Thursday, April 2, 2026
[USN-8144-1] Undertow vulnerability
Ubuntu Security Notice USN-8144-1
April 02, 2026
undertow vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Undertow would allow unintended access to user sessions over the network.
Software Description:
- undertow: Java web server based on non-blocking IO
Details:
It was discovered that Undertow incorrectly validated the Host header in
incoming HTTP requests. A remote attacker could possibly use this issue
to gain unintended access to user sessions.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libundertow-java 2.3.8-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 22.04 LTS
libundertow-java 2.2.16-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libundertow-java 2.0.29-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libundertow-java 1.4.23-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libundertow-java 1.3.16-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8144-1
CVE-2025-12543
Wednesday, April 1, 2026
[USN-8143-1] Linux kernel vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnNi3oFAwAAAAAACgkQZ0GeRcM5nt1V
7gf/Y7MgZcGv8v4f+HkATqsfyQ95TRDfUoGdHGKSP4zUKyLTEYXezL/pjg/qpndXZnxVySyJL3/H
1rjqfEtEBhTOuBv84/Q14V+3w0il7RmNdDU88HbcxcaBJj8PrB0FHtiL657mlqsfeJIB9T3G8Ajd
OzrEvhYcL6BjC5H0OywENcWlU/WB2yHIjf52PbK3RT5TJHzsqW5LamRBcqGX6wl2JlODcIZVUKBV
lFI74kPXoNGQ/VnZM5H7YfVKJsXxeJWYYXcSwdrC9h3YR0n3IOLOORz9hPzct6pz6nM4LsUh0ntH
R7PoN/4zhdaqpoTuzEjXne9X9+HwJooj8jcCGoY2jA==
=xVcZ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8143-1
April 01, 2026
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-kvm: Linux kernel for cloud environments
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Cryptographic API;
- GPU drivers;
- BTRFS file system;
- GFS2 file system;
- UDF file system;
- NFC subsystem;
- Network traffic control;
(CVE-2021-47142, CVE-2021-47145, CVE-2021-47254, CVE-2024-46777,
CVE-2025-21735, CVE-2026-23060, CVE-2026-23074)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS
linux-image-4.4.0-1154-kvm 4.4.0-1154.165
Available with Ubuntu Pro
linux-image-4.4.0-1191-aws 4.4.0-1191.206
Available with Ubuntu Pro
linux-image-4.4.0-279-generic 4.4.0-279.313
Available with Ubuntu Pro
linux-image-4.4.0-279-lowlatency 4.4.0-279.313
Available with Ubuntu Pro
linux-image-aws 4.4.0.1191.195
Available with Ubuntu Pro
linux-image-generic 4.4.0.279.285
Available with Ubuntu Pro
linux-image-generic-lts-xenial 4.4.0.279.285
Available with Ubuntu Pro
linux-image-kvm 4.4.0.1154.151
Available with Ubuntu Pro
linux-image-lowlatency 4.4.0.279.285
Available with Ubuntu Pro
linux-image-lowlatency-lts-xenial 4.4.0.279.285
Available with Ubuntu Pro
linux-image-virtual 4.4.0.279.285
Available with Ubuntu Pro
linux-image-virtual-lts-xenial 4.4.0.279.285
Available with Ubuntu Pro
Ubuntu 14.04 LTS
linux-image-4.4.0-1153-aws 4.4.0-1153.159
Available with Ubuntu Pro
linux-image-4.4.0-279-generic 4.4.0-279.313~14.04.1+1
Available with Ubuntu Pro
linux-image-4.4.0-279-lowlatency 4.4.0-279.313~14.04.1+1
Available with Ubuntu Pro
linux-image-aws 4.4.0.1153.150
Available with Ubuntu Pro
linux-image-generic-lts-xenial 4.4.0.279.313~14.04.1
Available with Ubuntu Pro
linux-image-lowlatency-lts-xenial 4.4.0.279.313~14.04.1
Available with Ubuntu Pro
linux-image-virtual-lts-xenial 4.4.0.279.313~14.04.1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8143-1
CVE-2021-47142, CVE-2021-47145, CVE-2021-47254, CVE-2024-46777,
CVE-2025-21735, CVE-2026-23060, CVE-2026-23074
[USN-8142-1] Linux kernel vulnerability
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnNiIUFAwAAAAAACgkQZ0GeRcM5nt1K
8wgArauzk2MkwVknoS9JpY+Bsl9QQ7yDvZrKVpp8ae0pEcavN3k4gVYrzQBUNRsURGQDUU1zg50/
tlnpBy6scwhqKTVQ1ZAFdeK8EoYjqnU0aQ44efamAq0DSC+Bsvprse6+reEH5vccQ68XmwTzeZK3
A3mGZKzxXXwT7YHgo/t8FhfUrlhcLyNQbH4XcgZMBj6d2tK+/ZFEIP4gRp/1bWzEvnaUs/3yZ90w
SRQ1p17XXZkxr7LiUcybfOOSzs/9KyiXeUQHPSqSYJNYB0tR16pyG9si2eHnERxZsuL+4ABCClPK
EIqr3cv1FtGutXNbaB40cieekyWK2jBqSaBGEAQc7Q==
=0Ilh
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8142-1
April 01, 2026
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux: Linux kernel
Details:
A security issue was discovered in the Linux kernel.
An attacker could possibly use this to compromise the system.
This update corrects flaws in the following subsystems:
- Network traffic control;
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS
linux-image-3.13.0-212-generic 3.13.0-212.263
Available with Ubuntu Pro
linux-image-3.13.0-212-lowlatency 3.13.0-212.263
Available with Ubuntu Pro
linux-image-generic 3.13.0.212.222
Available with Ubuntu Pro
linux-image-generic-lts-trusty 3.13.0.212.222
Available with Ubuntu Pro
linux-image-lowlatency 3.13.0.212.222
Available with Ubuntu Pro
linux-image-server 3.13.0.212.222
Available with Ubuntu Pro
linux-image-virtual 3.13.0.212.222
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8142-1
CVE-2026-23074
[USN-8141-1] Linux kernel (Raspberry Pi) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnNecsFAwAAAAAACgkQZ0GeRcM5nt3O
9ggAtx/Ofpta4mt9sE7n7FT5eIUuCmOLgnl1fqiJiNvjW1eER/7AO5i6yr669t2EldkrDUl6S8Fe
e94ANWsVHja8FjPLHRO1ERvR5AqvVoHx3FI0TqKneDvzJvaKuAviCBdynaoPxD6uN9n5J+bhdtoG
ZL6bMmo6/buQkjuqljDPhmJMF3qB1SYJoe3s4iKYXRigvARSCtHWykrxPX+l2YDi14ZcJNyOab3Q
i9uEpWXbjzU64XcdJqIHe9lHbuVftCUbHQ2TvOfdHiGxwvzkAyIeyFJSkBE6dvSTBRET/GhYgF6Q
hFWlJj4rmyufbGH+8wxvUHlIfyAv0Wnw41Juc+c5Ww==
=ED3k
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8141-1
April 01, 2026
linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
Details:
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853, CVE-2026-23268, CVE-2026-23269)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Nios II architecture;
- PowerPC architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Character device driver;
- Hardware random number generator core;
- TPM device driver;
- Data acquisition framework and drivers;
- Counter interface drivers;
- CPU frequency scaling framework;
- DMA engine subsystem;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- Hardware monitoring drivers;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- ISDN/mISDN subsystem;
- Macintosh device drivers;
- Multiple devices driver;
- Media drivers;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- MediaTek network drivers;
- NVME drivers;
- PA-RISC drivers;
- PCI subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- Chrome hardware platform drivers;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PWM drivers;
- Voltage and Current Regulator drivers;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- SPI subsystem;
- Realtek RTL8723BS SDIO drivers;
- TCM subsystem;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- USB Type-C Connector System Software Interface driver;
- Backlight driver;
- Framebuffer layer;
- Watchdog drivers;
- BFS file system;
- BTRFS file system;
- File systems infrastructure;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- Journaling layer for block devices (JBD2);
- JFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- BPF subsystem;
- Ethernet bridge;
- Memory management;
- padata parallel execution mechanism;
- IP tunnels definitions;
- Network traffic control;
- Network sockets;
- XFRM subsystem;
- io_uring subsystem;
- Control group (cgroup);
- Locking primitives;
- Padata parallel execution mechanism;
- PID allocator;
- Scheduler infrastructure;
- Shadow Call Stack mechanism;
- Tracing infrastructure;
- 9P file system network protocol;
- Bluetooth subsystem;
- CAIF protocol;
- CAN network layer;
- Ceph Core library;
- Networking core;
- Ethtool driver;
- HSR network protocol;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NET/ROM layer;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- Rose network layer;
- SCTP protocol;
- Sun RPC protocol;
- TIPC protocol;
- Unix domain sockets;
- VMware vSockets driver;
- Wireless networking;
- Rust bindings mechanism;
- Integrity Measurement Architecture(IMA) framework;
- Key management;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- Turtle Beach Wavefront ALSA driver;
- Intel ASoC drivers;
- STMicroelectronics SoC drivers;
- USB sound devices;
(CVE-2022-49465, CVE-2022-49635, CVE-2024-36903, CVE-2024-36927,
CVE-2024-37354, CVE-2024-41014, CVE-2024-46830, CVE-2024-47666,
CVE-2024-49968, CVE-2024-53114, CVE-2024-56538, CVE-2024-58011,
CVE-2025-21780, CVE-2025-21861, CVE-2025-22022, CVE-2025-22058,
CVE-2025-22111, CVE-2025-22121, CVE-2025-23143, CVE-2025-38022,
CVE-2025-38129, CVE-2025-38236, CVE-2025-38248, CVE-2025-38556,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40040, CVE-2025-40042, CVE-2025-40043,
CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053,
CVE-2025-40055, CVE-2025-40060, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40078, CVE-2025-40081, CVE-2025-40083, CVE-2025-40085,
CVE-2025-40087, CVE-2025-40088, CVE-2025-40092, CVE-2025-40094,
CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40110,
CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116,
CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40124,
CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40134,
CVE-2025-40140, CVE-2025-40153, CVE-2025-40154, CVE-2025-40167,
CVE-2025-40171, CVE-2025-40173, CVE-2025-40178, CVE-2025-40179,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40194,
CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40211,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40252,
CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258,
CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263,
CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308,
CVE-2025-40309, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321,
CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68185, CVE-2025-68191,
CVE-2025-68192, CVE-2025-68194, CVE-2025-68200, CVE-2025-68204,
CVE-2025-68217, CVE-2025-68220, CVE-2025-68227, CVE-2025-68229,
CVE-2025-68238, CVE-2025-68241, CVE-2025-68244, CVE-2025-68245,
CVE-2025-68249, CVE-2025-68254, CVE-2025-68255, CVE-2025-68257,
CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266,
CVE-2025-68282, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286,
CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290,
CVE-2025-68295, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303,
CVE-2025-68308, CVE-2025-68312, CVE-2025-68321, CVE-2025-68325,
CVE-2025-68327, CVE-2025-68328, CVE-2025-68330, CVE-2025-68331,
CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337,
CVE-2025-68339, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349,
CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366,
CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68727,
CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68734,
CVE-2025-68740, CVE-2025-68746, CVE-2025-68757, CVE-2025-68758,
CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68767,
CVE-2025-68769, CVE-2025-68771, CVE-2025-68774, CVE-2025-68776,
CVE-2025-68777, CVE-2025-68780, CVE-2025-68782, CVE-2025-68783,
CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795,
CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800,
CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808,
CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816,
CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71064,
CVE-2025-71066, CVE-2025-71068, CVE-2025-71069, CVE-2025-71075,
CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081,
CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71085,
CVE-2025-71086, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093,
CVE-2025-71094, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098,
CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108,
CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114,
CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71121,
CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71132,
CVE-2025-71133, CVE-2025-71136, CVE-2025-71137, CVE-2025-71147,
CVE-2025-71154, CVE-2025-71180, CVE-2025-71182, CVE-2026-22976,
CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22982,
CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992,
CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23047)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
linux-image-5.15.0-1097-raspi 5.15.0-1097.100
linux-image-raspi 5.15.0.1097.95
linux-image-raspi-5.15 5.15.0.1097.95
linux-image-raspi-nolpae 5.15.0.1097.95
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8141-1
https://launchpad.net/bugs/2143853
CVE-2022-49465, CVE-2022-49635, CVE-2024-36903, CVE-2024-36927,
CVE-2024-37354, CVE-2024-41014, CVE-2024-46830, CVE-2024-47666,
CVE-2024-49968, CVE-2024-53114, CVE-2024-56538, CVE-2024-58011,
CVE-2025-21780, CVE-2025-21861, CVE-2025-22022, CVE-2025-22058,
CVE-2025-22111, CVE-2025-22121, CVE-2025-23143, CVE-2025-38022,
CVE-2025-38129, CVE-2025-38236, CVE-2025-38248, CVE-2025-38556,
CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876,
CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907,
CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934,
CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949,
CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994,
CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001,
CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030,
CVE-2025-40035, CVE-2025-40040, CVE-2025-40042, CVE-2025-40043,
CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053,
CVE-2025-40055, CVE-2025-40060, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40078, CVE-2025-40081, CVE-2025-40083, CVE-2025-40085,
CVE-2025-40087, CVE-2025-40088, CVE-2025-40092, CVE-2025-40094,
CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40110,
CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116,
CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40124,
CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40134,
CVE-2025-40140, CVE-2025-40153, CVE-2025-40154, CVE-2025-40167,
CVE-2025-40171, CVE-2025-40173, CVE-2025-40178, CVE-2025-40179,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40194,
CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40211,
CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223,
CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243,
CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40252,
CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258,
CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263,
CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272,
CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278,
CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282,
CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308,
CVE-2025-40309, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321,
CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342,
CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40349,
CVE-2025-40351, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68185, CVE-2025-68191,
CVE-2025-68192, CVE-2025-68194, CVE-2025-68200, CVE-2025-68204,
CVE-2025-68217, CVE-2025-68220, CVE-2025-68227, CVE-2025-68229,
CVE-2025-68238, CVE-2025-68241, CVE-2025-68244, CVE-2025-68245,
CVE-2025-68249, CVE-2025-68254, CVE-2025-68255, CVE-2025-68257,
CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266,
CVE-2025-68282, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286,
CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290,
CVE-2025-68295, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303,
CVE-2025-68308, CVE-2025-68312, CVE-2025-68321, CVE-2025-68325,
CVE-2025-68327, CVE-2025-68328, CVE-2025-68330, CVE-2025-68331,
CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337,
CVE-2025-68339, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349,
CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366,
CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68727,
CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68734,
CVE-2025-68740, CVE-2025-68746, CVE-2025-68757, CVE-2025-68758,
CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68767,
CVE-2025-68769, CVE-2025-68771, CVE-2025-68774, CVE-2025-68776,
CVE-2025-68777, CVE-2025-68780, CVE-2025-68782, CVE-2025-68783,
CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795,
CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800,
CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808,
CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816,
CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71064,
CVE-2025-71066, CVE-2025-71068, CVE-2025-71069, CVE-2025-71075,
CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081,
CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71085,
CVE-2025-71086, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093,
CVE-2025-71094, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098,
CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108,
CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114,
CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71121,
CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71132,
CVE-2025-71133, CVE-2025-71136, CVE-2025-71137, CVE-2025-71147,
CVE-2025-71154, CVE-2025-71180, CVE-2025-71182, CVE-2026-22976,
CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22982,
CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992,
CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23047,
CVE-2026-23268, CVE-2026-23269
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/5.15.0-1097.100
[USN-8095-5] Linux kernel (Raspberry Pi) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnNeYIFAwAAAAAACgkQZ0GeRcM5nt19
pwgAnTSjXJyr3V76NM95eoqpoERRcSrkfQDQ6EVR2N7RKx6YZERonX4TeM8pYPYJIjdkDhANvTlw
uUDFRW82JxBVovwbQO26S+S8sgEMfoRgE5G2H/kY1rqNOnOgHUV2aSh+5cjdomMUqVv+wc+eaHZt
qGKKaSreBsAMG20HExMmMQy/qmkymcUO/sgDzE0hQwU/TE4MK5GKWIIxuYCwU3PVRNauWU1X1Y26
yCObrghfSNDo0boSnYcgeEf1GE902/5Q83GpJQD9anT6N6q0ERo89qWcrn1hB8b18/HTFO8RglkX
PeEsO27+AnVeUc2a14Du2+vOb20mvploBp0cCV9Kpg==
=bCVN
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8095-5
April 01, 2026
linux-raspi, linux-raspi-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-raspi-realtime: Linux kernel for Raspberry Pi Real-time systems
Details:
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- MIPS architecture;
- Nios II architecture;
- PA-RISC architecture;
- RISC-V architecture;
- S390 architecture;
- Sun Sparc architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Xtensa architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- ATM drivers;
- Drivers core;
- Block device driver;
- Network block device driver;
- Bluetooth drivers;
- Bus devices;
- Hardware random number generator core;
- Character device driver;
- Data acquisition framework and drivers;
- CPU frequency scaling framework;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- DMA engine subsystem;
- ARM SCMI message protocol;
- EFI core;
- Intel Stratix 10 firmware drivers;
- GPU drivers;
- HID subsystem;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Miscellaneous) drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- ISDN/mISDN subsystem;
- Mailbox framework;
- Multiple devices driver;
- Media drivers;
- Fastrpc Driver;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Ethernet bonding driver;
- Network drivers;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- NVME drivers;
- PCI subsystem;
- PCCARD (PCMCIA/CardBus) bus subsystem;
- Performance monitor drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- ARM PM domains;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- PWM drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- TCM subsystem;
- Trusted Execution Environment drivers;
- TTY drivers;
- Userspace I/O drivers;
- Cadence USB3 driver;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- Xen hypervisor drivers;
- AFS file system;
- BTRFS file system;
- Ceph distributed file system;
- File systems infrastructure;
- EFI Variable file system;
- exFAT file system;
- Ext4 file system;
- F2FS file system;
- FUSE (File system in Userspace);
- GFS2 file system;
- HFS file system;
- HFS+ file system;
- HugeTLB file system;
- JFS file system;
- KERNFS file system;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- File system notification infrastructure;
- NTFS3 file system;
- OCFS2 file system;
- OrangeFS file system;
- Proc file system;
- Diskquota system;
- SMB network file system;
- SquashFS file system;
- UDF file system;
- XFS file system;
- Asynchronous Transfer Mode (ATM) subsystem;
- BPF subsystem;
- Mellanox drivers;
- NFS page cache wrapper;
- Memory management;
- Memory Management;
- Media input infrastructure;
- Bluetooth subsystem;
- IP tunnels definitions;
- Network traffic control;
- Rose network layer;
- Network sockets;
- io_uring subsystem;
- Control group (cgroup);
- Kernel crash support code;
- Kernel futex primitives;
- PID allocator;
- Scheduler infrastructure;
- Syscalls implementation;
- Timer subsystem;
- Tracing infrastructure;
- 9P file system network protocol;
- Amateur Radio drivers;
- B.A.T.M.A.N. meshing protocol;
- Ethernet bridge;
- Ceph Core library;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Multipath TCP;
- Netfilter;
- NFC subsystem;
- Open vSwitch;
- RF switch subsystem;
- SCTP protocol;
- SMC sockets;
- Sun RPC protocol;
- TIPC protocol;
- TLS protocol;
- VMware vSockets driver;
- Wireless networking;
- eXpress Data Path;
- XFRM subsystem;
- Integrity Measurement Architecture(IMA) framework;
- Intel ASoC drivers;
- QCOM ASoC drivers;
- USB sound devices;
(CVE-2025-21833, CVE-2025-22103, CVE-2025-22105, CVE-2025-22106,
CVE-2025-22107, CVE-2025-22113, CVE-2025-22121, CVE-2025-22124,
CVE-2025-22125, CVE-2025-23129, CVE-2025-23130, CVE-2025-23133,
CVE-2025-23143, CVE-2025-37860, CVE-2025-38105, CVE-2025-38502,
CVE-2025-38556, CVE-2025-38627, CVE-2025-38643, CVE-2025-38709,
CVE-2025-39678, CVE-2025-39697, CVE-2025-39805, CVE-2025-39806,
CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811,
CVE-2025-39812, CVE-2025-39813, CVE-2025-39815, CVE-2025-39817,
CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825,
CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829,
CVE-2025-39832, CVE-2025-39835, CVE-2025-39836, CVE-2025-39838,
CVE-2025-39839, CVE-2025-39841, CVE-2025-39842, CVE-2025-39843,
CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847,
CVE-2025-39848, CVE-2025-39849, CVE-2025-39850, CVE-2025-39851,
CVE-2025-39852, CVE-2025-39853, CVE-2025-39854, CVE-2025-39857,
CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864,
CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39870,
CVE-2025-39871, CVE-2025-39873, CVE-2025-39876, CVE-2025-39877,
CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885,
CVE-2025-39886, CVE-2025-39891, CVE-2025-39894, CVE-2025-39895,
CVE-2025-39897, CVE-2025-39899, CVE-2025-39901, CVE-2025-39902,
CVE-2025-39907, CVE-2025-39909, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39914, CVE-2025-39916, CVE-2025-39920, CVE-2025-39923,
CVE-2025-39927, CVE-2025-39929, CVE-2025-39931, CVE-2025-39932,
CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39940,
CVE-2025-39942, CVE-2025-39943, CVE-2025-39944, CVE-2025-39945,
CVE-2025-39947, CVE-2025-39948, CVE-2025-39949, CVE-2025-39950,
CVE-2025-39951, CVE-2025-39952, CVE-2025-39953, CVE-2025-39955,
CVE-2025-39957, CVE-2025-39961, CVE-2025-39965, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978,
CVE-2025-39980, CVE-2025-39981, CVE-2025-39982, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39991,
CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40000, CVE-2025-40001, CVE-2025-40006,
CVE-2025-40008, CVE-2025-40009, CVE-2025-40010, CVE-2025-40011,
CVE-2025-40013, CVE-2025-40016, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40024, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029,
CVE-2025-40030, CVE-2025-40031, CVE-2025-40032, CVE-2025-40033,
CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40047,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052,
CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057,
CVE-2025-40058, CVE-2025-40059, CVE-2025-40060, CVE-2025-40061,
CVE-2025-40062, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079,
CVE-2025-40080, CVE-2025-40081, CVE-2025-40083, CVE-2025-40084,
CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096,
CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103,
CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125,
CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134,
CVE-2025-40137, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40155, CVE-2025-40156, CVE-2025-40159,
CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167,
CVE-2025-40169, CVE-2025-40171, CVE-2025-40172, CVE-2025-40173,
CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40180,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192,
CVE-2025-40193, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198,
CVE-2025-40200, CVE-2025-40201, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40206, CVE-2025-40207, CVE-2025-40211, CVE-2025-40218,
CVE-2025-40219, CVE-2025-40220, CVE-2025-40221, CVE-2025-40223,
CVE-2025-40226, CVE-2025-40231, CVE-2025-40233, CVE-2025-40235,
CVE-2025-40237, CVE-2025-40238, CVE-2025-40240, CVE-2025-40242,
CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259,
CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264,
CVE-2025-40266, CVE-2025-40268, CVE-2025-40269, CVE-2025-40271,
CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,
CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281,
CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285,
CVE-2025-40286, CVE-2025-40287, CVE-2025-40288, CVE-2025-40289,
CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40301,
CVE-2025-40303, CVE-2025-40304, CVE-2025-40305, CVE-2025-40306,
CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,
CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319,
CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,
CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331,
CVE-2025-40333, CVE-2025-40337, CVE-2025-40339, CVE-2025-40341,
CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,
CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351,
CVE-2025-40353, CVE-2025-40358, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179,
CVE-2025-68180, CVE-2025-68183, CVE-2025-68184, CVE-2025-68185,
CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204,
CVE-2025-68208, CVE-2025-68213, CVE-2025-68214, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231,
CVE-2025-68233, CVE-2025-68235, CVE-2025-68237, CVE-2025-68238,
CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,
CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,
CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68310, CVE-2025-68311,
CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,
CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68734)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
linux-image-6.8.0-1050-raspi 6.8.0-1050.54
linux-image-6.8.0-2040-raspi-realtime 6.8.0-2040.41
Available with Ubuntu Pro
linux-image-raspi 6.8.0-1050.54
linux-image-raspi-6.8 6.8.0-1050.54
linux-image-raspi-realtime 6.8.0-2040.41
Available with Ubuntu Pro
linux-image-raspi-realtime-6.8 6.8.0-2040.41
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8095-5
https://ubuntu.com/security/notices/USN-8095-4
https://ubuntu.com/security/notices/USN-8095-3
https://ubuntu.com/security/notices/USN-8095-2
https://ubuntu.com/security/notices/USN-8095-1
https://launchpad.net/bugs/2143853
CVE-2025-21833, CVE-2025-22103, CVE-2025-22105, CVE-2025-22106,
CVE-2025-22107, CVE-2025-22113, CVE-2025-22121, CVE-2025-22124,
CVE-2025-22125, CVE-2025-23129, CVE-2025-23130, CVE-2025-23133,
CVE-2025-23143, CVE-2025-37860, CVE-2025-38105, CVE-2025-38502,
CVE-2025-38556, CVE-2025-38627, CVE-2025-38643, CVE-2025-38709,
CVE-2025-39678, CVE-2025-39697, CVE-2025-39805, CVE-2025-39806,
CVE-2025-39807, CVE-2025-39808, CVE-2025-39810, CVE-2025-39811,
CVE-2025-39812, CVE-2025-39813, CVE-2025-39815, CVE-2025-39817,
CVE-2025-39819, CVE-2025-39823, CVE-2025-39824, CVE-2025-39825,
CVE-2025-39826, CVE-2025-39827, CVE-2025-39828, CVE-2025-39829,
CVE-2025-39832, CVE-2025-39835, CVE-2025-39836, CVE-2025-39838,
CVE-2025-39839, CVE-2025-39841, CVE-2025-39842, CVE-2025-39843,
CVE-2025-39844, CVE-2025-39845, CVE-2025-39846, CVE-2025-39847,
CVE-2025-39848, CVE-2025-39849, CVE-2025-39850, CVE-2025-39851,
CVE-2025-39852, CVE-2025-39853, CVE-2025-39854, CVE-2025-39857,
CVE-2025-39860, CVE-2025-39861, CVE-2025-39863, CVE-2025-39864,
CVE-2025-39865, CVE-2025-39866, CVE-2025-39869, CVE-2025-39870,
CVE-2025-39871, CVE-2025-39873, CVE-2025-39876, CVE-2025-39877,
CVE-2025-39880, CVE-2025-39881, CVE-2025-39883, CVE-2025-39885,
CVE-2025-39886, CVE-2025-39891, CVE-2025-39894, CVE-2025-39895,
CVE-2025-39897, CVE-2025-39899, CVE-2025-39901, CVE-2025-39902,
CVE-2025-39907, CVE-2025-39909, CVE-2025-39911, CVE-2025-39913,
CVE-2025-39914, CVE-2025-39916, CVE-2025-39920, CVE-2025-39923,
CVE-2025-39927, CVE-2025-39929, CVE-2025-39931, CVE-2025-39932,
CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39940,
CVE-2025-39942, CVE-2025-39943, CVE-2025-39944, CVE-2025-39945,
CVE-2025-39947, CVE-2025-39948, CVE-2025-39949, CVE-2025-39950,
CVE-2025-39951, CVE-2025-39952, CVE-2025-39953, CVE-2025-39955,
CVE-2025-39957, CVE-2025-39961, CVE-2025-39965, CVE-2025-39967,
CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971,
CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978,
CVE-2025-39980, CVE-2025-39981, CVE-2025-39982, CVE-2025-39985,
CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39991,
CVE-2025-39992, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996,
CVE-2025-39998, CVE-2025-40000, CVE-2025-40001, CVE-2025-40006,
CVE-2025-40008, CVE-2025-40009, CVE-2025-40010, CVE-2025-40011,
CVE-2025-40013, CVE-2025-40016, CVE-2025-40020, CVE-2025-40021,
CVE-2025-40024, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029,
CVE-2025-40030, CVE-2025-40031, CVE-2025-40032, CVE-2025-40033,
CVE-2025-40035, CVE-2025-40036, CVE-2025-40037, CVE-2025-40038,
CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40047,
CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40052,
CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40057,
CVE-2025-40058, CVE-2025-40059, CVE-2025-40060, CVE-2025-40061,
CVE-2025-40062, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070,
CVE-2025-40071, CVE-2025-40077, CVE-2025-40078, CVE-2025-40079,
CVE-2025-40080, CVE-2025-40081, CVE-2025-40083, CVE-2025-40084,
CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092,
CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096,
CVE-2025-40099, CVE-2025-40100, CVE-2025-40101, CVE-2025-40103,
CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107,
CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112,
CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120,
CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125,
CVE-2025-40126, CVE-2025-40127, CVE-2025-40129, CVE-2025-40134,
CVE-2025-40137, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153,
CVE-2025-40154, CVE-2025-40155, CVE-2025-40156, CVE-2025-40159,
CVE-2025-40160, CVE-2025-40165, CVE-2025-40166, CVE-2025-40167,
CVE-2025-40169, CVE-2025-40171, CVE-2025-40172, CVE-2025-40173,
CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40180,
CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40192,
CVE-2025-40193, CVE-2025-40194, CVE-2025-40196, CVE-2025-40198,
CVE-2025-40200, CVE-2025-40201, CVE-2025-40204, CVE-2025-40205,
CVE-2025-40206, CVE-2025-40207, CVE-2025-40211, CVE-2025-40218,
CVE-2025-40219, CVE-2025-40220, CVE-2025-40221, CVE-2025-40223,
CVE-2025-40226, CVE-2025-40231, CVE-2025-40233, CVE-2025-40235,
CVE-2025-40237, CVE-2025-40238, CVE-2025-40240, CVE-2025-40242,
CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259,
CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264,
CVE-2025-40266, CVE-2025-40268, CVE-2025-40269, CVE-2025-40271,
CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277,
CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281,
CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285,
CVE-2025-40286, CVE-2025-40287, CVE-2025-40288, CVE-2025-40289,
CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40301,
CVE-2025-40303, CVE-2025-40304, CVE-2025-40305, CVE-2025-40306,
CVE-2025-40307, CVE-2025-40308, CVE-2025-40309, CVE-2025-40310,
CVE-2025-40311, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314,
CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319,
CVE-2025-40320, CVE-2025-40321, CVE-2025-40322, CVE-2025-40323,
CVE-2025-40324, CVE-2025-40328, CVE-2025-40329, CVE-2025-40331,
CVE-2025-40333, CVE-2025-40337, CVE-2025-40339, CVE-2025-40341,
CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346,
CVE-2025-40347, CVE-2025-40349, CVE-2025-40350, CVE-2025-40351,
CVE-2025-40353, CVE-2025-40358, CVE-2025-40360, CVE-2025-40363,
CVE-2025-68168, CVE-2025-68171, CVE-2025-68172, CVE-2025-68173,
CVE-2025-68176, CVE-2025-68177, CVE-2025-68178, CVE-2025-68179,
CVE-2025-68180, CVE-2025-68183, CVE-2025-68184, CVE-2025-68185,
CVE-2025-68190, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194,
CVE-2025-68198, CVE-2025-68200, CVE-2025-68201, CVE-2025-68204,
CVE-2025-68208, CVE-2025-68213, CVE-2025-68214, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68227, CVE-2025-68229, CVE-2025-68231,
CVE-2025-68233, CVE-2025-68235, CVE-2025-68237, CVE-2025-68238,
CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68246,
CVE-2025-68249, CVE-2025-68282, CVE-2025-68283, CVE-2025-68284,
CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288,
CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68297,
CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68305,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68310, CVE-2025-68311,
CVE-2025-68312, CVE-2025-68313, CVE-2025-68315, CVE-2025-68320,
CVE-2025-68321, CVE-2025-68322, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68734
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1050.54
https://launchpad.net/ubuntu/+source/linux-raspi-realtime/6.8.0-2040.41
[USN-8094-5] Linux kernel (Raspberry Pi) vulnerabilities
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmnNeVkFAwAAAAAACgkQZ0GeRcM5nt0a
qgf8DHi2Btd+4uroPnqIIyNZrnwPwh5jwZ2Ld3uSICuDURhxAKpTeBrqLszOosmoujmuMFpMkjV6
hw0esHyTXc5hh0tjc4fApd0VspXt3OrFIGRxhD5maPKMXjEp0e+zx99wCXoHpFfeZLJ5n6BdM/jV
JopnsnN7BpPEWbRrcotiupVvCWpCluaLPiQBWh3e2to1TdaOCodzuXeuJtKQG1J8v7NRlaj7BDDa
DJrwdhLU4lO6elmMqrd01QqSV0SgZGLxQFFswECaZeIZfl4SIq8jeqj7SQf93lP8qPM+u3vFJIp/
sBZbM4uyRi+Ke6/96KTdMSB9O8eVqt+LCh+0cUZEPA==
=tQhL
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-8094-5
April 01, 2026
linux-raspi vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-raspi: Linux kernel for Raspberry Pi systems
Details:
Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)
It was discovered that some AMD Zen 5 processors supporting RDSEED
instruction did not properly handle entropy, potentially resulting in the
consumption of insufficiently random values. A local attacker could
possibly use this issue to influence the values returned by the RDSEED
instruction causing loss of confidentiality and integrity. (CVE-2025-62626)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- S390 architecture;
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ATM drivers;
- Network block device driver;
- Bluetooth drivers;
- Data acquisition framework and drivers;
- Hardware crypto device drivers;
- Device frequency scaling framework;
- Intel Stratix 10 firmware drivers;
- GPIO subsystem;
- GPU drivers;
- Microsoft Hyper-V drivers;
- CoreSight HW tracing drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Input Device (Tablet) drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- Macintosh device drivers;
- Multiple devices driver;
- MOST (Media Oriented Systems Transport) drivers;
- MTD block device drivers;
- Network drivers;
- Mellanox network drivers;
- Texas Instruments network drivers;
- Ethernet team driver;
- MediaTek network drivers;
- NVME drivers;
- Pin controllers subsystem;
- x86 platform drivers;
- Voltage and Current Regulator drivers;
- Real Time Clock drivers;
- S/390 drivers;
- SCSI subsystem;
- Texas Instruments SoC drivers;
- SPI subsystem;
- Media Oriented Systems Transport (MOST) driver;
- Realtek RTL8723BS SDIO drivers;
- TCM subsystem;
- UFS subsystem;
- DesignWare USB3 driver;
- USB Gadget drivers;
- Renesas USBHS Controller drivers;
- USB Mass Storage drivers;
- USB Type-C Connector System Software Interface driver;
- Backlight driver;
- Framebuffer layer;
- AFS file system;
- BFS file system;
- BTRFS file system;
- EROFS file system;
- Ext4 file system;
- FAT file system;
- GFS2 file system;
- Journaling layer for block devices (JBD2);
- File systems infrastructure;
- Network file system (NFS) client;
- NTFS3 file system;
- OCFS2 file system;
- SMB network file system;
- XFS file system;
- BPF subsystem;
- MediaTek SoC drivers;
- Bluetooth subsystem;
- io_uring subsystem;
- Locking primitives;
- Scheduler infrastructure;
- Timer subsystem;
- Tracing infrastructure;
- Kexec HandOver (KHO);
- Memory management;
- Ceph Core library;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- Multipath TCP;
- Open vSwitch;
- Network traffic control;
- VMware vSockets driver;
- eXpress Data Path;
- Integrity Measurement Architecture(IMA) framework;
- Simplified Mandatory Access Control Kernel framework;
- FireWire sound drivers;
- HD-audio driver;
- Turtle Beach Wavefront ALSA driver;
- SoundWire (SDCA) ASoC drivers;
(CVE-2025-40246, CVE-2025-40247, CVE-2025-40248, CVE-2025-40249,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40255, CVE-2025-40257, CVE-2025-40258,
CVE-2025-40259, CVE-2025-40260, CVE-2025-40261, CVE-2025-40262,
CVE-2025-40263, CVE-2025-40264, CVE-2025-40265, CVE-2025-40266,
CVE-2025-40290, CVE-2025-40345, CVE-2025-68212, CVE-2025-68213,
CVE-2025-68214, CVE-2025-68215, CVE-2025-68217, CVE-2025-68218,
CVE-2025-68219, CVE-2025-68220, CVE-2025-68221, CVE-2025-68222,
CVE-2025-68223, CVE-2025-68225, CVE-2025-68227, CVE-2025-68228,
CVE-2025-68229, CVE-2025-68230, CVE-2025-68231, CVE-2025-68232,
CVE-2025-68233, CVE-2025-68234, CVE-2025-68235, CVE-2025-68236,
CVE-2025-68237, CVE-2025-68238, CVE-2025-68254, CVE-2025-68255,
CVE-2025-68256, CVE-2025-68257, CVE-2025-68258, CVE-2025-68259,
CVE-2025-68261, CVE-2025-68262, CVE-2025-68263, CVE-2025-68264,
CVE-2025-68265, CVE-2025-68266, CVE-2025-68281, CVE-2025-68282,
CVE-2025-68283, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286,
CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290,
CVE-2025-68292, CVE-2025-68293, CVE-2025-68294, CVE-2025-68295,
CVE-2025-68296, CVE-2025-68297, CVE-2025-68298, CVE-2025-68299,
CVE-2025-68300, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303,
CVE-2025-68304, CVE-2025-68305, CVE-2025-68306, CVE-2025-68307,
CVE-2025-68308, CVE-2025-68323, CVE-2025-68324, CVE-2025-68325,
CVE-2025-68326, CVE-2025-68327, CVE-2025-68328, CVE-2025-68329,
CVE-2025-68330, CVE-2025-68331, CVE-2025-68332, CVE-2025-68333,
CVE-2025-68334, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337,
CVE-2025-68338, CVE-2025-68339, CVE-2025-68340, CVE-2025-68341,
CVE-2025-68342, CVE-2025-68343, CVE-2025-68344, CVE-2025-68345,
CVE-2025-68346, CVE-2025-68347, CVE-2025-68348, CVE-2025-68349,
CVE-2025-68352, CVE-2025-68354, CVE-2025-68356, CVE-2025-68358,
CVE-2025-68359, CVE-2025-68360, CVE-2025-68361, CVE-2025-68362,
CVE-2025-68363, CVE-2025-68364, CVE-2025-68366, CVE-2025-68367,
CVE-2025-68369, CVE-2025-68370, CVE-2025-68371, CVE-2025-68372,
CVE-2025-68373, CVE-2025-68374, CVE-2025-68375, CVE-2025-68376,
CVE-2025-68378, CVE-2025-68379, CVE-2025-68380, CVE-2025-68724,
CVE-2025-68726, CVE-2025-68727, CVE-2025-68728, CVE-2025-68729,
CVE-2025-68730, CVE-2025-68732, CVE-2025-68733, CVE-2025-68735,
CVE-2025-68738, CVE-2025-68739, CVE-2025-68740, CVE-2025-68741,
CVE-2025-68742, CVE-2025-68743, CVE-2025-68744, CVE-2025-68746,
CVE-2025-68747, CVE-2025-68748, CVE-2025-68749, CVE-2025-68751,
CVE-2025-68752, CVE-2025-68753, CVE-2025-68754, CVE-2025-68755,
CVE-2025-68756, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759,
CVE-2025-68760, CVE-2025-68762, CVE-2025-68763, CVE-2025-68764,
CVE-2025-68765, CVE-2025-68766, CVE-2025-71128)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
linux-image-6.17.0-1010-raspi 6.17.0-1010.10
linux-image-raspi 6.17.0-1010.10
linux-image-raspi-6.17 6.17.0-1010.10
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-8094-5
https://ubuntu.com/security/notices/USN-8094-4
https://ubuntu.com/security/notices/USN-8094-3
https://ubuntu.com/security/notices/USN-8094-2
https://ubuntu.com/security/notices/USN-8094-1
https://launchpad.net/bugs/2143853
CVE-2025-40246, CVE-2025-40247, CVE-2025-40248, CVE-2025-40249,
CVE-2025-40250, CVE-2025-40251, CVE-2025-40252, CVE-2025-40253,
CVE-2025-40254, CVE-2025-40255, CVE-2025-40257, CVE-2025-40258,
CVE-2025-40259, CVE-2025-40260, CVE-2025-40261, CVE-2025-40262,
CVE-2025-40263, CVE-2025-40264, CVE-2025-40265, CVE-2025-40266,
CVE-2025-40290, CVE-2025-40345, CVE-2025-62626, CVE-2025-68212,
CVE-2025-68213, CVE-2025-68214, CVE-2025-68215, CVE-2025-68217,
CVE-2025-68218, CVE-2025-68219, CVE-2025-68220, CVE-2025-68221,
CVE-2025-68222, CVE-2025-68223, CVE-2025-68225, CVE-2025-68227,
CVE-2025-68228, CVE-2025-68229, CVE-2025-68230, CVE-2025-68231,
CVE-2025-68232, CVE-2025-68233, CVE-2025-68234, CVE-2025-68235,
CVE-2025-68236, CVE-2025-68237, CVE-2025-68238, CVE-2025-68254,
CVE-2025-68255, CVE-2025-68256, CVE-2025-68257, CVE-2025-68258,
CVE-2025-68259, CVE-2025-68261, CVE-2025-68262, CVE-2025-68263,
CVE-2025-68264, CVE-2025-68265, CVE-2025-68266, CVE-2025-68281,
CVE-2025-68282, CVE-2025-68283, CVE-2025-68284, CVE-2025-68285,
CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289,
CVE-2025-68290, CVE-2025-68292, CVE-2025-68293, CVE-2025-68294,
CVE-2025-68295, CVE-2025-68296, CVE-2025-68297, CVE-2025-68298,
CVE-2025-68299, CVE-2025-68300, CVE-2025-68301, CVE-2025-68302,
CVE-2025-68303, CVE-2025-68304, CVE-2025-68305, CVE-2025-68306,
CVE-2025-68307, CVE-2025-68308, CVE-2025-68323, CVE-2025-68324,
CVE-2025-68325, CVE-2025-68326, CVE-2025-68327, CVE-2025-68328,
CVE-2025-68329, CVE-2025-68330, CVE-2025-68331, CVE-2025-68332,
CVE-2025-68333, CVE-2025-68334, CVE-2025-68335, CVE-2025-68336,
CVE-2025-68337, CVE-2025-68338, CVE-2025-68339, CVE-2025-68340,
CVE-2025-68341, CVE-2025-68342, CVE-2025-68343, CVE-2025-68344,
CVE-2025-68345, CVE-2025-68346, CVE-2025-68347, CVE-2025-68348,
CVE-2025-68349, CVE-2025-68352, CVE-2025-68354, CVE-2025-68356,
CVE-2025-68358, CVE-2025-68359, CVE-2025-68360, CVE-2025-68361,
CVE-2025-68362, CVE-2025-68363, CVE-2025-68364, CVE-2025-68366,
CVE-2025-68367, CVE-2025-68369, CVE-2025-68370, CVE-2025-68371,
CVE-2025-68372, CVE-2025-68373, CVE-2025-68374, CVE-2025-68375,
CVE-2025-68376, CVE-2025-68378, CVE-2025-68379, CVE-2025-68380,
CVE-2025-68724, CVE-2025-68726, CVE-2025-68727, CVE-2025-68728,
CVE-2025-68729, CVE-2025-68730, CVE-2025-68732, CVE-2025-68733,
CVE-2025-68735, CVE-2025-68738, CVE-2025-68739, CVE-2025-68740,
CVE-2025-68741, CVE-2025-68742, CVE-2025-68743, CVE-2025-68744,
CVE-2025-68746, CVE-2025-68747, CVE-2025-68748, CVE-2025-68749,
CVE-2025-68751, CVE-2025-68752, CVE-2025-68753, CVE-2025-68754,
CVE-2025-68755, CVE-2025-68756, CVE-2025-68757, CVE-2025-68758,
CVE-2025-68759, CVE-2025-68760, CVE-2025-68762, CVE-2025-68763,
CVE-2025-68764, CVE-2025-68765, CVE-2025-68766, CVE-2025-71128
Package Information:
https://launchpad.net/ubuntu/+source/linux-raspi/6.17.0-1010.10
[USN-8138-1] tar-rs vulnerability
Ubuntu Security Notice USN-8138-1
April 01, 2026
rust-tar vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
tar-rs could be made to modify permissions on arbitrary directories.
Software Description:
- rust-tar: A tar archive reading/writing library for Rust
Details:
It was discovered that tar-rs incorrectly handled symlinks when unpacking a
tar archive. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
modify permissions of arbitrary directories outside the extraction root,
and possibly escalate privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
librust-tar-dev 0.4.43-4ubuntu0.1
Ubuntu 24.04 LTS
librust-tar-dev 0.4.40-1ubuntu0.1
Ubuntu 22.04 LTS
librust-tar+default-dev 0.4.37-3ubuntu0.1
librust-tar-dev 0.4.37-3ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8138-1
CVE-2026-33056
Package Information:
https://launchpad.net/ubuntu/+source/rust-tar/0.4.43-4ubuntu0.1
https://launchpad.net/ubuntu/+source/rust-tar/0.4.40-1ubuntu0.1
https://launchpad.net/ubuntu/+source/rust-tar/0.4.37-3ubuntu0.1
[USN-8139-1] cargo-c vulnerability
Ubuntu Security Notice USN-8139-1
April 01, 2026
rust-cargo-c vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
Summary:
cargo-c could be made to modify permissions on arbitrary directories.
Software Description:
- rust-cargo-c: Helper program to build and install c-like libraries
Details:
It was discovered that tar-rs embedded in cargo-c incorrectly handled
symlinks when unpacking a tar archive. If a user or automated system were
tricked into processing a specially crafted tar archive, a remote attacker
could use this issue to modify permissions of arbitrary directories outside
the extraction root, and possibly escalate privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
cargo-c 0.10.11-1ubuntu1.1
librust-cargo-c-dev 0.10.11-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8139-1
CVE-2026-33056
Package Information:
https://launchpad.net/ubuntu/+source/rust-cargo-c/0.10.11-1ubuntu1.1
[announce] NYC*BUG Tonight: Michael W Lucas
https://www.nycbug.org/streaming.html, and some local NYC people will be
watching at the Brass Monkey.
What's Changed Since The Last Time I Came this Way - a talk that was
supposed to be about OpenZFS, Michael W Lucas
2026-04-01 @ 18:45 local (22:45 UTC) - Backroom of Brass Monkey 55
Little West 12th St
Remote participation: Plans are to stream via NYC*BUG website. Q&A will
be via IRC on libera.chat channel #nycbug - please preface your
questions with '[Q]'.
Michael W Lucas and Allan Jude are busy working on a new OpenZFS book,
which means not only documenting everything that's changed in the last
12 years but discovering everything that they got wrong the first time.
The quest for accuracy has taken Lucas deep into mailing list archives,
Usenet, VAX installation manuals, the Kremlin's first Internet
connection, the United Nations' effort to merge the BSD projects, and
the ULTRIX and S51K filesystems, and left MWL more convinced than ever
that filesystems are nothing but a April Fools' prank. This hurriedly
conceived and hastily assembled talk will update you on new OpenZFS
features, but will also try to determine if it's a good prank–or not.
Michael W Lucas' name may ring a bell for some in the BSD community.
He's written several shelves of books. But for anyone who has seen him
speak in public during Ante COVID days, it was clear they are mere
transcriptions of his rambling presentations. For this NYC*BUG meeting,
he is unlikely to edit out any of his expected corny jokes we endure
during his conference presentations.
More likely, you know his name from his grotesque horror fiction. In the
same way his technical books are just transcriptions of his
presentations, his fictionaal horror is just a simple reflection of
someone who lives in a haunted house filled with (pet) rats in Detroit.
Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.
To get to the backroom, you must enter the front door, follow the long
bar on your left, and walk all the way to the back. At the rear of the
BrassMonkey, you will see an alcove for the 3 bathrooms our room is off
to your right.
_______________________________________________
announce mailing list
announce@lists.nycbug.org
https://lists.nycbug.org:8443/mailman/listinfo/announce
[USN-8137-1] Ruby vulnerability
Ubuntu Security Notice USN-8137-1
March 31, 2026
ruby2.3, ruby2.5, ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Ruby could be made to expose sensitive information.
Software Description:
- ruby3.3: Object-oriented scripting language
- ruby3.2: Object-oriented scripting language
- ruby3.0: Object-oriented scripting language
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language
Details:
It was discovered that the Ruby URI gem did not properly handle sensitive
information when combining URIs. A remote attacker could possibly use this
issue to leak authentication credentials.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libruby3.3 3.3.8-2ubuntu2.1
ruby3.3 3.3.8-2ubuntu2.1
Ubuntu 24.04 LTS
libruby3.2 3.2.3-1ubuntu0.24.04.7
ruby3.2 3.2.3-1ubuntu0.24.04.7
Ubuntu 22.04 LTS
libruby3.0 3.0.2-7ubuntu2.12
ruby3.0 3.0.2-7ubuntu2.12
Ubuntu 20.04 LTS
libruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro
ruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro
ruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3-tcltk 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8137-1
CVE-2025-61594
Package Information:
https://launchpad.net/ubuntu/+source/ruby3.3/3.3.8-2ubuntu2.1
https://launchpad.net/ubuntu/+source/ruby3.2/3.2.3-1ubuntu0.24.04.7
https://launchpad.net/ubuntu/+source/ruby3.0/3.0.2-7ubuntu2.12
[USN-8089-2] Go Networking vulnerabilities
Ubuntu Security Notice USN-8089-2
March 31, 2026
golang-golang-x-net-dev vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Go Networking
Software Description:
- golang-golang-x-net-dev: Supplementary Go networking development files
Details:
USN-8089-1 fixed vulnerabilities in Go Networking. This update provides
the corresponding update to code vendored in golang-golang-x-net-dev.
Original advisory details:
Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and
Kaan Onarlioglu discovered that servers using Go Networking could hang
during shutdown if preempted by a fatal error. An attacker could possibly
use this to cause a denial of service. This issue only affected Ubuntu
22.04 LTS. (CVE-2022-27664)
Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted
stream could cause excessive CPU usage in Go Networking's HPACK decoder. An
attacker could possibly use this to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-41723)
Mohammad Thoriq Aziz discovered that Go Networking did not properly
sanitize some text nodes. An attacker could possibly use this to execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978)
Sean Ng discovered an error in Go Networking's HTML tag handling. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-22872)
Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML
document could exhaust system resources on servers using Go Networking. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-47911)
Guido Vranken discovered that a maliciously crafted HTML document could put
servers using Go Networking into an infinite loop. An attacker could
possibly use this to cause a denial of service. (CVE-2025-58190)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
golang-go.net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
golang-go.net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
golang-go.net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8089-2
https://ubuntu.com/security/notices/USN-8089-1
CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978,
CVE-2025-22872, CVE-2025-47911, CVE-2025-58190
Tuesday, March 31, 2026
Fedora 44 Final Freeze Is Now In Effect
Today, 2026-03-31, is an important day on the Fedora Linux 44 schedule [1], with significant cut-offs.
Today we have the Final Freeze [2] which starts at 14:00 UTC. This means that only packages fixing accepted blocker or freeze exception bugs [3][4][5] will be marked as 'stable' and included in the Final composes. Other builds will remain in updates-testing until the Final release is approved. At that point, the final freeze is lifted and packages can move to the 'updates' repository. Pending updates will be pushed before final release as zero day updates.
Regards,
Patrik Polakovic
Fedora Release Engineering
[1] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
[2] https://fedoraproject.org/wiki/Milestone_freezes
[3] https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process
[4] https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process
[5] https://qa.fedoraproject.org/blockerbugs/milestone/f44/final/buglist