========================================================================== Ubuntu Security Notice USN-7159-5 January 06, 2025 linux-raspi-5.4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - ARM32 architecture; - ARM64 architecture; - S390 architecture; - x86 architecture; - Power management core; - GPU drivers; - InfiniBand drivers; - Network drivers; - S/390 drivers; - TTY drivers; - BTRFS file system; - EROFS file system; - F2FS file system; - File systems infrastructure; - BPF subsystem; - Socket messages infrastructure; - Bluetooth subsystem; - Ethernet bridge; - Networking core; - IPv4 networking; - SELinux security module; (CVE-2022-48938, CVE-2024-42156, CVE-2024-36953, CVE-2024-38538, CVE-2021-47501, CVE-2024-42068, CVE-2024-26947, CVE-2024-46724, CVE-2024-36968, CVE-2023-52497, CVE-2024-35951, CVE-2023-52488, CVE-2024-44940, CVE-2022-48733, CVE-2023-52498, CVE-2022-48943, CVE-2024-35904, CVE-2024-42077, CVE-2024-36938, CVE-2023-52639, CVE-2024-42240, CVE-2024-44942, CVE-2021-47076) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS linux-image-5.4.0-1120-raspi 5.4.0-1120.132~18.04.1 Available with Ubuntu Pro linux-image-raspi-hwe-18.04 5.4.0.1120.132~18.04.1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-7159-5 https://ubuntu.com/security/notices/USN-7159-4 https://ubuntu.com/security/notices/USN-7159-3 https://ubuntu.com/security/notices/USN-7159-2 https://ubuntu.com/security/notices/USN-7159-1 CVE-2021-47076, CVE-2021-47501, CVE-2022-48733, CVE-2022-48938, CVE-2022-48943, CVE-2023-52488, CVE-2023-52497, CVE-2023-52498, CVE-2023-52639, CVE-2024-26947, CVE-2024-35904, CVE-2024-35951, CVE-2024-36938, CVE-2024-36953, CVE-2024-36968, CVE-2024-38538, CVE-2024-42068, CVE-2024-42077, CVE-2024-42156, CVE-2024-42240, CVE-2024-44940, CVE-2024-44942, CVE-2024-46724