Ubuntu update for linux



Risk Low
Patch available YES
Number of vulnerabilities 11
CVE-ID CVE-2024-53237
CVE-2024-50256
CVE-2021-47119
CVE-2024-35958
CVE-2025-21700
CVE-2025-21703
CVE-2024-56651
CVE-2024-49974
CVE-2025-21702
CVE-2024-26915
CVE-2024-46826
CWE-ID CWE-416
CWE-388
CWE-401
CWE-399
CWE-20
CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

linux-image-virtual (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oracle-lts-20.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem-osp1 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oem (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-ibm-lts-20.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-gcp-lts-20.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-bluefield (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-azure-lts-20.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-214-lowlatency (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-214-generic-lpae (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-214-generic (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1149-azure (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1147-gcp (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1142-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1131-kvm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1103-bluefield (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-5.4.0-1090-ibm (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-lowlatency-hwe-18.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-virtual-hwe-18.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-snapdragon-hwe-18.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-generic-hwe-18.04 (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-azure (Ubuntu package)
Operating systems & Components / Operating system package or component

linux-image-oracle (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 11 vulnerabilities.

1) Use-after-free

EUVDB-ID: #VU102069

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-53237

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __match_tty() and hci_conn_del_sysfs() functions in net/bluetooth/hci_sysfs.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper error handling

EUVDB-ID: #VU100192

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-50256

CWE-ID: CWE-388 - Error Handling

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper error handling within the nf_reject6_fill_skb_dst() and nf_send_reset6() functions in net/ipv6/netfilter/nf_reject_ipv6.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Memory leak

EUVDB-ID: #VU90018

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-47119

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the ext4_fill_super() and kfree() functions in fs/ext4/super.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU93255

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-35958

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the ena_unmap_tx_buff() and ena_free_tx_bufs() functions in drivers/net/ethernet/amazon/ena/ena_netdev.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU103959

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21700

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the qdisc_lookup() function in net/sched/sch_api.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU104073

Risk: Low

CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21703

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the net/sched/sch_netem.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free

EUVDB-ID: #VU102030

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-56651

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the hi3110_can_ist() function in drivers/net/can/spi/hi311x.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU99220

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49974

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the nfs4_state_create_net() function in fs/nfsd/nfs4state.c, within the nfs4_put_copy() and nfsd4_copy() functions in fs/nfsd/nfs4proc.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Resource management error

EUVDB-ID: #VU104074

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:U/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-21702

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to resource management error within the pfifo_tail_enqueue() function in net/sched/sch_fifo.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Buffer overflow

EUVDB-ID: #VU91311

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-26915

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to memory corruption within the vega20_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega20_ih.c, within the vega10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/vega10_ih.c, within the tonga_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/tonga_ih.c, within the si_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/si_ih.c, within the navi10_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/navi10_ih.c, within the iceland_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/iceland_ih.c, within the cz_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cz_ih.c, within the cik_ih_get_wptr() function in drivers/gpu/drm/amd/amdgpu/cik_ih.c. A local user can escalate privileges on the system.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Input validation error

EUVDB-ID: #VU97839

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-46826

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the fs/binfmt_elf.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected package linux to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 20.04

linux-image-virtual (Ubuntu package): before 5.4.0.214.207

linux-image-oracle-lts-20.04 (Ubuntu package): before 5.4.0.1142.136

linux-image-oem-osp1 (Ubuntu package): before 5.4.0.214.207

linux-image-oem (Ubuntu package): before 5.4.0.214.207

linux-image-lowlatency (Ubuntu package): before 5.4.0.214.207

linux-image-kvm (Ubuntu package): before 5.4.0.1131.127

linux-image-ibm-lts-20.04 (Ubuntu package): before 5.4.0.1090.119

linux-image-generic-lpae (Ubuntu package): before 5.4.0.214.207

linux-image-generic (Ubuntu package): before 5.4.0.214.207

linux-image-gcp-lts-20.04 (Ubuntu package): before 5.4.0.1147.149

linux-image-bluefield (Ubuntu package): before 5.4.0.1103.99

linux-image-azure-lts-20.04 (Ubuntu package): before 5.4.0.1149.143

linux-image-5.4.0-214-lowlatency (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-214-generic-lpae (Ubuntu package): before 5.4.0-214.234

linux-image-5.4.0-214-generic (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1149-azure (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1147-gcp (Ubuntu package): before 5.4.0-1147.156

linux-image-5.4.0-1142-oracle (Ubuntu package): before Ubuntu Pro

linux-image-5.4.0-1131-kvm (Ubuntu package): before 5.4.0-1131.140

linux-image-5.4.0-1103-bluefield (Ubuntu package): before 5.4.0-1103.110

linux-image-5.4.0-1090-ibm (Ubuntu package): before 5.4.0-1090.95

linux-image-lowlatency-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-virtual-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-snapdragon-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-generic-hwe-18.04 (Ubuntu package): before Ubuntu Pro

linux-image-azure (Ubuntu package): before Ubuntu Pro (Infra-only)

linux-image-oracle (Ubuntu package): before Ubuntu Pro (Infra-only)

CPE2.3 External links

https://ubuntu.com/security/notices/USN-7461-1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###