Ubuntu 6744 Published by

Ubuntu Linux has received updates focused on security, addressing vulnerabilities in the Linux kernel, GNU binutils, Node.js, and LibXML2:

[USN-7455-5] Linux kernel (AWS) vulnerabilities
[USN-7423-2] GNU binutils vulnerabilities
[USN-7469-3] Node.js vulnerability
[USN-7467-2] libxml2 vulnerabilities




[USN-7455-5] Linux kernel (AWS) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7455-5
April 29, 2025

linux-aws-5.15 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems

Details:

Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- iSCSI Boot Firmware Table Attributes driver;
- Network drivers;
- File systems infrastructure;
- NTFS3 file system;
- Ethernet bridge;
- Ethtool driver;
- IPv6 networking;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-26837, CVE-2025-21993, CVE-2025-21702, CVE-2024-50248,
CVE-2024-46826, CVE-2024-50256, CVE-2025-21703, CVE-2025-21700,
CVE-2025-21756, CVE-2025-21701, CVE-2024-56651)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
linux-image-5.15.0-1082-aws 5.15.0-1082.89~20.04.1
linux-image-aws 5.15.0.1082.89~20.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7455-5
https://ubuntu.com/security/notices/USN-7455-4
https://ubuntu.com/security/notices/USN-7455-3
https://ubuntu.com/security/notices/USN-7455-2
https://ubuntu.com/security/notices/USN-7455-1
CVE-2022-0995, CVE-2024-26837, CVE-2024-46826, CVE-2024-50248,
CVE-2024-50256, CVE-2024-56651, CVE-2025-21700, CVE-2025-21701,
CVE-2025-21702, CVE-2025-21703, CVE-2025-21756, CVE-2025-21993

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1082.89~20.04.1



[USN-7423-2] GNU binutils vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7423-2
April 29, 2025

binutils vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in GNU binutils.

Software Description:
- binutils: GNU assembler, linker and binary utilities

Details:

USN-7423-1 fixed several vulnerabilities in GNU. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that GNU binutils incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2025-0840)

It was discovered that GNU binutils incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash, expose
sensitive information or execute arbitrary code.
(CVE-2025-1153)

It was discovered that ld in GNU binutils incorrectly handled certain
files. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2025-1176)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
binutils 2.30-21ubuntu1~18.04.9+esm4
Available with Ubuntu Pro
binutils-multiarch 2.30-21ubuntu1~18.04.9+esm4
Available with Ubuntu Pro

Ubuntu 16.04 LTS
binutils 2.26.1-1ubuntu1~16.04.8+esm11
Available with Ubuntu Pro
binutils-multiarch 2.26.1-1ubuntu1~16.04.8+esm11
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7423-2
https://ubuntu.com/security/notices/USN-7423-1
CVE-2025-0840, CVE-2025-1153, CVE-2025-1176



[USN-7469-3] Node.js vulnerability


==========================================================================
Ubuntu Security Notice USN-7469-3
April 29, 2025

nodejs vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Node.js could be made to crash if it received specially crafted network
traffic.

Software Description:
- nodejs: An open-source, cross-platform JavaScript runtime environment.

Details:

USN-7469-1 fixed a vulnerability in Apache Traffic Server. This update
provides the corresponding updates for Node.js.

Original advisory details:

 It was discovered that Apache Traffic Server exhibited poor server
 resource management in its HTTP/2 protocol. An attacker could possibly
 use this issue to cause Apache Traffic Server to crash, resulting in
 a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
  libnode-dev                     12.22.9~dfsg-1ubuntu3.6+esm2
                                  Available with Ubuntu Pro
  libnode72                       12.22.9~dfsg-1ubuntu3.6+esm2
                                  Available with Ubuntu Pro
  nodejs                          12.22.9~dfsg-1ubuntu3.6+esm2
                                  Available with Ubuntu Pro

Ubuntu 20.04 LTS
  libnode-dev                     10.19.0~dfsg-3ubuntu1.6+esm2
                                  Available with Ubuntu Pro
  libnode64                       10.19.0~dfsg-3ubuntu1.6+esm2
                                  Available with Ubuntu Pro
  nodejs                          10.19.0~dfsg-3ubuntu1.6+esm2
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  nodejs                          8.10.0~dfsg-2ubuntu0.4+esm6
                                  Available with Ubuntu Pro
  nodejs-dev                      8.10.0~dfsg-2ubuntu0.4+esm6
                                  Available with Ubuntu Pro

After a standard system update you need to restart Node.js to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7469-3
https://ubuntu.com/security/notices/USN-7469-2
https://ubuntu.com/security/notices/USN-7469-1
  CVE-2023-44487



[USN-7467-2] libxml2 vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7467-2
April 28, 2025

libxml2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in libxml2.

Software Description:
- libxml2: GNOME XML library

Details:

USN-7467-1 fixed several vulnerabilities in libxml2. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.

Original advisory details:

It was discovered that the libxml2 Python bindings incorrectly handled
certain return values. An attacker could possibly use this issue to cause
libxml2 to crash, resulting in a denial of service. (CVE-2025-32414)

It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause
libxml2 to crash, resulting in a denial of service. (CVE-2025-32415)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro
python-libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro
python3-libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libxml2 2.9.3+dfsg1-1ubuntu0.7+esm8
Available with Ubuntu Pro
python-libxml2 2.9.3+dfsg1-1ubuntu0.7+esm8
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7467-2
https://ubuntu.com/security/notices/USN-7467-1
CVE-2025-32414, CVE-2025-32415