Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Packet sockets; - Network traffic control; - VMware vSockets driver; - XFRM subsystem; (CVE-2025-38617, CVE-2025-38500, CVE-2025-38477, CVE-2025-38618)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-buildinfo-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-buildinfo-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-gcp-6.14-headers-6.14.0-1017" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-gcp-6.14-tools-6.14.0-1017" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-headers-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-headers-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-image-unsigned-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-image-unsigned-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-lib-rust-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-modules-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-modules-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-modules-extra-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-modules-extra-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-tools-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18~24.04.1", "binary_name": "linux-tools-6.14.0-1017-gcp-64k" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:24.04:LTS", "cves": [ { "id": "CVE-2025-38477", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38500", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38617", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38618", "severity": [ { "score": "medium", "type": "Ubuntu" } ] } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "6.14.0-1013.13", "binary_name": "linux-buildinfo-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-headers-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-image-unsigned-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-ipu6-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-ipu7-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-iwlwifi-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-usbio-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-modules-vision-6.14.0-1013-oem" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-oem-6.14-headers-6.14.0-1013" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-oem-6.14-tools-6.14.0-1013" }, { "binary_version": "6.14.0-1013.13", "binary_name": "linux-tools-6.14.0-1013-oem" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:24.04:LTS", "cves": [ { "id": "CVE-2025-38477", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38500", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38617", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38618", "severity": [ { "score": "medium", "type": "Ubuntu" } ] } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "6.14.0-1017.18", "binary_name": "linux-buildinfo-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-buildinfo-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-gcp-headers-6.14.0-1017" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-gcp-tools-6.14.0-1017" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-headers-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-headers-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-image-unsigned-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-image-unsigned-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-modules-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-modules-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-modules-extra-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-modules-extra-6.14.0-1017-gcp-64k" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-tools-6.14.0-1017-gcp" }, { "binary_version": "6.14.0-1017.18", "binary_name": "linux-tools-6.14.0-1017-gcp-64k" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:25.04", "cves": [ { "id": "CVE-2025-38477", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38500", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38617", "severity": [ { "score": "medium", "type": "Ubuntu" } ] }, { "id": "CVE-2025-38618", "severity": [ { "score": "medium", "type": "Ubuntu" } ] } ] } }