USN-7288-2

Source
https://ubuntu.com/security/notices/USN-7288-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7288-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7288-2
Related
Published
2025-02-25T11:30:39.754964Z
Modified
2025-02-25T11:30:39.754964Z
Summary
linux-lowlatency-hwe-5.15 vulnerabilities
Details

Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - x86 architecture; - Block layer subsystem; - ACPI drivers; - GPU drivers; - HID subsystem; - I2C subsystem; - IIO ADC drivers; - IIO subsystem; - InfiniBand drivers; - IOMMU subsystem; - IRQ chip drivers; - Multiple devices driver; - Media drivers; - Network drivers; - STMicroelectronics network drivers; - Parport drivers; - Pin controllers subsystem; - Direct Digital Synthesis drivers; - TCM subsystem; - TTY drivers; - USB Dual Role (OTG-ready) Controller drivers; - USB Serial drivers; - USB Type-C support driver; - USB Type-C Connector System Software Interface driver; - BTRFS file system; - File systems infrastructure; - Network file system (NFS) client; - NILFS2 file system; - NTFS3 file system; - SMB network file system; - User-space API (UAPI); - io_uring subsystem; - BPF subsystem; - Timer substystem drivers; - Tracing infrastructure; - Closures library; - Memory management; - Amateur Radio drivers; - Bluetooth subsystem; - Networking core; - IPv4 networking; - MAC80211 subsystem; - Multipath TCP; - Netfilter; - Network traffic control; - SCTP protocol; - XFRM subsystem; - Key management; - FireWire sound drivers; - HD-audio driver; - QCOM ASoC drivers; - STMicroelectronics SoC drivers; - KVM core; (CVE-2024-50151, CVE-2024-50195, CVE-2024-50117, CVE-2024-53104, CVE-2024-50171, CVE-2024-53059, CVE-2024-50160, CVE-2024-50163, CVE-2024-50103, CVE-2024-50245, CVE-2024-50282, CVE-2024-50233, CVE-2024-50218, CVE-2024-50201, CVE-2024-53058, CVE-2024-50115, CVE-2024-53101, CVE-2024-50268, CVE-2024-50127, CVE-2024-50182, CVE-2024-50148, CVE-2024-50295, CVE-2024-53061, CVE-2024-50232, CVE-2024-50010, CVE-2024-50273, CVE-2024-50267, CVE-2024-50198, CVE-2024-53097, CVE-2024-50150, CVE-2024-50278, CVE-2024-50301, CVE-2024-50290, CVE-2024-50185, CVE-2024-50036, CVE-2024-50296, CVE-2024-50082, CVE-2024-50058, CVE-2024-53063, CVE-2024-50192, CVE-2024-50208, CVE-2024-53052, CVE-2024-50162, CVE-2024-50247, CVE-2024-50302, CVE-2024-50153, CVE-2024-50143, CVE-2024-41080, CVE-2024-50287, CVE-2024-39497, CVE-2024-50156, CVE-2024-42252, CVE-2024-53055, CVE-2024-50265, CVE-2024-50230, CVE-2024-50269, CVE-2024-50167, CVE-2024-50237, CVE-2024-50168, CVE-2023-52913, CVE-2024-35887, CVE-2024-50299, CVE-2024-53088, CVE-2024-50209, CVE-2024-50234, CVE-2024-50131, CVE-2024-50141, CVE-2024-40965, CVE-2024-41066, CVE-2024-50251, CVE-2024-50292, CVE-2024-50194, CVE-2024-50085, CVE-2024-50154, CVE-2024-50202, CVE-2024-50074, CVE-2024-50199, CVE-2024-50110, CVE-2024-26718, CVE-2024-50205, CVE-2024-53042, CVE-2024-50279, CVE-2024-50101, CVE-2024-50116, CVE-2024-50236, CVE-2024-50083, CVE-2024-50262, CVE-2024-40953, CVE-2024-50142, CVE-2024-50128, CVE-2024-50099, CVE-2024-50086, CVE-2024-42291, CVE-2024-50257, CVE-2024-50229, CVE-2024-50134, CVE-2024-50244, CVE-2024-50249, CVE-2024-50193, CVE-2024-50072, CVE-2024-50259, CVE-2024-50196, CVE-2024-53066)

References

Affected packages

Ubuntu:20.04:LTS / linux-lowlatency-hwe-5.15

Package

Name
linux-lowlatency-hwe-5.15
Purl
pkg:deb/ubuntu/linux-lowlatency-hwe-5.15@5.15.0-133.143~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-133.143~20.04.1

Affected versions

5.*

5.15.0-33.34~20.04.1
5.15.0-42.45~20.04.1
5.15.0-43.46~20.04.1
5.15.0-46.49~20.04.1
5.15.0-48.54~20.04.1
5.15.0-50.56~20.04.1
5.15.0-52.58~20.04.1
5.15.0-53.59~20.04.1
5.15.0-56.62~20.04.1
5.15.0-58.64~20.04.1
5.15.0-60.66~20.04.1
5.15.0-67.74~20.04.1
5.15.0-69.76~20.04.1
5.15.0-70.77~20.04.1
5.15.0-71.78~20.04.1
5.15.0-72.79~20.04.1
5.15.0-73.80~20.04.1
5.15.0-75.82~20.04.1
5.15.0-76.83~20.04.1
5.15.0-78.85~20.04.1
5.15.0-79.88~20.04.1
5.15.0-82.91~20.04.1
5.15.0-83.92~20.04.1
5.15.0-84.93~20.04.1
5.15.0-86.95~20.04.1
5.15.0-87.96~20.04.1
5.15.0-88.98~20.04.1
5.15.0-89.99~20.04.1
5.15.0-91.101~20.04.1
5.15.0-92.102~20.04.1
5.15.0-94.104~20.04.1
5.15.0-97.107~20.04.1
5.15.0-100.110~20.04.1
5.15.0-101.111~20.04.1
5.15.0-102.112~20.04.1
5.15.0-105.115~20.04.1
5.15.0-106.116~20.04.1
5.15.0-107.117~20.04.1
5.15.0-110.120~20.04.1
5.15.0-113.123~20.04.1
5.15.0-116.126~20.04.1
5.15.0-117.127~20.04.1
5.15.0-118.128~20.04.1
5.15.0-119.129~20.04.1
5.15.0-121.131~20.04.1
5.15.0-122.132~20.04.1
5.15.0-124.134~20.04.1
5.15.0-125.135~20.04.1
5.15.0-126.136~20.04.1
5.15.0-127.137~20.04.1
5.15.0-128.138~20.04.1
5.15.0-129.139~20.04.1
5.15.0-131.141~20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-133-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-headers-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-headers-5.15.0-133-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-133-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-133-lowlatency-64k-dbgsym"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-133-lowlatency-dbgsym"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-133"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-133"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-133"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-modules-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-modules-5.15.0-133-lowlatency-64k"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-tools-5.15.0-133-lowlatency"
        },
        {
            "binary_version": "5.15.0-133.143~20.04.1",
            "binary_name": "linux-tools-5.15.0-133-lowlatency-64k"
        }
    ]
}