CVE-2024-50278, CVE-2024-50279, CVE-2024-50282,
CVE-2024-50287, CVE-2024-50290, CVE-2024-50296, CVE-2024-50299,
CVE-2024-50301, CVE-2024-50302, CVE-2024-53059, CVE-2024-53061,
CVE-2024-53063, CVE-2024-53066, CVE-2024-53101, CVE-2024-53104

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1140.150
https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1138.147

[USN-7308-1] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7308-1
February 27, 2025

linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- x86 architecture;
- Block layer subsystem;
- ACPI drivers;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- STMicroelectronics network drivers;
- Parport drivers;
- Pin controllers subsystem;
- Direct Digital Synthesis drivers;
- TCM subsystem;
- TTY drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- BTRFS file system;
- File systems infrastructure;
- Network file system (NFS) client;
- NILFS2 file system;
- NTFS3 file system;
- SMB network file system;
- User-space API (UAPI);
- io_uring subsystem;
- BPF subsystem;
- Timer substystem drivers;
- Tracing infrastructure;
- Closures library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- VMware vSockets driver;
- XFRM subsystem;
- Key management;
- FireWire sound drivers;
- HD-audio driver;
- QCOM ASoC drivers;
- STMicroelectronics SoC drivers;
- KVM core;
(CVE-2024-50141, CVE-2024-53101, CVE-2024-50301, CVE-2024-50082,
CVE-2024-39497, CVE-2024-50245, CVE-2024-50302, CVE-2024-35887,
CVE-2024-50205, CVE-2024-50153, CVE-2024-50154, CVE-2024-50279,
CVE-2024-50074, CVE-2024-50168, CVE-2024-50128, CVE-2024-53141,
CVE-2024-50290, CVE-2024-50292, CVE-2024-50218, CVE-2024-50193,
CVE-2024-50209, CVE-2024-53088, CVE-2024-50058, CVE-2024-50116,
CVE-2024-50199, CVE-2024-50083, CVE-2024-50265, CVE-2024-53058,
CVE-2024-50244, CVE-2024-50195, CVE-2024-41066, CVE-2024-50151,
CVE-2024-50229, CVE-2024-42291, CVE-2024-40965, CVE-2024-50160,
CVE-2024-53097, CVE-2024-50134, CVE-2024-53164, CVE-2024-50295,
CVE-2024-50267, CVE-2024-50251, CVE-2024-50198, CVE-2024-53042,
CVE-2024-40953, CVE-2024-50167, CVE-2024-50010, CVE-2024-42252,
CVE-2024-53055, CVE-2024-50259, CVE-2024-50110, CVE-2024-50208,
CVE-2024-50249, CVE-2024-50148, CVE-2024-50269, CVE-2024-50182,
CVE-2024-50115, CVE-2024-50287, CVE-2024-50142, CVE-2024-53103,
CVE-2024-50099, CVE-2024-50234, CVE-2024-50282, CVE-2024-50185,
CVE-2024-50247, CVE-2024-50257, CVE-2024-50036, CVE-2024-50268,
CVE-2024-50127, CVE-2024-50230, CVE-2024-50278, CVE-2024-50273,
CVE-2024-26718, CVE-2024-50086, CVE-2024-50262, CVE-2024-50236,
CVE-2024-50117, CVE-2024-50237, CVE-2024-53104, CVE-2024-50194,
CVE-2024-50192, CVE-2024-53061, CVE-2024-53052, CVE-2024-50202,
CVE-2024-41080, CVE-2024-50143, CVE-2023-52913, CVE-2024-50296,
CVE-2024-50085, CVE-2024-50196, CVE-2024-50072, CVE-2024-50171,
CVE-2024-50103, CVE-2024-50101, CVE-2024-50156, CVE-2024-50201,
CVE-2024-50233, CVE-2024-53059, CVE-2024-53066, CVE-2024-53063,
CVE-2024-50150, CVE-2024-50131, CVE-2024-50163, CVE-2024-50162,
CVE-2024-50299, CVE-2024-50232)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1078-aws 5.15.0-1078.85
linux-image-aws-lts-22.04 5.15.0.1078.80

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7308-1
CVE-2023-52913, CVE-2024-26718, CVE-2024-35887, CVE-2024-39497,
CVE-2024-40953, CVE-2024-40965, CVE-2024-41066, CVE-2024-41080,
CVE-2024-42252, CVE-2024-42291, CVE-2024-50010, CVE-2024-50036,
CVE-2024-50058, CVE-2024-50072, CVE-2024-50074, CVE-2024-50082,
CVE-2024-50083, CVE-2024-50085, CVE-2024-50086, CVE-2024-50099,
CVE-2024-50101, CVE-2024-50103, CVE-2024-50110, CVE-2024-50115,
CVE-2024-50116, CVE-2024-50117, CVE-2024-50127, CVE-2024-50128,
CVE-2024-50131, CVE-2024-50134, CVE-2024-50141, CVE-2024-50142,
CVE-2024-50143, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151,
CVE-2024-50153, CVE-2024-50154, CVE-2024-50156, CVE-2024-50160,
CVE-2024-50162, CVE-2024-50163, CVE-2024-50167, CVE-2024-50168,
CVE-2024-50171, CVE-2024-50182, CVE-2024-50185, CVE-2024-50192,
CVE-2024-50193, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196,
CVE-2024-50198, CVE-2024-50199, CVE-2024-50201, CVE-2024-50202,
CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50218,
CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233,
CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50244,
CVE-2024-50245, CVE-2024-50247, CVE-2024-50249, CVE-2024-50251,
CVE-2024-50257, CVE-2024-50259, CVE-2024-50262, CVE-2024-50265,
CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50273,
CVE-2024-50278, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287,
CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296,
CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042,
CVE-2024-53052, CVE-2024-53055, CVE-2024-53058, CVE-2024-53059,
CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53088,
CVE-2024-53097, CVE-2024-53101, CVE-2024-53103, CVE-2024-53104,
CVE-2024-53141, CVE-2024-53164

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/5.15.0-1078.85

[USN-7289-4] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7289-4
February 27, 2025

linux-intel-iotg, linux-intel-iotg-5.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-iotg: Linux kernel for Intel IoT platforms
- linux-intel-iotg-5.15: Linux kernel for Intel IoT platforms

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- x86 architecture;
- Block layer subsystem;
- ACPI drivers;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Multiple devices driver;
- Media drivers;
- Network drivers;
- STMicroelectronics network drivers;
- Parport drivers;
- Pin controllers subsystem;
- Direct Digital Synthesis drivers;
- TCM subsystem;
- TTY drivers;
- USB Dual Role (OTG-ready) Controller drivers;
- USB Serial drivers;
- USB Type-C support driver;
- USB Type-C Connector System Software Interface driver;
- BTRFS file system;
- File systems infrastructure;
- Network file system (NFS) client;
- NILFS2 file system;
- NTFS3 file system;
- SMB network file system;
- User-space API (UAPI);
- io_uring subsystem;
- BPF subsystem;
- Timer substystem drivers;
- Tracing infrastructure;
- Closures library;
- Memory management;
- Amateur Radio drivers;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- Network traffic control;
- SCTP protocol;
- XFRM subsystem;
- Key management;
- FireWire sound drivers;
- HD-audio driver;
- QCOM ASoC drivers;
- STMicroelectronics SoC drivers;
- KVM core;
(CVE-2024-50082, CVE-2024-50134, CVE-2024-50142, CVE-2023-52913,
CVE-2024-50205, CVE-2024-50127, CVE-2024-50208, CVE-2024-50143,
CVE-2024-50163, CVE-2024-53059, CVE-2024-50282, CVE-2024-50279,
CVE-2024-50296, CVE-2024-50295, CVE-2024-50010, CVE-2024-53088,
CVE-2024-50128, CVE-2024-50290, CVE-2024-50099, CVE-2024-50234,
CVE-2024-50154, CVE-2024-53052, CVE-2024-50116, CVE-2024-50168,
CVE-2024-50086, CVE-2024-50267, CVE-2024-50156, CVE-2024-50110,
CVE-2024-50103, CVE-2024-50192, CVE-2024-40953, CVE-2024-50085,
CVE-2024-50247, CVE-2024-50257, CVE-2024-50237, CVE-2024-50185,
CVE-2024-50198, CVE-2024-50229, CVE-2024-50171, CVE-2024-50259,
CVE-2024-50209, CVE-2024-50233, CVE-2024-35887, CVE-2024-50251,
CVE-2024-50141, CVE-2024-53061, CVE-2024-50232, CVE-2024-50167,
CVE-2024-50201, CVE-2024-50193, CVE-2024-50269, CVE-2024-39497,
CVE-2024-50036, CVE-2024-50299, CVE-2024-50072, CVE-2024-53101,
CVE-2024-50262, CVE-2024-50194, CVE-2024-50202, CVE-2024-50101,
CVE-2024-50151, CVE-2024-41080, CVE-2024-42291, CVE-2024-50245,
CVE-2024-50278, CVE-2024-50195, CVE-2024-50265, CVE-2024-50074,
CVE-2024-53063, CVE-2024-50131, CVE-2024-53058, CVE-2024-50160,
CVE-2024-50287, CVE-2024-40965, CVE-2024-50273, CVE-2024-50268,
CVE-2024-50302, CVE-2024-50218, CVE-2024-50199, CVE-2024-50196,
CVE-2024-50083, CVE-2024-50244, CVE-2024-50117, CVE-2024-50058,
CVE-2024-53055, CVE-2024-50182, CVE-2024-53097, CVE-2024-50236,
CVE-2024-50162, CVE-2024-50301, CVE-2024-50249, CVE-2024-50292,
CVE-2024-50150, CVE-2024-50153, CVE-2024-50115, CVE-2024-26718,
CVE-2024-53104, CVE-2024-42252, CVE-2024-53066, CVE-2024-50148,
CVE-2024-53042, CVE-2024-50230, CVE-2024-41066)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1073-intel-iotg 5.15.0-1073.79
linux-image-intel-iotg 5.15.0.1073.73

Ubuntu 20.04 LTS
linux-image-5.15.0-1073-intel-iotg 5.15.0-1073.79~20.04.2
linux-image-intel 5.15.0.1073.79~20.04.2
linux-image-intel-iotg 5.15.0.1073.79~20.04.2

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7289-4
https://ubuntu.com/security/notices/USN-7289-3
https://ubuntu.com/security/notices/USN-7289-2
https://ubuntu.com/security/notices/USN-7289-1
CVE-2023-52913, CVE-2024-26718, CVE-2024-35887, CVE-2024-39497,
CVE-2024-40953, CVE-2024-40965, CVE-2024-41066, CVE-2024-41080,
CVE-2024-42252, CVE-2024-42291, CVE-2024-50010, CVE-2024-50036,
CVE-2024-50058, CVE-2024-50072, CVE-2024-50074, CVE-2024-50082,
CVE-2024-50083, CVE-2024-50085, CVE-2024-50086, CVE-2024-50099,
CVE-2024-50101, CVE-2024-50103, CVE-2024-50110, CVE-2024-50115,
CVE-2024-50116, CVE-2024-50117, CVE-2024-50127, CVE-2024-50128,
CVE-2024-50131, CVE-2024-50134, CVE-2024-50141, CVE-2024-50142,
CVE-2024-50143, CVE-2024-50148, CVE-2024-50150, CVE-2024-50151,
CVE-2024-50153, CVE-2024-50154, CVE-2024-50156, CVE-2024-50160,
CVE-2024-50162, CVE-2024-50163, CVE-2024-50167, CVE-2024-50168,
CVE-2024-50171, CVE-2024-50182, CVE-2024-50185, CVE-2024-50192,
CVE-2024-50193, CVE-2024-50194, CVE-2024-50195, CVE-2024-50196,
CVE-2024-50198, CVE-2024-50199, CVE-2024-50201, CVE-2024-50202,
CVE-2024-50205, CVE-2024-50208, CVE-2024-50209, CVE-2024-50218,
CVE-2024-50229, CVE-2024-50230, CVE-2024-50232, CVE-2024-50233,
CVE-2024-50234, CVE-2024-50236, CVE-2024-50237, CVE-2024-50244,
CVE-2024-50245, CVE-2024-50247, CVE-2024-50249, CVE-2024-50251,
CVE-2024-50257, CVE-2024-50259, CVE-2024-50262, CVE-2024-50265,
CVE-2024-50267, CVE-2024-50268, CVE-2024-50269, CVE-2024-50273,
CVE-2024-50278, CVE-2024-50279, CVE-2024-50282, CVE-2024-50287,
CVE-2024-50290, CVE-2024-50292, CVE-2024-50295, CVE-2024-50296,
CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042,
CVE-2024-53052, CVE-2024-53055, CVE-2024-53058, CVE-2024-53059,
CVE-2024-53061, CVE-2024-53063, CVE-2024-53066, CVE-2024-53088,
CVE-2024-53097, CVE-2024-53101, CVE-2024-53104

Package Information:
https://launchpad.net/ubuntu/+source/linux-intel-iotg/5.15.0-1073.79
https://launchpad.net/ubuntu/+source/linux-intel-iotg-5.15/5.15.0-1073.79~20.04.2