Wednesday, October 8, 2025

[LSN-0115-1] Linux kernel vulnerability

Linux kernel vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software Description

- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems

Details

In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fixed overflow check in mi_enum_attr(). (CVE-2024-27407)

In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot
reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on
the four reserved tcp bits (th->res1) Use skb_put_zero() to clear the
whole TCP header, as done in nf_reject_ip_tcphdr_put() BUG: KMSAN:
uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0
net/ipv6/netfilter/nf_reject_ipv6.c:255
nf_reject_ip6_tcphdr_put+0x688/0x6c0
net/ipv6/netfilter/nf_reject_ipv6.c:255 nf_send_reset6+0xd84/0x15b0
net/ipv6/netfilter/nf_reject_ipv6.c:344 nft_reject_inet_eval+0x3c1/0x880
net/netfilter/nft_reject_inet.c:48 expr_call_ops_eval
net/netfilter/nf_tables_core.c:240 . (CVE-2024-47685)

In the Linux kernel, the following vulnerability has been resolved: smb:
client: fix UAF in async decryption Doing an async decryption (large
read) crashes with a slab-use-after-free way down in the crypto API.
(CVE-2024-50047)

In the Linux kernel, the following vulnerability has been resolved: ovl:
fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up The
issue was caused by dput(upper) being called before
ovl_dentry_update_reval(), while upper->d_flags was still accessed in
ovl_dentry_remote(). (CVE-2025-21887)

In the Linux kernel, the following vulnerability has been resolved:
RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the
erdma_cep_put(new_cep) being called, new_cep will be freed, and the
following dereference will cause a UAF problem. (CVE-2025-22088)

Update instructions

The problem can be corrected by updating your kernel livepatch to the
following versions:

Ubuntu 20.04 LTS
aws - 115.1
azure - 115.1
gcp - 115.1
generic - 115.1
ibm - 115.1
lowlatency - 115.1
oracle - 115.1

Ubuntu 18.04 LTS
aws - 115.1
azure - 115.1
gcp - 115.1
generic - 115.1
lowlatency - 115.1
oracle - 115.1

Ubuntu 24.04 LTS
aws - 115.1
azure - 115.1
gcp - 115.1
generic - 115.1
ibm - 115.1
oracle - 115.1

Ubuntu 16.04 LTS
aws - 115.1
azure - 115.1
gcp - 115.1
generic - 115.1
lowlatency - 115.1

Ubuntu 22.04 LTS
aws - 115.1
azure - 115.1
gcp - 115.1
generic - 115.1
gke - 115.1
ibm - 115.1
oracle - 115.1

Ubuntu 14.04 LTS
generic - 115.1
lowlatency - 115.1

Support Information

Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.

Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel's non-LTS distro release version, whichever is sooner.

References

- CVE-2024-27407
- CVE-2024-47685
- CVE-2024-50047
- CVE-2025-21887
- CVE-2025-22088

No comments:

Post a Comment