Linux kernel vulnerabilities
A security issue Kernel Live Patch Security Notice LSN-0117-1
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary
Several security issues were fixed in the kernel.
Software Description
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-ibm - Linux kernel for IBM cloud systems
- linux-oracle - Linux kernel for Oracle Cloud systems
Details
In the Linux kernel, the following vulnerability has been resolved:
e100: Fix possible use after free in e100_xmit_prepare In
e100_xmit_prepare(), if we can?t map the skb, then return -ENOMEM, so
e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will
resend the skb. (CVE-2022-49026)
In the Linux kernel, the following vulnerability has been resolved:
macsec: fix UAF bug for real_dev Create a new macsec device but not get
reference to real_dev. (CVE-2022-49390)
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix firmware crash due to invalid peer nss Currently, if
the access point receives an association request containing an Extended
HE Capabilities Information Element with an invalid MCS-NSS, it triggers
a firmware crash. (CVE-2024-46827)
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Fix overflow in oa batch buffer By default xe_bb_create_job()
appends a MI_BATCH_BUFFER_END to batch buffer, this is not a problem if
batch buffer is only used once but oa reuses the batch buffer for the
same metric and at each call it appends a MI_BATCH_BUFFER_END, printing
the warning below and then overflowing. (CVE-2024-50090)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Prevent NULL dereference in nfsd4_process_cb_update() @ses is
initialized to NULL. (CVE-2024-53217)
In the Linux kernel, the following vulnerability has been resolved: KVM:
Explicitly verify target vCPU is online in kvm_get_vcpu() Explicitly
verify the target vCPU is fully online prior to clamping the index in
kvm_get_vcpu(). (CVE-2024-58083)
In the Linux kernel, the following vulnerability has been resolved:
sched: sch_cake: add bounds checks to host bulk flow fairness counts
Even though we fixed a logic error in the commit cited below, syzbot
still managed to trigger an underflow of the per-host bulk flow
counters, leading to an out of bounds memory access. (CVE-2025-21647)
In the Linux kernel, the following vulnerability has been resolved: net:
sched: fix ets qdisc OOB Indexing Haowei Yan
that ets_class_from_arg() can index an Out- Of-Bound class in
ets_class_from_arg() when passed clid of 0. (CVE-2025-21692)
In the Linux kernel, the following vulnerability has been resolved: usb:
cdc-acm: Check control transfer buffer size before access If the first
fragment is shorter than struct usb_cdc_notification, we can?t calculate
an expected_size. (CVE-2025-21704)
In the Linux kernel, the following vulnerability has been resolved: net:
davicom: fix UAF in dm9000_drv_remove dm is netdev private data and it
cannot be used after free_netdev() call. (CVE-2025-21715)
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix random stack corruption after get_block When get_block is
called with a buffer_head allocated on the stack, such as
do_mpage_readpage, stack corruption due to buffer_head UAF may occur in
the following race condition situation. (CVE-2025-22036)
Update instructions
The problem can be corrected by updating your kernel livepatch to the
following versions:
Ubuntu 20.04 LTS
aws - 117.4
aws - 117.5
azure - 117.5
gcp - 117.5
generic - 117.4
generic - 117.5
ibm - 117.5
lowlatency - 117.4
lowlatency - 117.5
oracle - 117.5
Ubuntu 18.04 LTS
aws - 117.4
azure - 117.4
gcp - 117.4
generic - 117.4
lowlatency - 117.4
oracle - 117.4
Ubuntu 24.04 LTS
aws - 117.4
azure - 117.4
gcp - 117.4
generic - 117.4
ibm - 117.4
oracle - 117.4
Ubuntu 22.04 LTS
aws - 117.5
azure - 117.5
gcp - 117.5
gcp - 117.6
generic - 117.5
generic - 117.6
oracle - 117.5
oracle - 117.6
Support Information
Livepatches for supported LTS kernels will receive upgrades for a period
of up to 13 months after the build date of the kernel.
Livepatches for supported HWE kernels which are not based on an LTS
kernel version will receive upgrades for a period of up to 9 months
after the build date of the kernel, or until the end of support for that
kernel?s non-LTS distro release version, whichever is sooner.
References
- CVE-2022-49026
- CVE-2022-49390
- CVE-2024-46827
- CVE-2024-50090
- CVE-2024-53217
- CVE-2024-58083
- CVE-2025-21647
- CVE-2025-21692
- CVE-2025-21704
- CVE-2025-21715
- CVE-2025-22036