[USN-7455-5] Linux kernel (AWS) vulnerabilities
[USN-7423-2] GNU binutils vulnerabilities
[USN-7469-3] Node.js vulnerability
[USN-7467-2] libxml2 vulnerabilities
[USN-7455-5] Linux kernel (AWS) vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7455-5
April 29, 2025
linux-aws-5.15 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-aws-5.15: Linux kernel for Amazon Web Services (AWS) systems
Details:
Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- iSCSI Boot Firmware Table Attributes driver;
- Network drivers;
- File systems infrastructure;
- NTFS3 file system;
- Ethernet bridge;
- Ethtool driver;
- IPv6 networking;
- Network traffic control;
- VMware vSockets driver;
(CVE-2024-26837, CVE-2025-21993, CVE-2025-21702, CVE-2024-50248,
CVE-2024-46826, CVE-2024-50256, CVE-2025-21703, CVE-2025-21700,
CVE-2025-21756, CVE-2025-21701, CVE-2024-56651)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
linux-image-5.15.0-1082-aws 5.15.0-1082.89~20.04.1
linux-image-aws 5.15.0.1082.89~20.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7455-5
https://ubuntu.com/security/notices/USN-7455-4
https://ubuntu.com/security/notices/USN-7455-3
https://ubuntu.com/security/notices/USN-7455-2
https://ubuntu.com/security/notices/USN-7455-1
CVE-2022-0995, CVE-2024-26837, CVE-2024-46826, CVE-2024-50248,
CVE-2024-50256, CVE-2024-56651, CVE-2025-21700, CVE-2025-21701,
CVE-2025-21702, CVE-2025-21703, CVE-2025-21756, CVE-2025-21993
Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.15/5.15.0-1082.89~20.04.1
[USN-7423-2] GNU binutils vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7423-2
April 29, 2025
binutils vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in GNU binutils.
Software Description:
- binutils: GNU assembler, linker and binary utilities
Details:
USN-7423-1 fixed several vulnerabilities in GNU. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that GNU binutils incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash or execute
arbitrary code. (CVE-2025-0840)
It was discovered that GNU binutils incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a crash, expose
sensitive information or execute arbitrary code.
(CVE-2025-1153)
It was discovered that ld in GNU binutils incorrectly handled certain
files. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2025-1176)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
binutils 2.30-21ubuntu1~18.04.9+esm4
Available with Ubuntu Pro
binutils-multiarch 2.30-21ubuntu1~18.04.9+esm4
Available with Ubuntu Pro
Ubuntu 16.04 LTS
binutils 2.26.1-1ubuntu1~16.04.8+esm11
Available with Ubuntu Pro
binutils-multiarch 2.26.1-1ubuntu1~16.04.8+esm11
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7423-2
https://ubuntu.com/security/notices/USN-7423-1
CVE-2025-0840, CVE-2025-1153, CVE-2025-1176
[USN-7469-3] Node.js vulnerability
==========================================================================
Ubuntu Security Notice USN-7469-3
April 29, 2025
nodejs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Node.js could be made to crash if it received specially crafted network
traffic.
Software Description:
- nodejs: An open-source, cross-platform JavaScript runtime environment.
Details:
USN-7469-1 fixed a vulnerability in Apache Traffic Server. This update
provides the corresponding updates for Node.js.
Original advisory details:
It was discovered that Apache Traffic Server exhibited poor server
resource management in its HTTP/2 protocol. An attacker could possibly
use this issue to cause Apache Traffic Server to crash, resulting in
a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
libnode-dev 12.22.9~dfsg-1ubuntu3.6+esm2
Available with Ubuntu Pro
libnode72 12.22.9~dfsg-1ubuntu3.6+esm2
Available with Ubuntu Pro
nodejs 12.22.9~dfsg-1ubuntu3.6+esm2
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libnode-dev 10.19.0~dfsg-3ubuntu1.6+esm2
Available with Ubuntu Pro
libnode64 10.19.0~dfsg-3ubuntu1.6+esm2
Available with Ubuntu Pro
nodejs 10.19.0~dfsg-3ubuntu1.6+esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
nodejs 8.10.0~dfsg-2ubuntu0.4+esm6
Available with Ubuntu Pro
nodejs-dev 8.10.0~dfsg-2ubuntu0.4+esm6
Available with Ubuntu Pro
After a standard system update you need to restart Node.js to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7469-3
https://ubuntu.com/security/notices/USN-7469-2
https://ubuntu.com/security/notices/USN-7469-1
CVE-2023-44487
[USN-7467-2] libxml2 vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7467-2
April 28, 2025
libxml2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in libxml2.
Software Description:
- libxml2: GNOME XML library
Details:
USN-7467-1 fixed several vulnerabilities in libxml2. This update provides
the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that the libxml2 Python bindings incorrectly handled
certain return values. An attacker could possibly use this issue to cause
libxml2 to crash, resulting in a denial of service. (CVE-2025-32414)
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause
libxml2 to crash, resulting in a denial of service. (CVE-2025-32415)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro
python-libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro
python3-libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm3
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libxml2 2.9.3+dfsg1-1ubuntu0.7+esm8
Available with Ubuntu Pro
python-libxml2 2.9.3+dfsg1-1ubuntu0.7+esm8
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7467-2
https://ubuntu.com/security/notices/USN-7467-1
CVE-2025-32414, CVE-2025-32415