Wednesday, March 4, 2026

[LSN-0118-1] Linux kernel vulnerability

Linux kernel vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary

Several security issues were fixed in the kernel.

Software Description

- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems

Details

In the Linux kernel, the following vulnerability has been resolved: smb:
client: fix UAF in async decryption Doing an async decryption (large
read) crashes with a slab-use-after-free way down in the crypto API.
(CVE-2024-50047)

In the Linux kernel, the following vulnerability has been resolved:
padata: avoid UAF for reorder_work Although the previous patch can avoid
ps and ps UAF for _do_serial, it can not avoid potential UAF issue for
reorder_work. (CVE-2025-21726)

In the Linux kernel, the following vulnerability has been resolved:
exfat: fix random stack corruption after get_block When get_block is
called with a buffer_head allocated on the stack, such as
do_mpage_readpage, stack corruption due to buffer_head UAF may occur in
the following race condition situation. (CVE-2025-22036)

In the Linux kernel, the following vulnerability has been resolved: smb:
client: fix use-after-free in crypt_message when using async crypto The
CVE-2024-50047 fix removed asynchronous crypto handling from
crypt_message(), assuming all crypto operations are synchronous.
(CVE-2025-38488)

In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix Preauh_HashValue race condition If client send multiple
session setup requests to ksmbd, Preauh_HashValue race condition could
happen. (CVE-2025-38561)

In the Linux kernel, the following vulnerability has been resolved:
io_uring/futex: ensure io_futex_wait() cleans up properly on failure The
io_futex_data is allocated upfront and assigned to the io_kiocb
async_data field, but the request isn't marked with REQ_F_ASYNC_DATA at
that point. (CVE-2025-39698)

In the Linux kernel, the following vulnerability has been resolved:
af_unix: Initialise scc_index in unix_add_edge(). (CVE-2025-40214)

Update instructions

The problem can be corrected by updating your kernel livepatch to the
following versions:

Ubuntu 20.04 LTS
aws - 118.1
aws - 118.2
azure - 118.1
gcp - 118.1
generic - 118.1
generic - 118.2
ibm - 118.1
lowlatency - 118.1
lowlatency - 118.2
oracle - 118.1

Ubuntu 18.04 LTS
generic - 118.1
generic - 118.2
lowlatency - 118.1
lowlatency - 118.2

Ubuntu 24.04 LTS
aws - 118.1
azure - 118.1
gcp - 118.1
generic - 118.1
ibm - 118.1
oracle - 118.1

Ubuntu 22.04 LTS
aws - 118.1
aws - 118.2
azure - 118.1
gcp - 118.1
gcp - 118.2
generic - 118.1
gke - 118.1
gke - 118.2
ibm - 118.1
ibm - 118.2
oracle - 118.1

Support Information

Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.

Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel's non-LTS distro release version, whichever is sooner.

References

- CVE-2024-50047
- CVE-2025-21726
- CVE-2025-22036
- CVE-2025-38488
- CVE-2025-38561
- CVE-2025-39698
- CVE-2025-40214

No comments:

Post a Comment