USN-7304-1

Source
https://ubuntu.com/security/notices/USN-7304-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7304-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7304-1
Related
Published
2025-02-26T10:58:00.343391Z
Modified
2025-02-26T10:58:00.343391Z
Summary
linux-gcp, linux-gke, linux-gkeop vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - x86 architecture; - Block layer subsystem; - Cryptographic API; - ACPI drivers; - Drivers core; - ATA over ethernet (AOE) driver; - Network block device driver; - TPM device driver; - Hardware crypto device drivers; - ARM SCMI message protocol; - EFI core; - GPU drivers; - I2C subsystem; - I3C subsystem; - InfiniBand drivers; - Input Device core drivers; - IOMMU subsystem; - Mailbox framework; - Media drivers; - Ethernet bonding driver; - Network drivers; - Mellanox network drivers; - STMicroelectronics network drivers; - NTB driver; - PCI subsystem; - Alibaba DDR Sub-System Driveway PMU driver; - x86 platform drivers; - Powercap sysfs driver; - Remote Processor subsystem; - SCSI subsystem; - USB Device Class drivers; - vDPA drivers; - Virtio Host (VHOST) subsystem; - Framebuffer layer; - AFS file system; - BTRFS file system; - File systems infrastructure; - Ceph distributed file system; - Ext4 file system; - F2FS file system; - JFS file system; - Network file systems library; - Network file system (NFS) server daemon; - NILFS2 file system; - SMB network file system; - BPF subsystem; - Virtio network driver; - TCP network protocol; - Perf events; - Padata parallel execution mechanism; - RCU subsystem; - Arbitrary resource management; - Static call mechanism; - Tracing infrastructure; - Memory management; - Bluetooth subsystem; - CAN network layer; - Networking core; - Distributed Switch Architecture; - IPv4 networking; - IPv6 networking; - MAC80211 subsystem; - IEEE 802.15.4 subsystem; - NCSI (Network Controller Sideband Interface) driver; - RxRPC session sockets; - SCTP protocol; - TIPC protocol; - Wireless networking; - AudioScience HPI driver; - KVM core; (CVE-2024-47678, CVE-2024-49952, CVE-2024-47682, CVE-2024-47679, CVE-2024-47748, CVE-2024-47728, CVE-2024-49953, CVE-2024-49883, CVE-2024-47742, CVE-2024-50000, CVE-2024-47733, CVE-2024-47752, CVE-2024-49927, CVE-2024-47713, CVE-2024-49853, CVE-2024-49998, CVE-2024-47672, CVE-2024-49900, CVE-2024-49884, CVE-2024-49876, CVE-2024-47673, CVE-2024-49958, CVE-2024-50274, CVE-2024-49980, CVE-2024-47703, CVE-2024-49891, CVE-2024-47716, CVE-2024-49903, CVE-2024-49868, CVE-2024-47699, CVE-2024-50015, CVE-2024-49896, CVE-2024-49867, CVE-2024-50016, CVE-2024-49862, CVE-2024-49947, CVE-2024-47714, CVE-2024-50179, CVE-2024-50006, CVE-2024-49881, CVE-2024-49933, CVE-2024-49882, CVE-2024-47709, CVE-2024-47686, CVE-2024-49859, CVE-2024-49992, CVE-2024-49957, CVE-2024-47691, CVE-2024-49936, CVE-2024-49878, CVE-2024-49879, CVE-2024-49997, CVE-2024-47697, CVE-2024-49963, CVE-2024-49938, CVE-2024-47723, CVE-2024-47700, CVE-2024-49999, CVE-2024-49923, CVE-2024-49991, CVE-2024-50013, CVE-2024-47730, CVE-2024-47718, CVE-2024-47671, CVE-2024-49977, CVE-2024-53144, CVE-2024-49922, CVE-2024-49985, CVE-2024-47712, CVE-2024-49962, CVE-2024-49907, CVE-2024-49886, CVE-2024-49976, CVE-2024-49902, CVE-2024-47732, CVE-2024-49995, CVE-2024-49942, CVE-2024-47706, CVE-2024-47747, CVE-2024-49949, CVE-2024-49911, CVE-2024-49929, CVE-2024-47737, CVE-2024-47720, CVE-2024-47756, CVE-2024-47688, CVE-2024-47753, CVE-2024-49937, CVE-2024-47684, CVE-2024-47690, CVE-2024-49897, CVE-2024-47705, CVE-2024-49852, CVE-2024-49930, CVE-2024-47681, CVE-2024-50175, CVE-2024-49863, CVE-2024-49969, CVE-2024-49894, CVE-2024-49928, CVE-2024-47698, CVE-2024-47710, CVE-2024-49931, CVE-2024-50008, CVE-2024-49939, CVE-2024-49915, CVE-2024-47757, CVE-2024-49912, CVE-2024-47696, CVE-2024-47702, CVE-2024-49877, CVE-2024-49974, CVE-2024-49919, CVE-2024-49888, CVE-2024-49871, CVE-2024-47685, CVE-2024-47734, CVE-2024-49965, CVE-2024-47707, CVE-2024-49987, CVE-2024-47745, CVE-2024-50001, CVE-2024-49960, CVE-2024-50014, CVE-2024-49994, CVE-2024-49875, CVE-2024-49856, CVE-2024-49926, CVE-2024-47701, CVE-2024-47749, CVE-2024-47715, CVE-2024-49981, CVE-2024-49935, CVE-2024-47754, CVE-2024-47692, CVE-2024-49864, CVE-2024-49983, CVE-2024-49950, CVE-2024-49917, CVE-2024-49924, CVE-2024-47743, CVE-2024-47693, CVE-2024-50176, CVE-2024-47670, CVE-2024-47727, CVE-2024-47739, CVE-2024-49978, CVE-2024-49858, CVE-2024-49861, CVE-2024-49946, CVE-2024-50012, CVE-2024-49934, CVE-2024-49986, CVE-2023-52917, CVE-2024-49870, CVE-2024-49892, CVE-2024-47741, CVE-2024-47731, CVE-2024-47675, CVE-2024-49898, CVE-2024-49959, CVE-2024-49988, CVE-2024-49918, CVE-2024-50002, CVE-2024-49954, CVE-2024-49944, CVE-2024-49996, CVE-2024-49982, CVE-2024-49948, CVE-2024-49901, CVE-2024-47735, CVE-2024-49851, CVE-2024-50007, CVE-2024-49895, CVE-2024-47744, CVE-2024-49889, CVE-2024-50017, CVE-2024-49945, CVE-2024-49890, CVE-2024-49850, CVE-2024-47677, CVE-2024-47704, CVE-2024-49874, CVE-2024-49860, CVE-2024-49961, CVE-2024-49975, CVE-2024-41016, CVE-2024-49951, CVE-2024-49909, CVE-2024-49955, CVE-2024-49885, CVE-2024-50005, CVE-2024-47750, CVE-2024-47695, CVE-2024-49913, CVE-2024-49925, CVE-2024-47689, CVE-2024-49866, CVE-2024-49973, CVE-2024-47751, CVE-2024-49880, CVE-2024-49855, CVE-2024-49989, CVE-2024-47740, CVE-2024-47687, CVE-2024-47738, CVE-2024-47719, CVE-2024-49905, CVE-2024-53064, CVE-2024-49966)

References

Affected packages

Ubuntu:24.04:LTS / linux-gcp

Package

Name
linux-gcp
Purl
pkg:deb/ubuntu/linux-gcp@6.8.0-1024.26?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1024.26

Affected versions

6.*

6.5.0-1007.7
6.6.0-1001.1
6.8.0-1002.2
6.8.0-1005.5
6.8.0-1006.6
6.8.0-1007.7
6.8.0-1008.9
6.8.0-1009.10
6.8.0-1010.11
6.8.0-1011.12
6.8.0-1012.13
6.8.0-1013.14
6.8.0-1014.16
6.8.0-1015.17
6.8.0-1016.18
6.8.0-1017.19
6.8.0-1018.20
6.8.0-1019.21
6.8.0-1020.22
6.8.0-1021.23

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-buildinfo-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-buildinfo-6.8.0-1024-gcp-64k"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-gcp-headers-6.8.0-1024"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-gcp-tools-6.8.0-1024"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-headers-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-headers-6.8.0-1024-gcp-64k"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-image-unsigned-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-64k-dbgsym"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-image-unsigned-6.8.0-1024-gcp-dbgsym"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-modules-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-modules-6.8.0-1024-gcp-64k"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-modules-extra-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-modules-extra-6.8.0-1024-gcp-64k"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-tools-6.8.0-1024-gcp"
        },
        {
            "binary_version": "6.8.0-1024.26",
            "binary_name": "linux-tools-6.8.0-1024-gcp-64k"
        }
    ]
}

Ubuntu:24.04:LTS / linux-gke

Package

Name
linux-gke
Purl
pkg:deb/ubuntu/linux-gke@6.8.0-1019.23?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1019.23

Affected versions

6.*

6.8.0-1003.5
6.8.0-1004.7
6.8.0-1005.8
6.8.0-1006.9
6.8.0-1007.10
6.8.0-1008.11
6.8.0-1009.12
6.8.0-1010.13
6.8.0-1011.14
6.8.0-1012.15
6.8.0-1013.17
6.8.0-1014.18
6.8.0-1015.19
6.8.0-1016.20
6.8.0-1017.21

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-buildinfo-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-gke-headers-6.8.0-1019"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-gke-tools-6.8.0-1019"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-headers-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-image-unsigned-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-image-unsigned-6.8.0-1019-gke-dbgsym"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-modules-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-modules-extra-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-modules-iwlwifi-6.8.0-1019-gke"
        },
        {
            "binary_version": "6.8.0-1019.23",
            "binary_name": "linux-tools-6.8.0-1019-gke"
        }
    ]
}

Ubuntu:24.04:LTS / linux-gkeop

Package

Name
linux-gkeop
Purl
pkg:deb/ubuntu/linux-gkeop@6.8.0-1006.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.0-1006.8

Affected versions

6.*

6.8.0-1001.3
6.8.0-1002.4
6.8.0-1003.5
6.8.0-1004.6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-buildinfo-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-cloud-tools-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-gkeop-cloud-tools-6.8.0-1006"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-gkeop-headers-6.8.0-1006"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-gkeop-tools-6.8.0-1006"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-headers-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-image-unsigned-6.8.0-1006-gkeop-dbgsym"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-modules-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-modules-extra-6.8.0-1006-gkeop"
        },
        {
            "binary_version": "6.8.0-1006.8",
            "binary_name": "linux-tools-6.8.0-1006-gkeop"
        }
    ]
}