USN-7455-1: Linux kernel vulnerabilities
24 April 2025
Several security issues were fixed in the Linux kernel.
Releases
Packages
- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems
- linux-azure-5.15 - Linux kernel for Microsoft Azure cloud systems
- linux-azure-fde - Linux kernel for Microsoft Azure CVM cloud systems
- linux-azure-fde-5.15 - Linux kernel for Microsoft Azure CVM cloud systems
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke - Linux kernel for Google Container Engine (GKE) systems
- linux-gkeop - Linux kernel for Google Container Engine (GKE) systems
- linux-hwe-5.15 - Linux hardware enablement (HWE) kernel
- linux-ibm - Linux kernel for IBM cloud systems
- linux-intel-iotg - Linux kernel for Intel IoT platforms
- linux-kvm - Linux kernel for cloud environments
- linux-lowlatency - Linux low latency kernel
- linux-lowlatency-hwe-5.15 - Linux low latency kernel
- linux-nvidia - Linux kernel for NVIDIA systems
- linux-nvidia-tegra - Linux kernel for NVIDIA Tegra systems
- linux-nvidia-tegra-igx - Linux kernel for NVIDIA Tegra IGX systems
- linux-oracle - Linux kernel for Oracle Cloud systems
- linux-raspi - Linux kernel for Raspberry Pi systems
Details
Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Network drivers;
- File systems infrastructure;
- NTFS3 file system;
- Ethernet bridge;
- Ethtool driver;
- IPv6 networking;
- Network traffic control;
- VMware vSockets driver;
(CVE-2025-21703, CVE-2024-56651, CVE-2024-50248, CVE-2025-21701,
CVE-2024-26837, CVE-2024-46826, CVE-2025-21993, CVE-2025-21702,
CVE-2024-50256, CVE-2025-21756, CVE-2025-21700)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
linux-image-5.15.0-1023-nvidia-tegra-igx
-
5.15.0-1023.23
-
linux-image-5.15.0-1023-nvidia-tegra-igx-rt
-
5.15.0-1023.23
-
linux-image-5.15.0-1035-nvidia-tegra
-
5.15.0-1035.35
-
linux-image-5.15.0-1035-nvidia-tegra-rt
-
5.15.0-1035.35
-
linux-image-5.15.0-1064-gkeop
-
5.15.0-1064.72
-
linux-image-5.15.0-1074-ibm
-
5.15.0-1074.77
-
linux-image-5.15.0-1076-nvidia
-
5.15.0-1076.77
-
linux-image-5.15.0-1076-nvidia-lowlatency
-
5.15.0-1076.77
-
linux-image-5.15.0-1076-raspi
-
5.15.0-1076.79
-
linux-image-5.15.0-1077-intel-iotg
-
5.15.0-1077.83
-
linux-image-5.15.0-1078-kvm
-
5.15.0-1078.83
-
linux-image-5.15.0-1079-gke
-
5.15.0-1079.85
-
linux-image-5.15.0-1079-oracle
-
5.15.0-1079.85
-
linux-image-5.15.0-1081-gcp
-
5.15.0-1081.90
-
linux-image-5.15.0-1082-aws
-
5.15.0-1082.89
-
linux-image-5.15.0-1087-azure
-
5.15.0-1087.96
-
linux-image-5.15.0-1087-azure-fde
-
5.15.0-1087.96.1
-
linux-image-5.15.0-138-generic
-
5.15.0-138.148
-
linux-image-5.15.0-138-generic-64k
-
5.15.0-138.148
-
linux-image-5.15.0-138-generic-lpae
-
5.15.0-138.148
-
linux-image-5.15.0-138-lowlatency
-
5.15.0-138.148
-
linux-image-5.15.0-138-lowlatency-64k
-
5.15.0-138.148
-
linux-image-aws-lts-22.04
-
5.15.0.1082.84
-
linux-image-azure-fde-lts-22.04
-
5.15.0.1087.96.64
-
linux-image-azure-lts-22.04
-
5.15.0.1087.85
-
linux-image-gcp-lts-22.04
-
5.15.0.1081.77
-
linux-image-generic
-
5.15.0.138.134
-
linux-image-generic-64k
-
5.15.0.138.134
-
linux-image-generic-lpae
-
5.15.0.138.134
-
linux-image-gke
-
5.15.0.1079.78
-
linux-image-gke-5.15
-
5.15.0.1079.78
-
linux-image-gkeop
-
5.15.0.1064.63
-
linux-image-gkeop-5.15
-
5.15.0.1064.63
-
linux-image-ibm
-
5.15.0.1074.70
-
linux-image-intel-iotg
-
5.15.0.1077.77
-
linux-image-kvm
-
5.15.0.1078.74
-
linux-image-lowlatency
-
5.15.0.138.124
-
linux-image-lowlatency-64k
-
5.15.0.138.124
-
linux-image-nvidia
-
5.15.0.1076.76
-
linux-image-nvidia-lowlatency
-
5.15.0.1076.76
-
linux-image-nvidia-tegra
-
5.15.0.1035.35
-
linux-image-nvidia-tegra-igx
-
5.15.0.1023.25
-
linux-image-nvidia-tegra-igx-rt
-
5.15.0.1023.25
-
linux-image-nvidia-tegra-rt
-
5.15.0.1035.35
-
linux-image-oracle-lts-22.04
-
5.15.0.1079.75
-
linux-image-raspi
-
5.15.0.1076.74
-
linux-image-raspi-nolpae
-
5.15.0.1076.74
-
linux-image-virtual
-
5.15.0.138.134
Ubuntu 20.04
-
linux-image-5.15.0-1087-azure
-
5.15.0-1087.96~20.04.1
-
linux-image-5.15.0-1087-azure-fde
-
5.15.0-1087.96~20.04.1.1
-
linux-image-5.15.0-138-generic
-
5.15.0-138.148~20.04.1
-
linux-image-5.15.0-138-generic-64k
-
5.15.0-138.148~20.04.1
-
linux-image-5.15.0-138-generic-lpae
-
5.15.0-138.148~20.04.1
-
linux-image-5.15.0-138-lowlatency
-
5.15.0-138.148~20.04.1
-
linux-image-5.15.0-138-lowlatency-64k
-
5.15.0-138.148~20.04.1
-
linux-image-azure
-
5.15.0.1087.96~20.04.1
-
linux-image-azure-cvm
-
5.15.0.1087.96~20.04.1
-
linux-image-azure-fde
-
5.15.0.1087.96~20.04.1.62
-
linux-image-generic-64k-hwe-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-generic-hwe-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-generic-lpae-hwe-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-lowlatency-64k-hwe-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-lowlatency-hwe-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-oem-20.04
-
5.15.0.138.148~20.04.1
-
linux-image-oem-20.04b
-
5.15.0.138.148~20.04.1
-
linux-image-oem-20.04c
-
5.15.0.138.148~20.04.1
-
linux-image-oem-20.04d
-
5.15.0.138.148~20.04.1
-
linux-image-virtual-hwe-20.04
-
5.15.0.138.148~20.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
Related notices
- USN-7445-1
- USN-7448-1
- USN-7455-2
- USN-7455-3
- USN-7459-1
- USN-7460-1
- USN-7461-1
- USN-7461-2
- USN-7462-1
- USN-7462-2
- USN-7428-1
- USN-7428-2
- USN-7429-1
- USN-7429-2
- USN-7449-1
- USN-7450-1
- USN-7451-1
- USN-7452-1
- USN-7453-1
- USN-7463-1
- USN-7449-2
- USN-7276-1
- USN-7277-1
- USN-7310-1
- USN-7154-1
- USN-7155-1
- USN-7156-1
- USN-7154-2
- USN-7196-1
- LSN-0111-1
- USN-7379-1
- USN-7380-1
- USN-7381-1
- USN-7382-1
- USN-7379-2