--===============7506860708938801275== Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
--=-=-= Content-Type: text/plain
========================================================================== Ubuntu Security Notice USN-7475-1 May 02, 2025
linux-xilinx-zynqmp vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors
Details:
Jann Horn discovered that the watch_queue event notification subsystem in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or escalate their privileges. (CVE-2022-0995)
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - iSCSI Boot Firmware Table Attributes driver; - GPU drivers; - Network drivers; - File systems infrastructure; - NTFS3 file system; - SMB network file system; - Network namespace; - Ethernet bridge; - Networking core; - Ethtool driver; - IPv6 networking; - Network traffic control; - VMware vSockets driver; (CVE-2024-50248, CVE-2024-57798, CVE-2025-21702, CVE-2024-56651, CVE-2024-26837, CVE-2025-21703, CVE-2024-46826, CVE-2025-21700, CVE-2024-50256, CVE-2024-35864, CVE-2025-21756, CVE-2025-21993, CVE-2024-26928, CVE-2024-56658, CVE-2025-21701)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS linux-image-5.15.0-1046-xilinx-zynqmp 5.15.0-1046.50 linux-image-xilinx-zynqmp 5.15.0.1046.50
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-7475-1 CVE-2022-0995, CVE-2024-26837, CVE-2024-26928, CVE-2024-35864, CVE-2024-46826, CVE-2024-50248, CVE-2024-50256, CVE-2024-56651, CVE-2024-56658, CVE-2024-57798, CVE-2025-21700, CVE-2025-21701, CVE-2025-21702, CVE-2025-21703, CVE-2025-21756, CVE-2025-21993
Package Information: https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1046.50
--=-=-= Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmgUoLglHGdpYW1wYW9s by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92WxqatC/4/uGnj QCKKtj1weTQRxtp02BcQemMtul8uVGSyS+J+g6VhsbRmNbgj5kbZ/r8g/HCaHLIL L91NsV6caZ4RQbD9auzWv3bhd+JNWSkv0e3kdV8v6VzPSxKJ0wxHCH14GapHf6Wg QMUj6SKFRfFFZERqpyQFwrMXf70L0rTZ5HGf971wJgH4b/MxBgqQeBqELqzdyPpp fZnTptj3pEsV8ujB5nlHUqaQvIFIkJT53g9o5OE6LkFi/xuFE9cYasf8qXAG1rBm GXdJY+bMOPhqCROHcvx/GWNBFd4UTPOQucgvF+JB2ooPWhD2NTHG4NXJ+4d5YO4V 63YhFwpSo9ehlg+ubAvYoz6tBFtOa4lLxIgacZvQyKiuecy7XNYxX/w9iv4BE+xL Hzj6pffpT+rd/ZHTsFdAnoD2HFyVoC4zZxxcXw2KtLF9ceQb91lckmqsmoMCFdPy QzCRfvuB9eLSKPAZVUHVgUnHrnokwG5HISPscM7gWVwATWF2pQUEifyPrhs= =cnV2 -----END PGP SIGNATURE----- --=-=-=--
--===============7506860708938801275== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
--===============7506860708938801275==--
|