ubuntu jammy v1.829
Metadata:
BOSH Agent Version: 2.745.0
Kernel Version: 5.15.0.140.135
USNs:
Title: USN-7510-1 -- Linux kernel vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7510-1
Priorities: medium, low
Description:
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM64 architecture; - PowerPC architecture; - x86 architecture; - Block layer subsystem; - Network block device driver; - Bus devices; - Character device driver; - TPM device driver; - Clock framework and drivers; - GPIO subsystem; - GPU drivers; - HID subsystem; - I2C subsystem; - InfiniBand drivers; - Media drivers; - NVIDIA Tegra memory controller driver; - Network drivers; - PCI subsystem; - PPS (Pulse Per Second) driver; - PTP clock framework; - RapidIO drivers; - Real Time Clock drivers; - SLIMbus drivers; - QCOM SoC drivers; - Trusted Execution Environment drivers; - TTY drivers; - USB DSL drivers; - USB Device Class drivers; - USB core drivers; - USB Gadget drivers; - USB Host Controller drivers; - Renesas USBHS Controller drivers; - ACRN Hypervisor Service Module driver; - File systems infrastructure; - BTRFS file system; - F2FS file system; - Network file system (NFS) server daemon; - NILFS2 file system; - Overlay file system; - SMB network file system; - UBI file system; - KVM subsystem; - L3 Master device support module; - Process Accounting mechanism; - Padata parallel execution mechanism; - printk logging mechanism; - Scheduler infrastructure; - Timer subsystem; - Tracing infrastructure; - Memory management; - 802.1Q VLAN protocol; - B.A.T.M.A.N. meshing protocol; - Networking core; - IPv4 networking; - IPv6 networking; - Logical Link layer; - Multipath TCP; - Netfilter; - NFC subsystem; - Open vSwitch; - Rose network layer; - Network traffic control; - Wireless networking; - Landlock security; - Linux Security Modules (LSM) Framework; - Tomoyo security module; (CVE-2025-21731, CVE-2025-21926, CVE-2025-21830, CVE-2024-58010, CVE-2025-21745, CVE-2025-21871, CVE-2024-57980, CVE-2025-21916, CVE-2025-21735, CVE-2025-21763, CVE-2025-21799, CVE-2025-21811, CVE-2025-21814, CVE-2024-58083, CVE-2025-21922, CVE-2025-21802, CVE-2024-58034, CVE-2025-21758, CVE-2024-58069, CVE-2025-21905, CVE-2024-57986, CVE-2025-21718, CVE-2024-58020, CVE-2025-21858, CVE-2025-21749, CVE-2025-21928, CVE-2024-58085, CVE-2025-21795, CVE-2025-21744, CVE-2025-21776, CVE-2025-21804, CVE-2024-57973, CVE-2025-21848, CVE-2025-21844, CVE-2024-56721, CVE-2024-58079, CVE-2025-21781, CVE-2025-21866, CVE-2024-58052, CVE-2024-58017, CVE-2024-58071, CVE-2025-21791, CVE-2024-26982, CVE-2025-21787, CVE-2024-58090, CVE-2025-21951, CVE-2025-21846, CVE-2025-21722, CVE-2024-58001, CVE-2025-21715, CVE-2025-21919, CVE-2025-21904, CVE-2024-57977, CVE-2025-21785, CVE-2025-21950, CVE-2025-21924, CVE-2024-57979, CVE-2025-21711, CVE-2024-47726, CVE-2024-58002, CVE-2025-21914, CVE-2024-58086, CVE-2024-58005, CVE-2025-21835, CVE-2024-58051, CVE-2025-21761, CVE-2025-21760, CVE-2025-21767, CVE-2025-21766, CVE-2025-21726, CVE-2025-21865, CVE-2024-58014, CVE-2025-21878, CVE-2025-21934, CVE-2024-58007, CVE-2025-21898, CVE-2025-21806, CVE-2024-58058, CVE-2025-21779, CVE-2024-58063, CVE-2025-21708, CVE-2025-21684, CVE-2024-57834, CVE-2025-21971, CVE-2025-21762, CVE-2025-21728, CVE-2024-58076, CVE-2025-21704, CVE-2025-21719, CVE-2025-21948, CVE-2025-21707, CVE-2025-21917, CVE-2025-21782, CVE-2025-21943, CVE-2025-21765, CVE-2025-21721, CVE-2024-58016, CVE-2025-21859, CVE-2025-21909, CVE-2025-21748, CVE-2025-21912, CVE-2025-21736, CVE-2025-21862, CVE-2024-57978, CVE-2025-21826, CVE-2025-21920, CVE-2025-21772, CVE-2025-21877, CVE-2025-21935, CVE-2024-56599, CVE-2025-21820, CVE-2025-21764, CVE-2025-21796, CVE-2025-21887, CVE-2025-21753, CVE-2025-21910, CVE-2024-57981, CVE-2025-21727, CVE-2025-21875, CVE-2024-58072, CVE-2024-58055, CVE-2025-21925, CVE-2025-21823, CVE-2025-21647) Update Instructions: Run sudo pro fix USN-7510-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: linux-buildinfo-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-cloud-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-gkeop-cloud-tools-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-headers-5.15.0-1066 - 5.15.0-1066.74 linux-gkeop-tools-5.15.0-1066 - 5.15.0-1066.74 linux-headers-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-image-unsigned-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-modules-extra-5.15.0-1066-gkeop - 5.15.0-1066.74 linux-tools-5.15.0-1066-gkeop - 5.15.0-1066.74 No subscription required linux-buildinfo-5.15.0-1076-ibm - 5.15.0-1076.79 linux-headers-5.15.0-1076-ibm - 5.15.0-1076.79 linux-ibm-cloud-tools-common - 5.15.0-1076.79 linux-ibm-headers-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-source-5.15.0 - 5.15.0-1076.79 linux-ibm-tools-5.15.0-1076 - 5.15.0-1076.79 linux-ibm-tools-common - 5.15.0-1076.79 linux-image-5.15.0-1076-ibm - 5.15.0-1076.79 linux-image-unsigned-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-5.15.0-1076-ibm - 5.15.0-1076.79 linux-modules-extra-5.15.0-1076-ibm - 5.15.0-1076.79 linux-tools-5.15.0-1076-ibm - 5.15.0-1076.79 No subscription required linux-buildinfo-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-buildinfo-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-cloud-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-headers-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-image-unsigned-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-modules-extra-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-modules-nvidia-fs-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 linux-nvidia-cloud-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-cloud-tools-common - 5.15.0-1078.79 linux-nvidia-headers-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-5.15.0-1078 - 5.15.0-1078.79 linux-nvidia-tools-common - 5.15.0-1078.79 linux-nvidia-tools-host - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia - 5.15.0-1078.79 linux-tools-5.15.0-1078-nvidia-lowlatency - 5.15.0-1078.79 No subscription required linux-buildinfo-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-cloud-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-headers-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-image-unsigned-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-cloud-tools-common - 5.15.0-1079.85 linux-intel-iotg-headers-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-5.15.0-1079 - 5.15.0-1079.85 linux-intel-iotg-tools-common - 5.15.0-1079.85 linux-intel-iotg-tools-host - 5.15.0-1079.85 linux-modules-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-extra-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-modules-iwlwifi-5.15.0-1079-intel-iotg - 5.15.0-1079.85 linux-tools-5.15.0-1079-intel-iotg - 5.15.0-1079.85 No subscription required linux-buildinfo-5.15.0-1080-kvm - 5.15.0-1080.85 linux-headers-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-5.15.0-1080-kvm - 5.15.0-1080.85 linux-image-unsigned-5.15.0-1080-kvm - 5.15.0-1080.85 linux-kvm-headers-5.15.0-1080 - 5.15.0-1080.85 linux-kvm-tools-5.15.0-1080 - 5.15.0-1080.85 linux-modules-5.15.0-1080-kvm - 5.15.0-1080.85 linux-tools-5.15.0-1080-kvm - 5.15.0-1080.85 No subscription required linux-buildinfo-5.15.0-1081-oracle - 5.15.0-1081.87 linux-headers-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-5.15.0-1081-oracle - 5.15.0-1081.87 linux-image-unsigned-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-5.15.0-1081-oracle - 5.15.0-1081.87 linux-modules-extra-5.15.0-1081-oracle - 5.15.0-1081.87 linux-oracle-headers-5.15.0-1081 - 5.15.0-1081.87 linux-oracle-tools-5.15.0-1081 - 5.15.0-1081.87 linux-tools-5.15.0-1081-oracle - 5.15.0-1081.87 No subscription required linux-buildinfo-5.15.0-140-generic - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-64k - 5.15.0-140.150 linux-buildinfo-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency - 5.15.0-140.150 linux-buildinfo-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-generic - 5.15.0-140.150 linux-cloud-tools-5.15.0-140-lowlatency - 5.15.0-140.150 linux-cloud-tools-common - 5.15.0-140.150 linux-doc - 5.15.0-140.150 linux-headers-5.15.0-140 - 5.15.0-140.150 linux-headers-5.15.0-140-generic - 5.15.0-140.150 linux-headers-5.15.0-140-generic-64k - 5.15.0-140.150 linux-headers-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency - 5.15.0-140.150 linux-headers-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic - 5.15.0-140.150 linux-image-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-generic-64k - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency - 5.15.0-140.150 linux-image-unsigned-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-libc-dev - 5.15.0-140.150 linux-lowlatency-cloud-tools-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-headers-5.15.0-140 - 5.15.0-140.150 linux-lowlatency-tools-5.15.0-140 - 5.15.0-140.150 linux-modules-5.15.0-140-generic - 5.15.0-140.150 linux-modules-5.15.0-140-generic-64k - 5.15.0-140.150 linux-modules-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-modules-5.15.0-140-lowlatency - 5.15.0-140.150 linux-modules-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-modules-extra-5.15.0-140-generic - 5.15.0-140.150 linux-modules-iwlwifi-5.15.0-140-generic - 5.15.0-140.150 linux-modules-iwlwifi-5.15.0-140-lowlatency - 5.15.0-140.150 linux-source-5.15.0 - 5.15.0-140.150 linux-tools-5.15.0-140 - 5.15.0-140.150 linux-tools-5.15.0-140-generic - 5.15.0-140.150 linux-tools-5.15.0-140-generic-64k - 5.15.0-140.150 linux-tools-5.15.0-140-generic-lpae - 5.15.0-140.150 linux-tools-5.15.0-140-lowlatency - 5.15.0-140.150 linux-tools-5.15.0-140-lowlatency-64k - 5.15.0-140.150 linux-tools-common - 5.15.0-140.150 linux-tools-host - 5.15.0-140.150 No subscription required linux-cloud-tools-gkeop - 5.15.0.1066.65 linux-cloud-tools-gkeop-5.15 - 5.15.0.1066.65 linux-gkeop - 5.15.0.1066.65 linux-gkeop-5.15 - 5.15.0.1066.65 linux-headers-gkeop - 5.15.0.1066.65 linux-headers-gkeop-5.15 - 5.15.0.1066.65 linux-image-gkeop - 5.15.0.1066.65 linux-image-gkeop-5.15 - 5.15.0.1066.65 linux-modules-extra-gkeop - 5.15.0.1066.65 linux-modules-extra-gkeop-5.15 - 5.15.0.1066.65 linux-tools-gkeop - 5.15.0.1066.65 linux-tools-gkeop-5.15 - 5.15.0.1066.65 No subscription required linux-headers-ibm - 5.15.0.1076.72 linux-ibm - 5.15.0.1076.72 linux-image-ibm - 5.15.0.1076.72 linux-tools-ibm - 5.15.0.1076.72 No subscription required linux-cloud-tools-nvidia - 5.15.0.1078.78 linux-cloud-tools-nvidia-lowlatency - 5.15.0.1078.78 linux-headers-nvidia - 5.15.0.1078.78 linux-headers-nvidia-lowlatency - 5.15.0.1078.78 linux-image-nvidia - 5.15.0.1078.78 linux-image-nvidia-lowlatency - 5.15.0.1078.78 linux-nvidia - 5.15.0.1078.78 linux-nvidia-lowlatency - 5.15.0.1078.78 linux-tools-nvidia - 5.15.0.1078.78 linux-tools-nvidia-lowlatency - 5.15.0.1078.78 No subscription required linux-headers-intel-iotg - 5.15.0.1079.79 linux-image-intel-iotg - 5.15.0.1079.79 linux-intel-iotg - 5.15.0.1079.79 linux-tools-intel-iotg - 5.15.0.1079.79 No subscription required linux-headers-kvm - 5.15.0.1080.76 linux-image-kvm - 5.15.0.1080.76 linux-kvm - 5.15.0.1080.76 linux-tools-kvm - 5.15.0.1080.76 No subscription required linux-headers-oracle-lts-22.04 - 5.15.0.1081.77 linux-image-oracle-lts-22.04 - 5.15.0.1081.77 linux-oracle-lts-22.04 - 5.15.0.1081.77 linux-tools-oracle-lts-22.04 - 5.15.0.1081.77 No subscription required linux-cloud-tools-lowlatency - 5.15.0.140.126 linux-cloud-tools-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-cloud-tools-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-headers-lowlatency - 5.15.0.140.126 linux-headers-lowlatency-64k - 5.15.0.140.126 linux-headers-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-headers-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-headers-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-headers-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-image-lowlatency - 5.15.0.140.126 linux-image-lowlatency-64k - 5.15.0.140.126 linux-image-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-image-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-image-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-image-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-lowlatency - 5.15.0.140.126 linux-lowlatency-64k - 5.15.0.140.126 linux-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-lowlatency-hwe-20.04-edge - 5.15.0.140.126 linux-tools-lowlatency - 5.15.0.140.126 linux-tools-lowlatency-64k - 5.15.0.140.126 linux-tools-lowlatency-64k-hwe-20.04 - 5.15.0.140.126 linux-tools-lowlatency-64k-hwe-20.04-edge - 5.15.0.140.126 linux-tools-lowlatency-hwe-20.04 - 5.15.0.140.126 linux-tools-lowlatency-hwe-20.04-edge - 5.15.0.140.126 No subscription required linux-cloud-tools-generic - 5.15.0.140.135 linux-cloud-tools-generic-hwe-20.04 - 5.15.0.140.135 linux-cloud-tools-generic-hwe-20.04-edge - 5.15.0.140.135 linux-cloud-tools-virtual - 5.15.0.140.135 linux-cloud-tools-virtual-hwe-20.04 - 5.15.0.140.135 linux-cloud-tools-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-crashdump - 5.15.0.140.135 linux-generic - 5.15.0.140.135 linux-generic-64k - 5.15.0.140.135 linux-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-generic-hwe-20.04 - 5.15.0.140.135 linux-generic-hwe-20.04-edge - 5.15.0.140.135 linux-generic-lpae - 5.15.0.140.135 linux-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic - 5.15.0.140.135 linux-headers-generic-64k - 5.15.0.140.135 linux-headers-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-hwe-20.04-edge - 5.15.0.140.135 linux-headers-generic-lpae - 5.15.0.140.135 linux-headers-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-headers-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-headers-oem-20.04 - 5.15.0.140.135 linux-headers-virtual - 5.15.0.140.135 linux-headers-virtual-hwe-20.04 - 5.15.0.140.135 linux-headers-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-image-extra-virtual - 5.15.0.140.135 linux-image-extra-virtual-hwe-20.04 - 5.15.0.140.135 linux-image-extra-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic - 5.15.0.140.135 linux-image-generic-64k - 5.15.0.140.135 linux-image-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-image-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic-hwe-20.04 - 5.15.0.140.135 linux-image-generic-hwe-20.04-edge - 5.15.0.140.135 linux-image-generic-lpae - 5.15.0.140.135 linux-image-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-image-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-image-oem-20.04 - 5.15.0.140.135 linux-image-virtual - 5.15.0.140.135 linux-image-virtual-hwe-20.04 - 5.15.0.140.135 linux-image-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-modules-iwlwifi-generic - 5.15.0.140.135 linux-oem-20.04 - 5.15.0.140.135 linux-source - 5.15.0.140.135 linux-tools-generic - 5.15.0.140.135 linux-tools-generic-64k - 5.15.0.140.135 linux-tools-generic-64k-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-64k-hwe-20.04-edge - 5.15.0.140.135 linux-tools-generic-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-hwe-20.04-edge - 5.15.0.140.135 linux-tools-generic-lpae - 5.15.0.140.135 linux-tools-generic-lpae-hwe-20.04 - 5.15.0.140.135 linux-tools-generic-lpae-hwe-20.04-edge - 5.15.0.140.135 linux-tools-oem-20.04 - 5.15.0.140.135 linux-tools-virtual - 5.15.0.140.135 linux-tools-virtual-hwe-20.04 - 5.15.0.140.135 linux-tools-virtual-hwe-20.04-edge - 5.15.0.140.135 linux-virtual - 5.15.0.140.135 linux-virtual-hwe-20.04 - 5.15.0.140.135 linux-virtual-hwe-20.04-edge - 5.15.0.140.135 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2024-26982
- https://ubuntu.com/security/CVE-2024-47726
- https://ubuntu.com/security/CVE-2024-56599
- https://ubuntu.com/security/CVE-2024-56721
- https://ubuntu.com/security/CVE-2024-57834
- https://ubuntu.com/security/CVE-2024-57973
- https://ubuntu.com/security/CVE-2024-57977
- https://ubuntu.com/security/CVE-2024-57978
- https://ubuntu.com/security/CVE-2024-57979
- https://ubuntu.com/security/CVE-2024-57980
- https://ubuntu.com/security/CVE-2024-57981
- https://ubuntu.com/security/CVE-2024-57986
- https://ubuntu.com/security/CVE-2024-58001
- https://ubuntu.com/security/CVE-2024-58002
- https://ubuntu.com/security/CVE-2024-58005
- https://ubuntu.com/security/CVE-2024-58007
- https://ubuntu.com/security/CVE-2024-58010
- https://ubuntu.com/security/CVE-2024-58014
- https://ubuntu.com/security/CVE-2024-58016
- https://ubuntu.com/security/CVE-2024-58017
- https://ubuntu.com/security/CVE-2024-58020
- https://ubuntu.com/security/CVE-2024-58034
- https://ubuntu.com/security/CVE-2024-58051
- https://ubuntu.com/security/CVE-2024-58052
- https://ubuntu.com/security/CVE-2024-58055
- https://ubuntu.com/security/CVE-2024-58058
- https://ubuntu.com/security/CVE-2024-58063
- https://ubuntu.com/security/CVE-2024-58069
- https://ubuntu.com/security/CVE-2024-58071
- https://ubuntu.com/security/CVE-2024-58072
- https://ubuntu.com/security/CVE-2024-58076
- https://ubuntu.com/security/CVE-2024-58079
- https://ubuntu.com/security/CVE-2024-58083
- https://ubuntu.com/security/CVE-2024-58085
- https://ubuntu.com/security/CVE-2024-58086
- https://ubuntu.com/security/CVE-2024-58090
- https://ubuntu.com/security/CVE-2025-21647
- https://ubuntu.com/security/CVE-2025-21684
- https://ubuntu.com/security/CVE-2025-21704
- https://ubuntu.com/security/CVE-2025-21707
- https://ubuntu.com/security/CVE-2025-21708
- https://ubuntu.com/security/CVE-2025-21711
- https://ubuntu.com/security/CVE-2025-21715
- https://ubuntu.com/security/CVE-2025-21718
- https://ubuntu.com/security/CVE-2025-21719
- https://ubuntu.com/security/CVE-2025-21721
- https://ubuntu.com/security/CVE-2025-21722
- https://ubuntu.com/security/CVE-2025-21726
- https://ubuntu.com/security/CVE-2025-21727
- https://ubuntu.com/security/CVE-2025-21728
- https://ubuntu.com/security/CVE-2025-21731
- https://ubuntu.com/security/CVE-2025-21735
- https://ubuntu.com/security/CVE-2025-21736
- https://ubuntu.com/security/CVE-2025-21744
- https://ubuntu.com/security/CVE-2025-21745
- https://ubuntu.com/security/CVE-2025-21748
- https://ubuntu.com/security/CVE-2025-21749
- https://ubuntu.com/security/CVE-2025-21753
- https://ubuntu.com/security/CVE-2025-21758
- https://ubuntu.com/security/CVE-2025-21760
- https://ubuntu.com/security/CVE-2025-21761
- https://ubuntu.com/security/CVE-2025-21762
- https://ubuntu.com/security/CVE-2025-21763
- https://ubuntu.com/security/CVE-2025-21764
- https://ubuntu.com/security/CVE-2025-21765
- https://ubuntu.com/security/CVE-2025-21766
- https://ubuntu.com/security/CVE-2025-21767
- https://ubuntu.com/security/CVE-2025-21772
- https://ubuntu.com/security/CVE-2025-21776
- https://ubuntu.com/security/CVE-2025-21779
- https://ubuntu.com/security/CVE-2025-21781
- https://ubuntu.com/security/CVE-2025-21782
- https://ubuntu.com/security/CVE-2025-21785
- https://ubuntu.com/security/CVE-2025-21787
- https://ubuntu.com/security/CVE-2025-21791
- https://ubuntu.com/security/CVE-2025-21795
- https://ubuntu.com/security/CVE-2025-21796
- https://ubuntu.com/security/CVE-2025-21799
- https://ubuntu.com/security/CVE-2025-21802
- https://ubuntu.com/security/CVE-2025-21804
- https://ubuntu.com/security/CVE-2025-21806
- https://ubuntu.com/security/CVE-2025-21811
- https://ubuntu.com/security/CVE-2025-21814
- https://ubuntu.com/security/CVE-2025-21820
- https://ubuntu.com/security/CVE-2025-21823
- https://ubuntu.com/security/CVE-2025-21826
- https://ubuntu.com/security/CVE-2025-21830
- https://ubuntu.com/security/CVE-2025-21835
- https://ubuntu.com/security/CVE-2025-21844
- https://ubuntu.com/security/CVE-2025-21846
- https://ubuntu.com/security/CVE-2025-21848
- https://ubuntu.com/security/CVE-2025-21858
- https://ubuntu.com/security/CVE-2025-21859
- https://ubuntu.com/security/CVE-2025-21862
- https://ubuntu.com/security/CVE-2025-21865
- https://ubuntu.com/security/CVE-2025-21866
- https://ubuntu.com/security/CVE-2025-21871
- https://ubuntu.com/security/CVE-2025-21875
- https://ubuntu.com/security/CVE-2025-21877
- https://ubuntu.com/security/CVE-2025-21878
- https://ubuntu.com/security/CVE-2025-21887
- https://ubuntu.com/security/CVE-2025-21898
- https://ubuntu.com/security/CVE-2025-21904
- https://ubuntu.com/security/CVE-2025-21905
- https://ubuntu.com/security/CVE-2025-21909
- https://ubuntu.com/security/CVE-2025-21910
- https://ubuntu.com/security/CVE-2025-21912
- https://ubuntu.com/security/CVE-2025-21914
- https://ubuntu.com/security/CVE-2025-21916
- https://ubuntu.com/security/CVE-2025-21917
- https://ubuntu.com/security/CVE-2025-21919
- https://ubuntu.com/security/CVE-2025-21920
- https://ubuntu.com/security/CVE-2025-21922
- https://ubuntu.com/security/CVE-2025-21924
- https://ubuntu.com/security/CVE-2025-21925
- https://ubuntu.com/security/CVE-2025-21926
- https://ubuntu.com/security/CVE-2025-21928
- https://ubuntu.com/security/CVE-2025-21934
- https://ubuntu.com/security/CVE-2025-21935
- https://ubuntu.com/security/CVE-2025-21943
- https://ubuntu.com/security/CVE-2025-21948
- https://ubuntu.com/security/CVE-2025-21950
- https://ubuntu.com/security/CVE-2025-21951
- https://ubuntu.com/security/CVE-2025-21971
Title: USN-7528-1 -- SQLite vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7528-1
Priorities: medium
Description:
It was discovered that SQLite incorrectly handled the concat_ws() function. An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, and Ubuntu 24.10. (CVE-2025-29087, CVE-2025-3277) It was discovered that SQLite incorrectly handled certain argument values to sqlite3_db_config(). An attacker could use this issue to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-29088) Update Instructions: Run sudo pro fix USN-7528-1 to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: lemon - 3.37.2-2ubuntu0.4 libsqlite3-0 - 3.37.2-2ubuntu0.4 libsqlite3-dev - 3.37.2-2ubuntu0.4 libsqlite3-tcl - 3.37.2-2ubuntu0.4 sqlite3 - 3.37.2-2ubuntu0.4 sqlite3-doc - 3.37.2-2ubuntu0.4 sqlite3-tools - 3.37.2-2ubuntu0.4 No subscription required
CVEs:
- https://ubuntu.com/security/CVE-2025-29087
- https://ubuntu.com/security/CVE-2025-29088
- https://ubuntu.com/security/CVE-2025-3277
Title: USN-7302-1 -- libxml2 vulnerabilities
URL: https://ubuntu.com/security/notices/USN-7302-1
Priorities: medium, low
Description:
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)
It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)
It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-56171)
It was discovered that libxml2 could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2025-24928)
It was discovered that libxml2 could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2025-27113)
CVEs: