USN-7332-2

Source
https://ubuntu.com/security/notices/USN-7332-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7332-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7332-2
Related
Published
2025-03-11T16:46:14.513759Z
Modified
2025-03-11T16:46:14.513759Z
Summary
linux-kvm vulnerabilities
Details

Attila Szász discovered that the HFS+ file system implementation in the Linux Kernel contained a heap overflow vulnerability. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2025-0927)

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - PowerPC architecture; - Block layer subsystem; - GPIO subsystem; - GPU drivers; - Media drivers; - Network drivers; - SCSI subsystem; - Direct Digital Synthesis drivers; - TTY drivers; - 9P distributed file system; - JFS file system; - NILFS2 file system; - File systems infrastructure; - BPF subsystem; - Netfilter; - Network sockets; - Memory management; - Amateur Radio drivers; - B.A.T.M.A.N. meshing protocol; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - IPv6 networking; - Netlink; - TIPC protocol; - Wireless networking; - ALSA framework; (CVE-2024-26685, CVE-2024-50233, CVE-2024-41063, CVE-2024-42070, CVE-2024-40910, CVE-2024-40911, CVE-2024-36886, CVE-2024-35896, CVE-2024-43863, CVE-2023-52522, CVE-2024-53156, CVE-2023-52488, CVE-2024-43854, CVE-2024-44938, CVE-2024-53104, CVE-2024-44931, CVE-2024-50171, CVE-2024-43892, CVE-2024-50148, CVE-2024-38567, CVE-2024-36964, CVE-2024-43893, CVE-2024-36952, CVE-2022-48994, CVE-2021-47606, CVE-2023-52818, CVE-2024-41064, CVE-2024-40981, CVE-2024-40943, CVE-2024-42068, CVE-2023-52880, CVE-2021-47103, CVE-2024-43900, CVE-2024-50117, CVE-2023-52799, CVE-2024-49902)

References

Affected packages

Ubuntu:Pro:16.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@4.4.0-1142.153?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1142.153

Affected versions

4.*

4.4.0-1004.9
4.4.0-1007.12
4.4.0-1008.13
4.4.0-1009.14
4.4.0-1010.15
4.4.0-1012.17
4.4.0-1013.18
4.4.0-1015.20
4.4.0-1017.22
4.4.0-1019.24
4.4.0-1020.25
4.4.0-1021.26
4.4.0-1023.28
4.4.0-1026.31
4.4.0-1027.32
4.4.0-1029.34
4.4.0-1031.37
4.4.0-1032.38
4.4.0-1033.39
4.4.0-1035.41
4.4.0-1036.42
4.4.0-1037.43
4.4.0-1038.44
4.4.0-1039.45
4.4.0-1040.46
4.4.0-1041.47
4.4.0-1043.49
4.4.0-1044.50
4.4.0-1046.52
4.4.0-1047.53
4.4.0-1048.55
4.4.0-1051.58
4.4.0-1052.59
4.4.0-1054.61
4.4.0-1056.63
4.4.0-1058.65
4.4.0-1059.66
4.4.0-1060.67
4.4.0-1062.69
4.4.0-1063.70
4.4.0-1064.71
4.4.0-1065.72
4.4.0-1066.73
4.4.0-1068.75
4.4.0-1069.76
4.4.0-1070.77
4.4.0-1071.78
4.4.0-1075.82
4.4.0-1076.83
4.4.0-1077.84
4.4.0-1078.85
4.4.0-1079.86
4.4.0-1080.87
4.4.0-1082.91
4.4.0-1084.93
4.4.0-1085.94
4.4.0-1087.96
4.4.0-1088.97
4.4.0-1089.98
4.4.0-1090.99
4.4.0-1091.100
4.4.0-1092.101
4.4.0-1093.102
4.4.0-1094.103
4.4.0-1095.104
4.4.0-1096.105
4.4.0-1097.106
4.4.0-1098.107
4.4.0-1099.108
4.4.0-1100.109
4.4.0-1102.111
4.4.0-1103.112
4.4.0-1104.113
4.4.0-1105.114
4.4.0-1108.118
4.4.0-1110.120
4.4.0-1111.121
4.4.0-1112.122
4.4.0-1113.123
4.4.0-1114.124
4.4.0-1115.125
4.4.0-1116.126
4.4.0-1117.127
4.4.0-1118.128
4.4.0-1119.129
4.4.0-1120.130
4.4.0-1121.131
4.4.0-1122.132
4.4.0-1123.133
4.4.0-1124.134
4.4.0-1125.135
4.4.0-1126.136
4.4.0-1128.138
4.4.0-1129.139
4.4.0-1130.140
4.4.0-1131.141
4.4.0-1132.142
4.4.0-1134.144
4.4.0-1135.145
4.4.0-1136.146
4.4.0-1137.147
4.4.0-1138.148
4.4.0-1139.149
4.4.0-1140.151
4.4.0-1141.152

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-buildinfo-4.4.0-1142-kvm"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-cloud-tools-4.4.0-1142-kvm"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-headers-4.4.0-1142-kvm"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-image-4.4.0-1142-kvm"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-image-4.4.0-1142-kvm-dbgsym"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1142"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-kvm-headers-4.4.0-1142"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-kvm-tools-4.4.0-1142"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-modules-4.4.0-1142-kvm"
        },
        {
            "binary_version": "4.4.0-1142.153",
            "binary_name": "linux-tools-4.4.0-1142-kvm"
        }
    ]
}