Monday, June 30, 2025

[USN-7604-2] Sudo vulnerability

==========================================================================
Ubuntu Security Notice USN-7604-2
June 30, 2025

sudo vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Sudo could be made to bypass host restrictions.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

USN-7604-1 fixed CVE-2025-32462 in sudo. This update provides the
corresponding fixes for Ubuntu 20.04 LTS, Ubuntu 18.04 LTS,
Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS.

Original advisory details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
sudo 1.8.31-1ubuntu1.5+esm1
Available with Ubuntu Pro
sudo-ldap 1.8.31-1ubuntu1.5+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
sudo 1.8.21p2-3ubuntu1.6+esm1
Available with Ubuntu Pro
sudo-ldap 1.8.21p2-3ubuntu1.6+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
sudo 1.8.16-0ubuntu1.10+esm3
Available with Ubuntu Pro
sudo-ldap 1.8.16-0ubuntu1.10+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
sudo 1.8.9p5-1ubuntu1.5+esm8
Available with Ubuntu Pro
sudo-ldap 1.8.9p5-1ubuntu1.5+esm8
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7604-2
https://ubuntu.com/security/notices/USN-7604-2
CVE-2025-32462

[USN-7606-1] Linux kernel (OEM) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhi2asFAwAAAAAACgkQZ0GeRcM5nt1t
PAgAkkhfx2s4Kj+G91WZ+XON5Ri7hkRwvBfcU3+TAE1XDGEjbH2No2t40im36b3VdKiAGtNE+eqH
boOgg6OdM0doqClVB/C8Xsur3N2uVLm23VL6BLaCExLjMHEvNIj4QuDFZQ+bRX2iXKBXqe1x6bHd
ngU6A0JEMwC2n4RpdzU0pb/F2yD16FXy+F/E6u/pEO1Ic70hCa+nUSSCA4/wteJwdcCqjpkj9dC6
IhuGIedLxgwBo77nT/W0KE6Lsj+6Cv0RUuptW89MLlIdu3TkgYu7rkKTHLM7bTiIg5KWFJcDGfOX
NR0O23/KGL7U/5ULhHqCHC+t/Mz9scHIrAPC4nFQog==
=pL7e
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7606-1
June 30, 2025

linux-oem-6.11 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oem-6.11: Linux kernel for OEM systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Compute Acceleration Framework;
- ACPI drivers;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bus devices;
- AMD CDX bus driver;
- Clock framework and drivers;
- DMA engine subsystem;
- DPLL subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Multiple devices driver;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- VideoCore services drivers;
- Thermal drivers;
- USB DSL drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C Connector System Software Interface driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- ACRN Hypervisor Service Module driver;
- W1 Dallas's 1-wire bus driver;
- 9P distributed file system;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Memory Management;
- Key Management;
- Memory management;
- Scheduler infrastructure;
- UProbes tracing;
- RDMA verbs API;
- SoC audio core drivers;
- BPF subsystem;
- Perf events;
- Kernel fork() syscall;
- Tracing infrastructure;
- Watch queue notification mechanism;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Switch device API;
- Wireless networking;
- eXpress Data Path;
- Key management;
- ALSA framework;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-22072, CVE-2025-22039, CVE-2025-22078, CVE-2025-21972,
CVE-2025-21989, CVE-2025-21919, CVE-2025-22030, CVE-2025-22084,
CVE-2025-22086, CVE-2025-21956, CVE-2025-21924, CVE-2025-22016,
CVE-2025-23138, CVE-2025-22059, CVE-2025-21928, CVE-2025-21906,
CVE-2025-21947, CVE-2025-21936, CVE-2025-21982, CVE-2025-38152,
CVE-2025-38049, CVE-2025-21974, CVE-2025-21962, CVE-2025-22075,
CVE-2025-21959, CVE-2025-22002, CVE-2025-22014, CVE-2025-21905,
CVE-2025-22044, CVE-2025-22000, CVE-2025-21925, CVE-2025-21944,
CVE-2025-21926, CVE-2025-21904, CVE-2024-58092, CVE-2025-21964,
CVE-2025-22009, CVE-2025-22083, CVE-2025-21992, CVE-2025-39778,
CVE-2025-22021, CVE-2025-22090, CVE-2025-21934, CVE-2025-22043,
CVE-2025-22027, CVE-2025-21951, CVE-2025-22019, CVE-2025-21908,
CVE-2025-22062, CVE-2025-22071, CVE-2025-21914, CVE-2025-21966,
CVE-2025-21984, CVE-2025-39735, CVE-2025-21912, CVE-2025-21979,
CVE-2025-22063, CVE-2025-37785, CVE-2025-22081, CVE-2025-22024,
CVE-2025-38637, CVE-2025-22070, CVE-2025-21911, CVE-2025-21935,
CVE-2024-58093, CVE-2025-21960, CVE-2025-21913, CVE-2025-21927,
CVE-2025-21977, CVE-2025-37843, CVE-2025-22055, CVE-2025-22035,
CVE-2025-21998, CVE-2025-22041, CVE-2025-21945, CVE-2025-22080,
CVE-2025-21963, CVE-2025-21994, CVE-2025-21957, CVE-2025-22079,
CVE-2025-22034, CVE-2025-21946, CVE-2025-22053, CVE-2025-22003,
CVE-2025-22042, CVE-2025-22023, CVE-2025-22020, CVE-2025-21910,
CVE-2025-22037, CVE-2025-22095, CVE-2025-22089, CVE-2025-21986,
CVE-2025-39688, CVE-2025-22040, CVE-2025-39728, CVE-2025-21981,
CVE-2025-21969, CVE-2025-21922, CVE-2025-22022, CVE-2025-23136,
CVE-2025-22058, CVE-2025-21970, CVE-2025-22050, CVE-2025-21978,
CVE-2025-21990, CVE-2025-22046, CVE-2025-21975, CVE-2025-21973,
CVE-2025-21916, CVE-2025-21991, CVE-2025-22007, CVE-2025-21937,
CVE-2025-22004, CVE-2025-21948, CVE-2025-22033, CVE-2025-22017,
CVE-2025-38575, CVE-2025-22097, CVE-2025-22066, CVE-2025-21999,
CVE-2025-21903, CVE-2025-21915, CVE-2025-21961, CVE-2025-21941,
CVE-2025-22064, CVE-2025-21968, CVE-2025-21980, CVE-2025-22010,
CVE-2025-38240, CVE-2025-38479, CVE-2025-22008, CVE-2025-21939,
CVE-2025-22045, CVE-2025-22068, CVE-2025-21893, CVE-2025-37889,
CVE-2024-53222, CVE-2025-22047, CVE-2025-22018, CVE-2025-22013,
CVE-2025-21920, CVE-2025-23134, CVE-2025-22025, CVE-2025-39989,
CVE-2025-22005, CVE-2025-22054, CVE-2025-22057, CVE-2025-22087,
CVE-2025-22088, CVE-2025-22056, CVE-2025-22060, CVE-2025-22015,
CVE-2025-37937, CVE-2025-22001, CVE-2025-21930, CVE-2025-21894,
CVE-2025-21943, CVE-2025-22028, CVE-2025-22032, CVE-2025-22065,
CVE-2025-21929, CVE-2025-21996, CVE-2025-22038, CVE-2025-21923,
CVE-2025-40114, CVE-2025-21967, CVE-2025-21995, CVE-2023-53034,
CVE-2025-21909, CVE-2025-21997, CVE-2025-21955, CVE-2025-21918,
CVE-2025-21917, CVE-2025-22073, CVE-2025-22011, CVE-2025-21950)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.11.0-1024-oem 6.11.0-1024.24
linux-image-oem-24.04b 6.11.0-1024.24

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7606-1
CVE-2023-53034, CVE-2024-53222, CVE-2024-58092, CVE-2024-58093,
CVE-2025-21893, CVE-2025-21894, CVE-2025-21903, CVE-2025-21904,
CVE-2025-21905, CVE-2025-21906, CVE-2025-21908, CVE-2025-21909,
CVE-2025-21910, CVE-2025-21911, CVE-2025-21912, CVE-2025-21913,
CVE-2025-21914, CVE-2025-21915, CVE-2025-21916, CVE-2025-21917,
CVE-2025-21918, CVE-2025-21919, CVE-2025-21920, CVE-2025-21922,
CVE-2025-21923, CVE-2025-21924, CVE-2025-21925, CVE-2025-21926,
CVE-2025-21927, CVE-2025-21928, CVE-2025-21929, CVE-2025-21930,
CVE-2025-21934, CVE-2025-21935, CVE-2025-21936, CVE-2025-21937,
CVE-2025-21939, CVE-2025-21941, CVE-2025-21943, CVE-2025-21944,
CVE-2025-21945, CVE-2025-21946, CVE-2025-21947, CVE-2025-21948,
CVE-2025-21950, CVE-2025-21951, CVE-2025-21955, CVE-2025-21956,
CVE-2025-21957, CVE-2025-21959, CVE-2025-21960, CVE-2025-21961,
CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21966,
CVE-2025-21967, CVE-2025-21968, CVE-2025-21969, CVE-2025-21970,
CVE-2025-21972, CVE-2025-21973, CVE-2025-21974, CVE-2025-21975,
CVE-2025-21977, CVE-2025-21978, CVE-2025-21979, CVE-2025-21980,
CVE-2025-21981, CVE-2025-21982, CVE-2025-21984, CVE-2025-21986,
CVE-2025-21989, CVE-2025-21990, CVE-2025-21991, CVE-2025-21992,
CVE-2025-21994, CVE-2025-21995, CVE-2025-21996, CVE-2025-21997,
CVE-2025-21998, CVE-2025-21999, CVE-2025-22000, CVE-2025-22001,
CVE-2025-22002, CVE-2025-22003, CVE-2025-22004, CVE-2025-22005,
CVE-2025-22007, CVE-2025-22008, CVE-2025-22009, CVE-2025-22010,
CVE-2025-22011, CVE-2025-22013, CVE-2025-22014, CVE-2025-22015,
CVE-2025-22016, CVE-2025-22017, CVE-2025-22018, CVE-2025-22019,
CVE-2025-22020, CVE-2025-22021, CVE-2025-22022, CVE-2025-22023,
CVE-2025-22024, CVE-2025-22025, CVE-2025-22027, CVE-2025-22028,
CVE-2025-22030, CVE-2025-22032, CVE-2025-22033, CVE-2025-22034,
CVE-2025-22035, CVE-2025-22037, CVE-2025-22038, CVE-2025-22039,
CVE-2025-22040, CVE-2025-22041, CVE-2025-22042, CVE-2025-22043,
CVE-2025-22044, CVE-2025-22045, CVE-2025-22046, CVE-2025-22047,
CVE-2025-22050, CVE-2025-22053, CVE-2025-22054, CVE-2025-22055,
CVE-2025-22056, CVE-2025-22057, CVE-2025-22058, CVE-2025-22059,
CVE-2025-22060, CVE-2025-22062, CVE-2025-22063, CVE-2025-22064,
CVE-2025-22065, CVE-2025-22066, CVE-2025-22068, CVE-2025-22070,
CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22075,
CVE-2025-22078, CVE-2025-22079, CVE-2025-22080, CVE-2025-22081,
CVE-2025-22083, CVE-2025-22084, CVE-2025-22086, CVE-2025-22087,
CVE-2025-22088, CVE-2025-22089, CVE-2025-22090, CVE-2025-22095,
CVE-2025-22097, CVE-2025-2312, CVE-2025-23134, CVE-2025-23136,
CVE-2025-23138, CVE-2025-37785, CVE-2025-37843, CVE-2025-37889,
CVE-2025-37937, CVE-2025-38049, CVE-2025-38152, CVE-2025-38240,
CVE-2025-38479, CVE-2025-38575, CVE-2025-38637, CVE-2025-39688,
CVE-2025-39728, CVE-2025-39735, CVE-2025-39778, CVE-2025-39989,
CVE-2025-40114

Package Information:
https://launchpad.net/ubuntu/+source/linux-oem-6.11/6.11.0-1024.24

[USN-7605-1] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhi2Y4FAwAAAAAACgkQZ0GeRcM5nt2I
dggAsNxjfZ2mmpPI8MWKg8ufRPrdx3rQMvmEZ6JJjriBQVdoDNvQzdyx1pjbDSk2Tk3U3x3FXWaZ
V4a8KQSHP7mDDgovTjSuoYYxREC1IhLILGBhDurqo1jnFttKYaG61Ff+Kz1DdhrtlkpVS+eYZ5/j
2r6JPHcm+mwpJkv+QnbIWmwlOSocgWXfBGLf/1WqOTIW1RpCrLliD7G1azzEe7U4VrhuwWoeQd4j
LYRgxbSzYjXL+TH+RQS4KaQ+BPGzYf7w9W0dPNssz1+eUWorvkyW46xgaeLloxnht7okCBdpbkBS
C0MAChq8DoUOXSQMbXxyVrhLtpR+DBI6L2lBtUMvXg==
=gEqx
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7605-1
June 30, 2025

linux, linux-aws, linux-gcp, linux-gcp-6.11, linux-hwe-6.11, linux-oracle,
linux-raspi, linux-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-gcp-6.11: Linux kernel for Google Cloud Platform (GCP) systems
- linux-hwe-6.11: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Compute Acceleration Framework;
- ACPI drivers;
- Ublk userspace block driver;
- Compressed RAM block device driver;
- Bus devices;
- AMD CDX bus driver;
- Clock framework and drivers;
- DMA engine subsystem;
- DPLL subsystem;
- Qualcomm firmware drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- IIO subsystem;
- InfiniBand drivers;
- Multiple devices driver;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- Pin controllers subsystem;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- VideoCore services drivers;
- Thermal drivers;
- USB DSL drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- USB Type-C Connector System Software Interface driver;
- Virtio Host (VHOST) subsystem;
- Framebuffer layer;
- ACRN Hypervisor Service Module driver;
- W1 Dallas's 1-wire bus driver;
- 9P distributed file system;
- File systems infrastructure;
- Ext4 file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) client;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- Proc file system;
- SMB network file system;
- Memory Management;
- Key Management;
- Memory management;
- Scheduler infrastructure;
- UProbes tracing;
- RDMA verbs API;
- SoC audio core drivers;
- BPF subsystem;
- Perf events;
- Kernel fork() syscall;
- Tracing infrastructure;
- Watch queue notification mechanism;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- Networking core;
- Devlink API;
- IPv4 networking;
- IPv6 networking;
- Logical Link layer;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Network traffic control;
- SCTP protocol;
- Switch device API;
- Wireless networking;
- eXpress Data Path;
- Key management;
- ALSA framework;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-21913, CVE-2025-22070, CVE-2025-21918, CVE-2025-21916,
CVE-2025-22090, CVE-2025-22040, CVE-2025-21972, CVE-2025-21920,
CVE-2025-22071, CVE-2025-21989, CVE-2025-22037, CVE-2025-22068,
CVE-2025-38049, CVE-2025-21980, CVE-2025-21956, CVE-2025-21962,
CVE-2025-21929, CVE-2025-37785, CVE-2025-37889, CVE-2025-21990,
CVE-2025-21966, CVE-2025-38240, CVE-2025-22058, CVE-2025-22072,
CVE-2025-22056, CVE-2025-21963, CVE-2025-23134, CVE-2025-22075,
CVE-2025-22054, CVE-2025-22064, CVE-2025-22027, CVE-2025-21927,
CVE-2025-21943, CVE-2025-22081, CVE-2025-21975, CVE-2025-39735,
CVE-2025-22088, CVE-2025-21996, CVE-2025-22009, CVE-2025-22000,
CVE-2025-21912, CVE-2025-21967, CVE-2025-21995, CVE-2025-21973,
CVE-2025-21908, CVE-2025-22047, CVE-2025-21930, CVE-2025-22078,
CVE-2025-21957, CVE-2025-22021, CVE-2025-22019, CVE-2025-21935,
CVE-2025-21951, CVE-2025-37937, CVE-2025-22043, CVE-2025-22057,
CVE-2025-21922, CVE-2025-22003, CVE-2025-21978, CVE-2025-22010,
CVE-2025-39989, CVE-2025-22034, CVE-2025-21986, CVE-2025-22016,
CVE-2025-21960, CVE-2025-22038, CVE-2025-21924, CVE-2025-22015,
CVE-2025-38152, CVE-2025-21939, CVE-2025-21917, CVE-2025-21974,
CVE-2025-22001, CVE-2025-22025, CVE-2025-22062, CVE-2025-21979,
CVE-2025-21911, CVE-2025-22045, CVE-2025-21914, CVE-2025-21937,
CVE-2025-22095, CVE-2025-21981, CVE-2025-22014, CVE-2025-21947,
CVE-2025-22007, CVE-2025-21925, CVE-2025-22089, CVE-2025-21923,
CVE-2025-38575, CVE-2025-22018, CVE-2025-22073, CVE-2025-21948,
CVE-2025-22080, CVE-2025-22053, CVE-2025-21903, CVE-2025-21969,
CVE-2025-21926, CVE-2025-21941, CVE-2025-40114, CVE-2025-22066,
CVE-2025-22017, CVE-2025-21945, CVE-2025-22065, CVE-2025-22086,
CVE-2025-22032, CVE-2025-22097, CVE-2025-22083, CVE-2025-22044,
CVE-2025-23136, CVE-2025-22046, CVE-2025-22041, CVE-2025-38479,
CVE-2025-21998, CVE-2025-22002, CVE-2025-39688, CVE-2025-22033,
CVE-2025-21970, CVE-2025-22022, CVE-2025-21936, CVE-2025-22050,
CVE-2025-21984, CVE-2025-21928, CVE-2025-38637, CVE-2025-22030,
CVE-2025-21915, CVE-2025-22013, CVE-2025-21997, CVE-2025-22059,
CVE-2025-21961, CVE-2025-21909, CVE-2025-21955, CVE-2025-39778,
CVE-2025-22055, CVE-2023-53034, CVE-2025-39728, CVE-2025-22020,
CVE-2025-22005, CVE-2025-22060, CVE-2025-21902, CVE-2025-22008,
CVE-2025-23138, CVE-2025-21991, CVE-2025-21999, CVE-2025-21982,
CVE-2024-58092, CVE-2025-21992, CVE-2025-22028, CVE-2025-22042,
CVE-2025-22087, CVE-2025-21894, CVE-2025-21934, CVE-2025-21893,
CVE-2025-22079, CVE-2025-22023, CVE-2025-21977, CVE-2024-58093,
CVE-2025-21904, CVE-2025-21910, CVE-2025-22024, CVE-2025-21964,
CVE-2025-21946, CVE-2025-21905, CVE-2025-22084, CVE-2025-21950,
CVE-2025-22011, CVE-2025-21968, CVE-2025-22035, CVE-2025-22004,
CVE-2025-21919, CVE-2025-22039, CVE-2025-22063, CVE-2024-53222,
CVE-2025-21944, CVE-2025-21959, CVE-2025-21994, CVE-2025-21906)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
linux-image-6.11.0-1011-realtime 6.11.0-1011.11
linux-image-6.11.0-1014-raspi 6.11.0-1014.14
linux-image-6.11.0-1015-aws 6.11.0-1015.16
linux-image-6.11.0-1016-gcp 6.11.0-1016.16
linux-image-6.11.0-1016-gcp-64k 6.11.0-1016.16
linux-image-6.11.0-1017-oracle 6.11.0-1017.18
linux-image-6.11.0-1017-oracle-64k 6.11.0-1017.18
linux-image-6.11.0-28-generic 6.11.0-28.28
linux-image-6.11.0-28-generic-64k 6.11.0-28.28
linux-image-aws 6.11.0-1015.16
linux-image-gcp 6.11.0-1016.16
linux-image-gcp-64k 6.11.0-1016.16
linux-image-generic 6.11.0-28.28
linux-image-generic-64k 6.11.0-28.28
linux-image-oracle 6.11.0-1017.18
linux-image-oracle-64k 6.11.0-1017.18
linux-image-raspi 6.11.0-1014.14
linux-image-realtime 6.11.0-1011.11
linux-image-virtual 6.11.0-28.28

Ubuntu 24.04 LTS
linux-image-6.11.0-1016-gcp 6.11.0-1016.16~24.04.1
linux-image-6.11.0-1016-gcp-64k 6.11.0-1016.16~24.04.1
linux-image-6.11.0-28-generic 6.11.0-28.28~24.04.1
linux-image-6.11.0-28-generic-64k 6.11.0-28.28~24.04.1
linux-image-gcp 6.11.0-1016.16~24.04.1
linux-image-gcp-64k 6.11.0-1016.16~24.04.1
linux-image-generic-64k-hwe-24.04 6.11.0-28.28~24.04.1
linux-image-generic-hwe-24.04 6.11.0-28.28~24.04.1
linux-image-virtual-hwe-24.04 6.11.0-28.28~24.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7605-1
CVE-2023-53034, CVE-2024-53222, CVE-2024-58092, CVE-2024-58093,
CVE-2025-21893, CVE-2025-21894, CVE-2025-21902, CVE-2025-21903,
CVE-2025-21904, CVE-2025-21905, CVE-2025-21906, CVE-2025-21908,
CVE-2025-21909, CVE-2025-21910, CVE-2025-21911, CVE-2025-21912,
CVE-2025-21913, CVE-2025-21914, CVE-2025-21915, CVE-2025-21916,
CVE-2025-21917, CVE-2025-21918, CVE-2025-21919, CVE-2025-21920,
CVE-2025-21922, CVE-2025-21923, CVE-2025-21924, CVE-2025-21925,
CVE-2025-21926, CVE-2025-21927, CVE-2025-21928, CVE-2025-21929,
CVE-2025-21930, CVE-2025-21934, CVE-2025-21935, CVE-2025-21936,
CVE-2025-21937, CVE-2025-21939, CVE-2025-21941, CVE-2025-21943,
CVE-2025-21944, CVE-2025-21945, CVE-2025-21946, CVE-2025-21947,
CVE-2025-21948, CVE-2025-21950, CVE-2025-21951, CVE-2025-21955,
CVE-2025-21956, CVE-2025-21957, CVE-2025-21959, CVE-2025-21960,
CVE-2025-21961, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964,
CVE-2025-21966, CVE-2025-21967, CVE-2025-21968, CVE-2025-21969,
CVE-2025-21970, CVE-2025-21972, CVE-2025-21973, CVE-2025-21974,
CVE-2025-21975, CVE-2025-21977, CVE-2025-21978, CVE-2025-21979,
CVE-2025-21980, CVE-2025-21981, CVE-2025-21982, CVE-2025-21984,
CVE-2025-21986, CVE-2025-21989, CVE-2025-21990, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21994, CVE-2025-21995, CVE-2025-21996,
CVE-2025-21997, CVE-2025-21998, CVE-2025-21999, CVE-2025-22000,
CVE-2025-22001, CVE-2025-22002, CVE-2025-22003, CVE-2025-22004,
CVE-2025-22005, CVE-2025-22007, CVE-2025-22008, CVE-2025-22009,
CVE-2025-22010, CVE-2025-22011, CVE-2025-22013, CVE-2025-22014,
CVE-2025-22015, CVE-2025-22016, CVE-2025-22017, CVE-2025-22018,
CVE-2025-22019, CVE-2025-22020, CVE-2025-22021, CVE-2025-22022,
CVE-2025-22023, CVE-2025-22024, CVE-2025-22025, CVE-2025-22027,
CVE-2025-22028, CVE-2025-22030, CVE-2025-22032, CVE-2025-22033,
CVE-2025-22034, CVE-2025-22035, CVE-2025-22037, CVE-2025-22038,
CVE-2025-22039, CVE-2025-22040, CVE-2025-22041, CVE-2025-22042,
CVE-2025-22043, CVE-2025-22044, CVE-2025-22045, CVE-2025-22046,
CVE-2025-22047, CVE-2025-22050, CVE-2025-22053, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058,
CVE-2025-22059, CVE-2025-22060, CVE-2025-22062, CVE-2025-22063,
CVE-2025-22064, CVE-2025-22065, CVE-2025-22066, CVE-2025-22068,
CVE-2025-22070, CVE-2025-22071, CVE-2025-22072, CVE-2025-22073,
CVE-2025-22075, CVE-2025-22078, CVE-2025-22079, CVE-2025-22080,
CVE-2025-22081, CVE-2025-22083, CVE-2025-22084, CVE-2025-22086,
CVE-2025-22087, CVE-2025-22088, CVE-2025-22089, CVE-2025-22090,
CVE-2025-22095, CVE-2025-22097, CVE-2025-2312, CVE-2025-23134,
CVE-2025-23136, CVE-2025-23138, CVE-2025-37785, CVE-2025-37889,
CVE-2025-37937, CVE-2025-38049, CVE-2025-38152, CVE-2025-38240,
CVE-2025-38479, CVE-2025-38575, CVE-2025-38637, CVE-2025-39688,
CVE-2025-39728, CVE-2025-39735, CVE-2025-39778, CVE-2025-39989,
CVE-2025-40114

Package Information:
https://launchpad.net/ubuntu/+source/linux/6.11.0-28.28
https://launchpad.net/ubuntu/+source/linux-aws/6.11.0-1015.16
https://launchpad.net/ubuntu/+source/linux-gcp/6.11.0-1016.16
https://launchpad.net/ubuntu/+source/linux-oracle/6.11.0-1017.18
https://launchpad.net/ubuntu/+source/linux-raspi/6.11.0-1014.14
https://launchpad.net/ubuntu/+source/linux-realtime/6.11.0-1011.11
https://launchpad.net/ubuntu/+source/linux-gcp-6.11/6.11.0-1016.16~24.04.1
https://launchpad.net/ubuntu/+source/linux-hwe-6.11/6.11.0-28.28~24.04.1

[USN-7595-5] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhi2XAFAwAAAAAACgkQZ0GeRcM5nt1/
1ggAmffIXNdmq8qGlgF/JLfmP+MksUlNFVDmCFxXEWCmIXSb5mozLPTmVoGMXmj8Tkt16dDUm7ln
/mBoA4EuR9oIpwnRYEIOIoMaYe6QCSFGPiBU+e9Zq1scWeyfStwl/potICfNQsrgoCvlh93vPTMF
l5YYl8i5B7aS2StERJxd1c6gYYKHvV/MraE+iDKrHnK7dLe2AmBumO/ZbdliCDqX5vVhEYzpa7IU
A3CLVQLD5XqNhTik8pWYdjqhWeHCJk9h7OQ6Vo4oBgqanmmyr0dXrDcN0QTB/PcPgl9iaTzkvhDe
aI8XjZZE1MXHvaVcYdeZNkRP1QYZaMM7yTTLvPIC+w==
=0ug+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7595-5
June 30, 2025

linux-gcp, linux-gcp-6.8 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gcp-6.8: Linux kernel for Google Cloud Platform (GCP) systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPIO subsystem;
- GPU drivers;
- InfiniBand drivers;
- IRQ chip drivers;
- Network drivers;
- Mellanox network drivers;
- i.MX PM domains;
- SCSI subsystem;
- USB Serial drivers;
- AFS file system;
- GFS2 file system;
- File systems infrastructure;
- File system notification infrastructure;
- Overlay file system;
- Proc file system;
- SMB network file system;
- Timer subsystem;
- Kernel CPU control infrastructure;
- Memory management;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Open vSwitch;
- Network traffic control;
- VMware vSockets driver;
(CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949,
CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676,
CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675,
CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668,
CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674,
CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682,
CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669,
CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1031-gcp 6.8.0-1031.33
linux-image-6.8.0-1031-gcp-64k 6.8.0-1031.33
linux-image-gcp-64k-lts-24.04 6.8.0-1031.33
linux-image-gcp-lts-24.04 6.8.0-1031.33

Ubuntu 22.04 LTS
linux-image-6.8.0-1031-gcp 6.8.0-1031.33~22.04.1
linux-image-6.8.0-1031-gcp-64k 6.8.0-1031.33~22.04.1
linux-image-gcp 6.8.0-1031.33~22.04.1
linux-image-gcp-64k 6.8.0-1031.33~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7595-5
https://ubuntu.com/security/notices/USN-7595-4
https://ubuntu.com/security/notices/USN-7595-3
https://ubuntu.com/security/notices/USN-7595-2
https://ubuntu.com/security/notices/USN-7595-1
CVE-2024-50157, CVE-2024-53124, CVE-2024-57924, CVE-2024-57948,
CVE-2024-57949, CVE-2024-57951, CVE-2024-57952, CVE-2025-21665,
CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669,
CVE-2025-21670, CVE-2025-21672, CVE-2025-21673, CVE-2025-21674,
CVE-2025-21675, CVE-2025-21676, CVE-2025-21678, CVE-2025-21680,
CVE-2025-21681, CVE-2025-21682, CVE-2025-21683, CVE-2025-21684,
CVE-2025-21689, CVE-2025-21690, CVE-2025-21691, CVE-2025-21692,
CVE-2025-21694, CVE-2025-21697, CVE-2025-21699, CVE-2025-21943,
CVE-2025-2312

Package Information:
https://launchpad.net/ubuntu/+source/linux-gcp/6.8.0-1031.33
https://launchpad.net/ubuntu/+source/linux-gcp-6.8/6.8.0-1031.33~22.04.1

[USN-7585-5] Linux kernel (HWE) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhi2VYFAwAAAAAACgkQZ0GeRcM5nt3G
6ggAq4wTY0adpmhm23dSW5RN9FqvBn9y7PTekiZV26z5Cn2ldkA55JE8jTTyU7noMlrhRS8d4vgD
ZYNwi5yxaHzxymr02f2yc4zkUNGWKzw3OhHGTbfPlSr4SZvr79CmKbb+G4Si5b37Uyhsnr+SgyWa
KKOOoYKZtD7Bk0Af2JVtTKW773L7bvu420Y0iy66fUnOe8iiUJC9sOgn1eDevAdEOKz1b5oDuWna
ooZ8Z0wmHpRTz8C3qr2gu9+os59GyQT11UoJVEd/pAnwRh8jwJ3/RRrSNyf60qGMdJm3dDH7vn3/
XWJJ0wN8OG9AMed06kNx1+khV2ybdxT7EVy4kWEvXA==
=xyHF
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7585-5
June 30, 2025

linux-hwe-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-hwe-5.4: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- PowerPC architecture;
- x86 architecture;
- iSCSI Boot Firmware Table Attributes driver;
- GPU drivers;
- HID subsystem;
- InfiniBand drivers;
- Media drivers;
- MemoryStick subsystem;
- Network drivers;
- NTB driver;
- PCI subsystem;
- SCSI subsystem;
- Thermal drivers;
- JFS file system;
- File systems infrastructure;
- Tracing infrastructure;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Bluetooth subsystem;
- IPv6 networking;
- Netfilter;
- Network traffic control;
- Sun RPC protocol;
- USB sound devices;
(CVE-2025-22007, CVE-2025-21959, CVE-2025-22021, CVE-2025-22063,
CVE-2025-22045, CVE-2024-58093, CVE-2022-49636, CVE-2025-22020,
CVE-2024-53168, CVE-2025-22071, CVE-2025-39735, CVE-2025-21991,
CVE-2025-21992, CVE-2025-21996, CVE-2025-22035, CVE-2023-53034,
CVE-2025-22054, CVE-2025-23136, CVE-2025-22073, CVE-2024-56551,
CVE-2025-22005, CVE-2025-37937, CVE-2021-47211, CVE-2025-22086,
CVE-2025-21956, CVE-2025-38637, CVE-2025-22004, CVE-2025-22018,
CVE-2025-22079, CVE-2025-21957, CVE-2025-21993)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-5.4.0-218-generic 5.4.0-218.238~18.04.1
Available with Ubuntu Pro
linux-image-5.4.0-218-lowlatency 5.4.0-218.238~18.04.1
Available with Ubuntu Pro
linux-image-generic-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-lowlatency-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-oem 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-oem-osp1 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-snapdragon-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro
linux-image-virtual-hwe-18.04 5.4.0.218.238~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7585-5
https://ubuntu.com/security/notices/USN-7585-4
https://ubuntu.com/security/notices/USN-7585-3
https://ubuntu.com/security/notices/USN-7585-2
https://ubuntu.com/security/notices/USN-7585-1
CVE-2021-47211, CVE-2022-49636, CVE-2023-53034, CVE-2024-53168,
CVE-2024-56551, CVE-2024-58093, CVE-2025-21956, CVE-2025-21957,
CVE-2025-21959, CVE-2025-21991, CVE-2025-21992, CVE-2025-21993,
CVE-2025-21996, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007,
CVE-2025-22018, CVE-2025-22020, CVE-2025-22021, CVE-2025-22035,
CVE-2025-22045, CVE-2025-22054, CVE-2025-22063, CVE-2025-22071,
CVE-2025-22073, CVE-2025-22079, CVE-2025-22086, CVE-2025-2312,
CVE-2025-23136, CVE-2025-37937, CVE-2025-38637, CVE-2025-39735

[USN-7604-1] Sudo vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7604-1
June 30, 2025

sudo vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Sudo.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

Rich Mirch discovered that Sudo incorrectly handled the host option. In
environments where per-host rules are configured in the sudoers file, a
local attacker could use this issue to bypass the host restrictions.
(CVE-2025-32462)

Rich Mirch discovered that Sudo incorrectly handled the chroot option. In
environments where the sudoers file is configured to allow the chroot
option, a local attacker could use this issue to run arbitrary commands as
root. This issue only applied to Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-32463)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
sudo 1.9.16p2-1ubuntu1.1
sudo-ldap 1.9.16p2-1ubuntu1.1

Ubuntu 24.10
sudo 1.9.15p5-3ubuntu5.24.10.1
sudo-ldap 1.9.15p5-3ubuntu5.24.10.1

Ubuntu 24.04 LTS
sudo 1.9.15p5-3ubuntu5.24.04.1
sudo-ldap 1.9.15p5-3ubuntu5.24.04.1

Ubuntu 22.04 LTS
sudo 1.9.9-1ubuntu2.5
sudo-ldap 1.9.9-1ubuntu2.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7604-1
CVE-2025-32462, CVE-2025-32463

Package Information:
https://launchpad.net/ubuntu/+source/sudo/1.9.16p2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/sudo/1.9.15p5-3ubuntu5.24.10.1
https://launchpad.net/ubuntu/+source/sudo/1.9.15p5-3ubuntu5.24.04.1
https://launchpad.net/ubuntu/+source/sudo/1.9.9-1ubuntu2.5

OpenBSD Errata: July 1, 2025 (xserver pledge)

Errata patches for X11 server and kernel pledge(2) have been released
for OpenBSD 7.6 and 7.7.

Binary updates for the amd64, arm64 and i386 platform are available
via the syspatch utility. Source code patches can be found on the
respective errata page:

https://www.openbsd.org/errata76.html
https://www.openbsd.org/errata77.html

Ubuntu 24.10 (Oracular Oriole) reaches End of Life on 10th July 2025

Ubuntu announced its 24.10 (Oracular Oriole) release almost 9 months
ago, on 10th October 2024 and its support period is now nearing its
end. Ubuntu 24.10 will reach end of life on 10th July 2025.

At that time, Ubuntu Security Notices will no longer include
information or updated packages for Ubuntu 24.10.

The supported upgrade path from Ubuntu 24.10 is to Ubuntu 25.04
Instructions and caveats for the upgrade may be found at:

https://help.ubuntu.com/community/PluckyUpgrades

Ubuntu 25.04 continues to be actively supported with security updates
and select high-impact bug fixes. Announcements of security updates
for Ubuntu releases are sent to the ubuntu-security-announce mailing
list, information about which may be found at:

https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Since its launch in October 2004, Ubuntu has become one of the most
highly regarded Linux distributions with millions of users in homes,
schools, businesses and governments around the world. Ubuntu is Open
Source software, costs nothing to download, and users are free to
customise or alter their software in order to meet their needs.


On behalf of the Ubuntu Release Team,
Utkarsh Gupta

--
ubuntu-announce mailing list
ubuntu-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-announce

[USN-7582-2] Samba regression

==========================================================================
Ubuntu Security Notice USN-7582-2
June 30, 2025

samba regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

USN-7582-1 introduced a regression in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-7582-1 fixed vulnerabilities in Samba. The update introduced a
regression. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Evgeny Legerov discovered that Samba incorrectly handled buffers in
certain GSSAPI routines of Heimdal. A remote attacker could possibly use
this issue to cause Samba to crash, resulting in a denial of service.
(CVE-2022-3437)

Greg Hudson discovered that Samba incorrectly handled PAC parsing. On
32-bit systems, a remote attacker could use this issue to escalate
privileges, or possibly execute arbitrary code. (CVE-2022-42898)

Joseph Sutton discovered that Samba could be forced to issue rc4-hmac
encrypted Kerberos tickets. A remote attacker could possibly use this
issue to escalate privileges. This issue only affected Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2022-45141)

Florent Saudel discovered that Samba incorrectly handled certain Spotlight
requests. A remote attacker could possibly use this issue to cause Samba
to consume resources, leading to a denial of service. (CVE-2023-34966)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.29+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.16.04.34+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm14
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7582-2
https://ubuntu.com/security/notices/USN-7582-1
https://launchpad.net/bugs/2115450

Sunday, June 29, 2025

Datacenter Move this week (2025-06-30 to 2025-07-04)

The datacenter move is upon us!

As outlined in https://communityblog.fedoraproject.org/less-than-2-weeks-until-the-datacenter-move/
Many contributor facing applications will be down on Monday and Tuesday
and hopefully back up by mid week.

Contributors are advised to just work on tasks that don't require access
to infrastructure applications ( local git/packaging work, advocacy,
etc) on Monday and Tuesday.

By mid week we hope to be back up and will start accepting reports of
any issues still occuring.

Watch https://www.fedorastatus.org for updates.

Thanks in advance for your patience.

kevin
--
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Datacenter Move this week (2025-06-30 to 2025-07-04)

Greetings.

Just providing a notice here that we are going to be moving applications
and services in the coming week to our new datacenter.

We expect that end user services like mirrorlists (for dnf update),
docs, downloads will continue to be available as normal.

Contributor applications will be down monday/tuesday
and back by mid week. More details on that have been shared
to the devel announce list and https://communityblog.fedoraproject.org/

Watch https://www.fedorastatus.org for updates.

Thanks for your patience,

kevin
--
_______________________________________________
announce mailing list -- announce@lists.fedoraproject.org
To unsubscribe send an email to announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Thursday, June 26, 2025

[USN-7599-2] pip vulnerability

==========================================================================
Ubuntu Security Notice USN-7599-2
June 26, 2025

python-pip vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

pip could be made to expose sensitive information over the network.

Software Description:
- python-pip: Python package installer

Details:

USN-7599-1 fixed vulnerabilities in python-urllib3. This update provides
the corresponding update for python-pip for CVE-2025-50181.

Original advisory details:

Jacob Sandum discovered that urllib3 handled redirects even when they were
explicitly disabled while using the PoolManager. An attacker could possibly
use this issue to obtain sensitive information. (CVE-2025-50181)

Illia Volochii discovered that urllib3 incorrectly handled retry and
redirect parameters when using Node.js. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected Ubuntu
25.04. (CVE-2025-50182)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
python3-pip 25.0+dfsg-1ubuntu0.1

Ubuntu 24.10
python3-pip 24.2+dfsg-1ubuntu0.2

Ubuntu 24.04 LTS
python3-pip 24.0+dfsg-1ubuntu1.2

Ubuntu 22.04 LTS
python3-pip 22.0.2+dfsg-1ubuntu0.6

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7599-2
https://ubuntu.com/security/notices/USN-7599-2
CVE-2025-50181

Package Information:
https://launchpad.net/ubuntu/+source/python-pip/25.0+dfsg-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python-pip/24.2+dfsg-1ubuntu0.2
https://launchpad.net/ubuntu/+source/python-pip/24.0+dfsg-1ubuntu1.2
https://launchpad.net/ubuntu/+source/python-pip/22.0.2+dfsg-1ubuntu0.6

[USN-7600-1] libxslt vulnerability

==========================================================================
Ubuntu Security Notice USN-7600-1
June 26, 2025

libxslt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

libxslt could be made to expose sensitive information.

Software Description:
- libxslt: XSLT processing library

Details:

It was discovered that libxslt could be made to expose sensitive
information about address space layout. An attacker could possibly use this
issue to bypass Address Space Layout Randomization (ASLR) protections.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
libxslt1.1 1.1.34-4ubuntu0.22.04.4
xsltproc 1.1.34-4ubuntu0.22.04.4

Ubuntu 20.04 LTS
libxslt1.1 1.1.34-4ubuntu0.20.04.3+esm1
Available with Ubuntu Pro
xsltproc 1.1.34-4ubuntu0.20.04.3+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libxslt1.1 1.1.29-5ubuntu0.3+esm1
Available with Ubuntu Pro
xsltproc 1.1.29-5ubuntu0.3+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libxslt1.1 1.1.28-2.1ubuntu0.3+esm2
Available with Ubuntu Pro
xsltproc 1.1.28-2.1ubuntu0.3+esm2
Available with Ubuntu Pro

Ubuntu 14.04 LTS
libxslt1.1 1.1.28-2ubuntu0.2+esm3
Available with Ubuntu Pro
xsltproc 1.1.28-2ubuntu0.2+esm3
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7600-1
CVE-2023-40403

Package Information:
https://launchpad.net/ubuntu/+source/libxslt/1.1.34-4ubuntu0.22.04.4

[USN-7601-1] libarchive vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7601-1
June 26, 2025

libarchive vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in libarchive.

Software Description:
- libarchive: Library to read/write archive files

Details:

It was discovered that libarchive incorrectly handled certain RAR archive
files. An attacker could possibly use this issue to execute arbitrary
code or cause a denial of service. (CVE-2025-5914)

It was discovered that libarchive incorrectly handled certain RAR archive
files. An attacker could possibly use this issue to read sensitive data
or cause a denial of service. (CVE-2025-5915)

It was discovered that libarchive incorrectly handled certain WARC
archive files. If a user or automated system were tricked into processing
a specially crafted WARC archive, an attacker could use this issue to
cause libarchive to crash, resulting in a denial of service.
(CVE-2025-5916)

It was discovered that libarchive incorrectly handled certain file names
when handling prefixes and suffixes. An attacker could possibly use this
issue to cause libarchive to crash, resulting in a denial of service.
(CVE-2025-5917)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
libarchive13t64 3.7.7-0ubuntu2.3

Ubuntu 24.10
libarchive13t64 3.7.4-1ubuntu0.3

Ubuntu 24.04 LTS
libarchive13t64 3.7.2-2ubuntu0.5

Ubuntu 22.04 LTS
libarchive13 3.6.0-1ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7601-1
CVE-2025-5914, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917

Package Information:
https://launchpad.net/ubuntu/+source/libarchive/3.7.7-0ubuntu2.3
https://launchpad.net/ubuntu/+source/libarchive/3.7.4-1ubuntu0.3
https://launchpad.net/ubuntu/+source/libarchive/3.7.2-2ubuntu0.5
https://launchpad.net/ubuntu/+source/libarchive/3.6.0-1ubuntu1.5

[USN-7594-2] Linux kernel (Azure) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB4BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhdQgYFAwAAAAAACgkQZ0GeRcM5nt3H
1wf3VMd+eNnKd4q2NuQxB/u5V13W0XhHyDhJZITmcZw0ArS8NEtvhQGkY5v1PGT1FRamNEw05ogx
slChdcyBrRfQRhLMdSxOmnwKW102b25XtFkDetHV0mxuF1WB8aPFhBwDFGcXcG/8EBEboHNbZpuy
1nOAwKwLqe/we7FAExxcXygPFy04ykACdayYhOqSKT6Oo1FokCNEvZ4mBQGMX+RwcnvQQxiK/+eN
GSPvmEGMK6PW0ufQCZnkICFkEuMetVna6EE6TznV/uQAkNcWYfKmYvMhpM/ZYJTu48Mn93GSecs3
yZcsIho4W0hRL+Jln0tGAgOY4QOnQi7ZEx/joua8
=3/hZ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7594-2
June 26, 2025

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM32 architecture;
- ARM64 architecture;
- PowerPC architecture;
- RISC-V architecture;
- User-Mode Linux (UML);
- x86 architecture;
- Block layer subsystem;
- Cryptographic API;
- Compute Acceleration Framework;
- ACPI drivers;
- Serial ATA and Parallel ATA drivers;
- Drivers core;
- Ublk userspace block driver;
- Bluetooth drivers;
- Bus devices;
- TPM device driver;
- Clock framework and drivers;
- CPU frequency scaling framework;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- HSI subsystem;
- I2C subsystem;
- I3C subsystem;
- IIO subsystem;
- InfiniBand drivers;
- IOMMU subsystem;
- IRQ chip drivers;
- MCB driver;
- Multiple devices driver;
- Media drivers;
- MemoryStick subsystem;
- Multifunction device drivers;
- Microchip PCI driver;
- Intel Management Engine Interface driver;
- PCI Endpoint Test driver;
- MTD block device drivers;
- Network drivers;
- Ethernet bonding driver;
- Mellanox network drivers;
- STMicroelectronics network drivers;
- NTB driver;
- NVME drivers;
- PCI subsystem;
- Synopsys DesignWare PCIe PMU;
- Mellanox platform drivers;
- PWM drivers;
- Remote Processor subsystem;
- S/390 drivers;
- SCSI subsystem;
- Samsung SoC drivers;
- SPI subsystem;
- GPIB drivers;
- VideoCore services drivers;
- Thermal drivers;
- TTY drivers;
- UFS subsystem;
- Cadence USB3 driver;
- ChipIdea USB driver;
- USB Device Class drivers;
- DesignWare USB3 driver;
- USB Gadget drivers;
- USB Host Controller drivers;
- USB Type-C support driver;
- Virtio Host (VHOST) subsystem;
- Backlight driver;
- Framebuffer layer;
- W1 Dallas's 1-wire bus driver;
- 9P distributed file system;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file systems library;
- Network file system (NFS) server daemon;
- NTFS3 file system;
- Overlay file system;
- SMB network file system;
- Ethernet bridge;
- io_uring subsystem;
- Perf events;
- Memory management;
- UProbes tracing;
- Amateur Radio drivers;
- SCTP protocol;
- Network sockets;
- RDMA verbs API;
- BPF subsystem;
- Kernel fork() syscall;
- Hibernation control;
- Scheduler infrastructure;
- Tracing infrastructure;
- Watch queue notification mechanism;
- Vector I/O iterator library;
- 802.1Q VLAN protocol;
- 9P file system network protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- Networking core;
- Distributed Switch Architecture;
- Ethtool driver;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- Multipath TCP;
- Netfilter;
- Open vSwitch;
- Network traffic control;
- TIPC protocol;
- TLS protocol;
- Wireless networking;
- ALSA framework;
- WCD audio codecs;
- SoC Audio for Freescale CPUs drivers;
- SoC Audio generic drivers;
- Intel ASoC drivers;
- QCOM ASoC drivers;
- Virtio sound driver;
- CPU Power monitoring subsystem;
(CVE-2025-37806, CVE-2025-22084, CVE-2025-39688, CVE-2025-22030,
CVE-2025-37754, CVE-2025-37783, CVE-2025-37825, CVE-2025-37752,
CVE-2025-22104, CVE-2025-40014, CVE-2025-22103, CVE-2025-37874,
CVE-2025-37773, CVE-2025-37741, CVE-2025-37763, CVE-2025-37859,
CVE-2025-37779, CVE-2025-23155, CVE-2025-23143, CVE-2025-37788,
CVE-2025-22028, CVE-2024-58096, CVE-2025-37842, CVE-2025-37854,
CVE-2025-38637, CVE-2024-58097, CVE-2023-53034, CVE-2025-37797,
CVE-2025-37851, CVE-2025-37941, CVE-2025-37942, CVE-2025-37748,
CVE-2025-37982, CVE-2025-22058, CVE-2025-37781, CVE-2025-23130,
CVE-2025-23149, CVE-2025-23146, CVE-2025-37809, CVE-2025-37801,
CVE-2025-22080, CVE-2025-23160, CVE-2025-37823, CVE-2025-37827,
CVE-2025-39755, CVE-2025-22124, CVE-2025-22033, CVE-2025-22075,
CVE-2025-37850, CVE-2025-37757, CVE-2025-22060, CVE-2025-37979,
CVE-2025-22098, CVE-2025-39989, CVE-2025-37989, CVE-2025-37790,
CVE-2025-37885, CVE-2025-37875, CVE-2025-22066, CVE-2025-37975,
CVE-2025-37819, CVE-2025-37755, CVE-2025-37794, CVE-2025-23148,
CVE-2025-22067, CVE-2025-22061, CVE-2025-22109, CVE-2025-37884,
CVE-2025-37852, CVE-2025-37866, CVE-2025-37872, CVE-2025-37751,
CVE-2025-23156, CVE-2025-22065, CVE-2025-37837, CVE-2025-22069,
CVE-2025-37822, CVE-2025-22128, CVE-2025-22087, CVE-2025-22023,
CVE-2025-22038, CVE-2025-22096, CVE-2025-22076, CVE-2025-22045,
CVE-2025-38049, CVE-2025-37870, CVE-2025-37939, CVE-2025-37865,
CVE-2025-37860, CVE-2025-37771, CVE-2025-23144, CVE-2025-22081,
CVE-2025-39778, CVE-2025-23153, CVE-2025-22036, CVE-2025-23154,
CVE-2025-22101, CVE-2025-37808, CVE-2025-37772, CVE-2025-22070,
CVE-2025-37789, CVE-2025-22025, CVE-2025-22019, CVE-2025-37868,
CVE-2025-22083, CVE-2025-22095, CVE-2025-23161, CVE-2025-22027,
CVE-2025-37843, CVE-2025-37985, CVE-2025-23132, CVE-2025-22073,
CVE-2025-37940, CVE-2025-23140, CVE-2025-37828, CVE-2025-22063,
CVE-2025-22053, CVE-2025-37787, CVE-2025-23152, CVE-2025-37840,
CVE-2025-22118, CVE-2025-37981, CVE-2025-22111, CVE-2025-22091,
CVE-2025-37841, CVE-2025-23142, CVE-2025-37838, CVE-2025-37775,
CVE-2025-23147, CVE-2025-22022, CVE-2025-37745, CVE-2025-37785,
CVE-2025-37821, CVE-2025-37988, CVE-2025-37986, CVE-2025-23138,
CVE-2025-37836, CVE-2025-37792, CVE-2025-23141, CVE-2025-23159,
CVE-2025-38240, CVE-2025-37764, CVE-2025-22120, CVE-2025-37881,
CVE-2025-37777, CVE-2025-37987, CVE-2025-37811, CVE-2025-22032,
CVE-2025-22044, CVE-2025-37943, CVE-2025-37802, CVE-2025-37829,
CVE-2025-37862, CVE-2025-38575, CVE-2025-37799, CVE-2025-37882,
CVE-2025-37812, CVE-2025-37765, CVE-2025-37813, CVE-2025-37980,
CVE-2025-37873, CVE-2025-37766, CVE-2025-37761, CVE-2025-37892,
CVE-2025-22094, CVE-2025-22035, CVE-2025-22055, CVE-2025-22100,
CVE-2025-37816, CVE-2025-22062, CVE-2025-22110, CVE-2025-22088,
CVE-2025-23129, CVE-2025-38479, CVE-2025-37740, CVE-2025-23136,
CVE-2025-37846, CVE-2025-23163, CVE-2025-37977, CVE-2025-37879,
CVE-2025-22082, CVE-2025-22046, CVE-2025-22050, CVE-2025-22126,
CVE-2025-37796, CVE-2025-37815, CVE-2025-22127, CVE-2025-22105,
CVE-2025-22068, CVE-2025-22119, CVE-2025-22089, CVE-2025-37858,
CVE-2025-37826, CVE-2025-37945, CVE-2025-23157, CVE-2025-22054,
CVE-2025-37805, CVE-2025-37856, CVE-2025-37878, CVE-2025-37768,
CVE-2025-22040, CVE-2025-37944, CVE-2025-37774, CVE-2025-22117,
CVE-2025-37888, CVE-2025-37857, CVE-2025-37791, CVE-2025-37817,
CVE-2025-22041, CVE-2025-37983, CVE-2025-22039, CVE-2025-37749,
CVE-2025-22097, CVE-2025-37747, CVE-2025-37762, CVE-2025-22114,
CVE-2025-37831, CVE-2025-23133, CVE-2025-22020, CVE-2025-22085,
CVE-2025-37807, CVE-2025-22059, CVE-2025-22042, CVE-2025-22123,
CVE-2025-22107, CVE-2025-37759, CVE-2024-58094, CVE-2025-40114,
CVE-2025-37810, CVE-2025-37833, CVE-2025-23134, CVE-2025-23151,
CVE-2025-37743, CVE-2025-22034, CVE-2025-37739, CVE-2025-37863,
CVE-2025-39735, CVE-2025-39930, CVE-2025-37847, CVE-2025-37803,
CVE-2025-37786, CVE-2025-22112, CVE-2025-37830, CVE-2025-22108,
CVE-2025-37767, CVE-2025-37814, CVE-2025-37798, CVE-2025-22086,
CVE-2025-37778, CVE-2024-58093, CVE-2025-37848, CVE-2025-22024,
CVE-2025-37776, CVE-2025-38104, CVE-2025-37938, CVE-2025-37861,
CVE-2025-23150, CVE-2025-22021, CVE-2025-22018, CVE-2025-23137,
CVE-2025-37756, CVE-2025-37784, CVE-2025-37769, CVE-2025-37820,
CVE-2025-37758, CVE-2025-22047, CVE-2025-37844, CVE-2025-22093,
CVE-2025-23162, CVE-2025-22051, CVE-2025-22115, CVE-2025-37845,
CVE-2025-22074, CVE-2025-37883, CVE-2025-22116, CVE-2025-37824,
CVE-2025-22052, CVE-2025-22090, CVE-2025-37750, CVE-2025-39728,
CVE-2025-23145, CVE-2025-22125, CVE-2025-37834, CVE-2025-37738,
CVE-2025-37760, CVE-2025-22079, CVE-2025-37877, CVE-2025-37849,
CVE-2025-22026, CVE-2025-37886, CVE-2025-22043, CVE-2025-22122,
CVE-2025-37937, CVE-2025-22071, CVE-2025-37742, CVE-2025-37744,
CVE-2025-22106, CVE-2025-38152, CVE-2025-37869, CVE-2025-23135,
CVE-2025-22056, CVE-2024-58095, CVE-2025-37853, CVE-2025-37770,
CVE-2025-22031, CVE-2025-23158, CVE-2025-22072, CVE-2025-22102,
CVE-2025-40325, CVE-2025-22037, CVE-2025-37876, CVE-2025-37864,
CVE-2025-37867, CVE-2025-37855, CVE-2025-37984, CVE-2025-37839,
CVE-2025-23131, CVE-2025-22121, CVE-2025-22078, CVE-2025-37800,
CVE-2025-37880, CVE-2025-37925, CVE-2025-22113, CVE-2025-22064,
CVE-2025-22057, CVE-2025-22092, CVE-2025-37780, CVE-2025-37887,
CVE-2025-22099, CVE-2025-37793, CVE-2025-37978, CVE-2025-37746)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
linux-image-6.14.0-1007-azure 6.14.0-1007.7
linux-image-6.14.0-1007-azure-fde 6.14.0-1007.7
linux-image-azure 6.14.0-1007.7
linux-image-azure-fde 6.14.0-1007.7

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7594-2
https://ubuntu.com/security/notices/USN-7594-1
CVE-2023-53034, CVE-2024-58093, CVE-2024-58094, CVE-2024-58095,
CVE-2024-58096, CVE-2024-58097, CVE-2025-22018, CVE-2025-22019,
CVE-2025-22020, CVE-2025-22021, CVE-2025-22022, CVE-2025-22023,
CVE-2025-22024, CVE-2025-22025, CVE-2025-22026, CVE-2025-22027,
CVE-2025-22028, CVE-2025-22030, CVE-2025-22031, CVE-2025-22032,
CVE-2025-22033, CVE-2025-22034, CVE-2025-22035, CVE-2025-22036,
CVE-2025-22037, CVE-2025-22038, CVE-2025-22039, CVE-2025-22040,
CVE-2025-22041, CVE-2025-22042, CVE-2025-22043, CVE-2025-22044,
CVE-2025-22045, CVE-2025-22046, CVE-2025-22047, CVE-2025-22050,
CVE-2025-22051, CVE-2025-22052, CVE-2025-22053, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22057, CVE-2025-22058,
CVE-2025-22059, CVE-2025-22060, CVE-2025-22061, CVE-2025-22062,
CVE-2025-22063, CVE-2025-22064, CVE-2025-22065, CVE-2025-22066,
CVE-2025-22067, CVE-2025-22068, CVE-2025-22069, CVE-2025-22070,
CVE-2025-22071, CVE-2025-22072, CVE-2025-22073, CVE-2025-22074,
CVE-2025-22075, CVE-2025-22076, CVE-2025-22078, CVE-2025-22079,
CVE-2025-22080, CVE-2025-22081, CVE-2025-22082, CVE-2025-22083,
CVE-2025-22084, CVE-2025-22085, CVE-2025-22086, CVE-2025-22087,
CVE-2025-22088, CVE-2025-22089, CVE-2025-22090, CVE-2025-22091,
CVE-2025-22092, CVE-2025-22093, CVE-2025-22094, CVE-2025-22095,
CVE-2025-22096, CVE-2025-22097, CVE-2025-22098, CVE-2025-22099,
CVE-2025-22100, CVE-2025-22101, CVE-2025-22102, CVE-2025-22103,
CVE-2025-22104, CVE-2025-22105, CVE-2025-22106, CVE-2025-22107,
CVE-2025-22108, CVE-2025-22109, CVE-2025-22110, CVE-2025-22111,
CVE-2025-22112, CVE-2025-22113, CVE-2025-22114, CVE-2025-22115,
CVE-2025-22116, CVE-2025-22117, CVE-2025-22118, CVE-2025-22119,
CVE-2025-22120, CVE-2025-22121, CVE-2025-22122, CVE-2025-22123,
CVE-2025-22124, CVE-2025-22125, CVE-2025-22126, CVE-2025-22127,
CVE-2025-22128, CVE-2025-23129, CVE-2025-23130, CVE-2025-23131,
CVE-2025-23132, CVE-2025-23133, CVE-2025-23134, CVE-2025-23135,
CVE-2025-23136, CVE-2025-23137, CVE-2025-23138, CVE-2025-23140,
CVE-2025-23141, CVE-2025-23142, CVE-2025-23143, CVE-2025-23144,
CVE-2025-23145, CVE-2025-23146, CVE-2025-23147, CVE-2025-23148,
CVE-2025-23149, CVE-2025-23150, CVE-2025-23151, CVE-2025-23152,
CVE-2025-23153, CVE-2025-23154, CVE-2025-23155, CVE-2025-23156,
CVE-2025-23157, CVE-2025-23158, CVE-2025-23159, CVE-2025-23160,
CVE-2025-23161, CVE-2025-23162, CVE-2025-23163, CVE-2025-37738,
CVE-2025-37739, CVE-2025-37740, CVE-2025-37741, CVE-2025-37742,
CVE-2025-37743, CVE-2025-37744, CVE-2025-37745, CVE-2025-37746,
CVE-2025-37747, CVE-2025-37748, CVE-2025-37749, CVE-2025-37750,
CVE-2025-37751, CVE-2025-37752, CVE-2025-37754, CVE-2025-37755,
CVE-2025-37756, CVE-2025-37757, CVE-2025-37758, CVE-2025-37759,
CVE-2025-37760, CVE-2025-37761, CVE-2025-37762, CVE-2025-37763,
CVE-2025-37764, CVE-2025-37765, CVE-2025-37766, CVE-2025-37767,
CVE-2025-37768, CVE-2025-37769, CVE-2025-37770, CVE-2025-37771,
CVE-2025-37772, CVE-2025-37773, CVE-2025-37774, CVE-2025-37775,
CVE-2025-37776, CVE-2025-37777, CVE-2025-37778, CVE-2025-37779,
CVE-2025-37780, CVE-2025-37781, CVE-2025-37783, CVE-2025-37784,
CVE-2025-37785, CVE-2025-37786, CVE-2025-37787, CVE-2025-37788,
CVE-2025-37789, CVE-2025-37790, CVE-2025-37791, CVE-2025-37792,
CVE-2025-37793, CVE-2025-37794, CVE-2025-37796, CVE-2025-37797,
CVE-2025-37798, CVE-2025-37799, CVE-2025-37800, CVE-2025-37801,
CVE-2025-37802, CVE-2025-37803, CVE-2025-37805, CVE-2025-37806,
CVE-2025-37807, CVE-2025-37808, CVE-2025-37809, CVE-2025-37810,
CVE-2025-37811, CVE-2025-37812, CVE-2025-37813, CVE-2025-37814,
CVE-2025-37815, CVE-2025-37816, CVE-2025-37817, CVE-2025-37819,
CVE-2025-37820, CVE-2025-37821, CVE-2025-37822, CVE-2025-37823,
CVE-2025-37824, CVE-2025-37825, CVE-2025-37826, CVE-2025-37827,
CVE-2025-37828, CVE-2025-37829, CVE-2025-37830, CVE-2025-37831,
CVE-2025-37833, CVE-2025-37834, CVE-2025-37836, CVE-2025-37837,
CVE-2025-37838, CVE-2025-37839, CVE-2025-37840, CVE-2025-37841,
CVE-2025-37842, CVE-2025-37843, CVE-2025-37844, CVE-2025-37845,
CVE-2025-37846, CVE-2025-37847, CVE-2025-37848, CVE-2025-37849,
CVE-2025-37850, CVE-2025-37851, CVE-2025-37852, CVE-2025-37853,
CVE-2025-37854, CVE-2025-37855, CVE-2025-37856, CVE-2025-37857,
CVE-2025-37858, CVE-2025-37859, CVE-2025-37860, CVE-2025-37861,
CVE-2025-37862, CVE-2025-37863, CVE-2025-37864, CVE-2025-37865,
CVE-2025-37866, CVE-2025-37867, CVE-2025-37868, CVE-2025-37869,
CVE-2025-37870, CVE-2025-37872, CVE-2025-37873, CVE-2025-37874,
CVE-2025-37875, CVE-2025-37876, CVE-2025-37877, CVE-2025-37878,
CVE-2025-37879, CVE-2025-37880, CVE-2025-37881, CVE-2025-37882,
CVE-2025-37883, CVE-2025-37884, CVE-2025-37885, CVE-2025-37886,
CVE-2025-37887, CVE-2025-37888, CVE-2025-37892, CVE-2025-37925,
CVE-2025-37937, CVE-2025-37938, CVE-2025-37939, CVE-2025-37940,
CVE-2025-37941, CVE-2025-37942, CVE-2025-37943, CVE-2025-37944,
CVE-2025-37945, CVE-2025-37975, CVE-2025-37977, CVE-2025-37978,
CVE-2025-37979, CVE-2025-37980, CVE-2025-37981, CVE-2025-37982,
CVE-2025-37983, CVE-2025-37984, CVE-2025-37985, CVE-2025-37986,
CVE-2025-37987, CVE-2025-37988, CVE-2025-37989, CVE-2025-38049,
CVE-2025-38104, CVE-2025-38152, CVE-2025-38240, CVE-2025-38479,
CVE-2025-38575, CVE-2025-38637, CVE-2025-39688, CVE-2025-39728,
CVE-2025-39735, CVE-2025-39755, CVE-2025-39778, CVE-2025-39930,
CVE-2025-39989, CVE-2025-40014, CVE-2025-40114, CVE-2025-40325

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/6.14.0-1007.7

[USN-7602-1] Linux kernel (Xilinx ZynqMP) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhdQiwFAwAAAAAACgkQZ0GeRcM5nt07
LAf+NLV/a1BsijDzYAHJN0Um05acoOrjkXXdMgBLKtzitfjM6/CQtKck0vbAeQI6hrN89pCGYDl9
cn0Cpt2zDWxYe6UOl/04SUcu2PwMORGZiY0wOe+hQQuQMU/KV1ErboB3g6rwbbn7YsAyKS0oQJQX
+JjbtdqgcPFRDyqMB7OwXjZJYbhu1FNMq78BV3tTLDwlk4+7FXJejYSeYN+vNWcBA2tJWebw1VWH
aPGbpgDcplX3/CHt+AanSIYwPvhLH+QcPPjFx/91mVSVqRoTqrgvGl5o+zlzK+Jfue8vpjVEkMfx
Z4c03prjGPvlLdnsf6J3c2/9m/ZgfjwdFN2Y/nkg0w==
=lVgJ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7602-1
June 26, 2025

linux-xilinx-zynqmp vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-xilinx-zynqmp: Linux kernel for Xilinx ZynqMP processors

Details:

Michael Randrianantenaina discovered that the Bluetooth driver in the Linux
Kernel contained an improper access control vulnerability. A nearby
attacker could use this to connect a rougue device and possibly execute
arbitrary code. (CVE-2024-8805)

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- PowerPC architecture;
- x86 architecture;
- Block layer subsystem;
- ACPI drivers;
- Network block device driver;
- Bus devices;
- Character device driver;
- TPM device driver;
- Clock framework and drivers;
- GPIO subsystem;
- GPU drivers;
- HID subsystem;
- I2C subsystem;
- InfiniBand drivers;
- Media drivers;
- NVIDIA Tegra memory controller driver;
- MemoryStick subsystem;
- Network drivers;
- Mellanox network drivers;
- NTB driver;
- PCI subsystem;
- PPS (Pulse Per Second) driver;
- PTP clock framework;
- RapidIO drivers;
- Voltage and Current Regulator drivers;
- Remote Processor subsystem;
- Real Time Clock drivers;
- SCSI subsystem;
- SLIMbus drivers;
- QCOM SoC drivers;
- Trusted Execution Environment drivers;
- Thermal drivers;
- TTY drivers;
- USB DSL drivers;
- USB Device Class drivers;
- USB core drivers;
- USB Gadget drivers;
- USB Host Controller drivers;
- Renesas USBHS Controller drivers;
- ACRN Hypervisor Service Module driver;
- File systems infrastructure;
- BTRFS file system;
- Ext4 file system;
- F2FS file system;
- JFS file system;
- Network file system (NFS) server daemon;
- NILFS2 file system;
- NTFS3 file system;
- Overlay file system;
- Proc file system;
- SMB network file system;
- UBI file system;
- KVM subsystem;
- IPv6 networking;
- L3 Master device support module;
- Netfilter;
- RDMA verbs API;
- SoC audio core drivers;
- Process Accounting mechanism;
- Padata parallel execution mechanism;
- printk logging mechanism;
- Scheduler infrastructure;
- Timer subsystem;
- Tracing infrastructure;
- Watch queue notification mechanism;
- Memory management;
- 802.1Q VLAN protocol;
- Asynchronous Transfer Mode (ATM) subsystem;
- B.A.T.M.A.N. meshing protocol;
- Bluetooth subsystem;
- Networking core;
- IPv4 networking;
- Logical Link layer;
- Multipath TCP;
- NFC subsystem;
- Open vSwitch;
- Rose network layer;
- Network traffic control;
- SMC sockets;
- Sun RPC protocol;
- Wireless networking;
- Landlock security;
- Linux Security Modules (LSM) Framework;
- Tomoyo security module;
- SoC Audio for Freescale CPUs drivers;
(CVE-2025-21647, CVE-2025-21925, CVE-2024-58034, CVE-2024-46812,
CVE-2024-56721, CVE-2025-21811, CVE-2025-21719, CVE-2025-21859,
CVE-2025-21745, CVE-2023-53034, CVE-2025-21924, CVE-2024-58052,
CVE-2024-58090, CVE-2025-21950, CVE-2025-21753, CVE-2024-57977,
CVE-2025-21910, CVE-2025-21806, CVE-2024-58063, CVE-2025-21835,
CVE-2024-58001, CVE-2025-21804, CVE-2025-21887, CVE-2024-53144,
CVE-2025-38152, CVE-2024-56599, CVE-2025-22035, CVE-2025-22045,
CVE-2025-21926, CVE-2024-58069, CVE-2025-21749, CVE-2023-52664,
CVE-2025-21779, CVE-2025-21957, CVE-2025-21877, CVE-2025-22008,
CVE-2025-21760, CVE-2025-22071, CVE-2025-22079, CVE-2024-56664,
CVE-2024-42230, CVE-2025-21748, CVE-2025-21744, CVE-2025-21758,
CVE-2025-21767, CVE-2025-21999, CVE-2025-21970, CVE-2025-21826,
CVE-2025-38637, CVE-2025-21846, CVE-2025-22073, CVE-2025-23138,
CVE-2025-22097, CVE-2025-22056, CVE-2024-58093, CVE-2025-21935,
CVE-2025-21785, CVE-2025-22010, CVE-2025-22075, CVE-2025-21948,
CVE-2025-21862, CVE-2025-38575, CVE-2025-22004, CVE-2025-22063,
CVE-2025-21905, CVE-2025-21962, CVE-2025-21912, CVE-2025-21814,
CVE-2024-58085, CVE-2025-22060, CVE-2025-21795, CVE-2024-46821,
CVE-2025-21916, CVE-2024-46753, CVE-2022-49636, CVE-2025-22055,
CVE-2025-21898, CVE-2025-21715, CVE-2024-58017, CVE-2025-21772,
CVE-2025-21718, CVE-2024-36945, CVE-2025-21762, CVE-2025-22005,
CVE-2025-21991, CVE-2024-58051, CVE-2025-21951, CVE-2025-21726,
CVE-2024-58083, CVE-2025-21909, CVE-2025-21928, CVE-2025-21992,
CVE-2024-58010, CVE-2025-39735, CVE-2025-21711, CVE-2025-21761,
CVE-2025-21844, CVE-2024-58076, CVE-2024-58079, CVE-2025-21956,
CVE-2025-21684, CVE-2025-21920, CVE-2025-21823, CVE-2025-21781,
CVE-2025-21943, CVE-2025-37937, CVE-2025-21820, CVE-2023-52927,
CVE-2024-57978, CVE-2025-21787, CVE-2025-21776, CVE-2025-21722,
CVE-2025-21866, CVE-2025-22021, CVE-2025-21782, CVE-2025-22054,
CVE-2024-58055, CVE-2025-21964, CVE-2025-21941, CVE-2024-57973,
CVE-2025-22066, CVE-2025-21708, CVE-2025-21878, CVE-2025-21799,
CVE-2025-22086, CVE-2025-21766, CVE-2025-37889, CVE-2024-58002,
CVE-2025-21791, CVE-2025-21830, CVE-2025-21858, CVE-2025-22081,
CVE-2024-57834, CVE-2024-58072, CVE-2024-57981, CVE-2025-21848,
CVE-2025-21727, CVE-2025-21765, CVE-2024-58007, CVE-2025-21963,
CVE-2024-56551, CVE-2022-49728, CVE-2025-21728, CVE-2024-58014,
CVE-2025-21994, CVE-2025-21707, CVE-2025-21735, CVE-2025-23136,
CVE-2025-21731, CVE-2024-58020, CVE-2025-21704, CVE-2024-57979,
CVE-2025-21796, CVE-2025-21975, CVE-2025-22025, CVE-2024-56608,
CVE-2025-21971, CVE-2025-21919, CVE-2025-22018, CVE-2024-26982,
CVE-2024-47726, CVE-2025-21721, CVE-2025-22044, CVE-2025-21968,
CVE-2025-21865, CVE-2025-21917, CVE-2025-21764, CVE-2024-58016,
CVE-2025-21736, CVE-2024-57986, CVE-2025-21763, CVE-2024-58005,
CVE-2025-21802, CVE-2025-21871, CVE-2025-37785, CVE-2025-21922,
CVE-2025-21959, CVE-2025-22020, CVE-2024-58086, CVE-2025-22089,
CVE-2025-22007, CVE-2025-39728, CVE-2025-22050, CVE-2025-21934,
CVE-2025-21875, CVE-2025-21996, CVE-2025-21914, CVE-2024-58071,
CVE-2024-58058, CVE-2024-57980, CVE-2025-21904, CVE-2025-21981,
CVE-2024-53168, CVE-2025-22014)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1050-xilinx-zynqmp 5.15.0-1050.54
linux-image-xilinx-zynqmp 5.15.0.1050.53

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7602-1
CVE-2022-49636, CVE-2022-49728, CVE-2023-52664, CVE-2023-52927,
CVE-2023-53034, CVE-2024-26982, CVE-2024-36945, CVE-2024-42230,
CVE-2024-46753, CVE-2024-46812, CVE-2024-46821, CVE-2024-47726,
CVE-2024-53144, CVE-2024-53168, CVE-2024-56551, CVE-2024-56599,
CVE-2024-56608, CVE-2024-56664, CVE-2024-56721, CVE-2024-57834,
CVE-2024-57973, CVE-2024-57977, CVE-2024-57978, CVE-2024-57979,
CVE-2024-57980, CVE-2024-57981, CVE-2024-57986, CVE-2024-58001,
CVE-2024-58002, CVE-2024-58005, CVE-2024-58007, CVE-2024-58010,
CVE-2024-58014, CVE-2024-58016, CVE-2024-58017, CVE-2024-58020,
CVE-2024-58034, CVE-2024-58051, CVE-2024-58052, CVE-2024-58055,
CVE-2024-58058, CVE-2024-58063, CVE-2024-58069, CVE-2024-58071,
CVE-2024-58072, CVE-2024-58076, CVE-2024-58079, CVE-2024-58083,
CVE-2024-58085, CVE-2024-58086, CVE-2024-58090, CVE-2024-58093,
CVE-2024-8805, CVE-2025-21647, CVE-2025-21684, CVE-2025-21704,
CVE-2025-21707, CVE-2025-21708, CVE-2025-21711, CVE-2025-21715,
CVE-2025-21718, CVE-2025-21719, CVE-2025-21721, CVE-2025-21722,
CVE-2025-21726, CVE-2025-21727, CVE-2025-21728, CVE-2025-21731,
CVE-2025-21735, CVE-2025-21736, CVE-2025-21744, CVE-2025-21745,
CVE-2025-21748, CVE-2025-21749, CVE-2025-21753, CVE-2025-21758,
CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763,
CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767,
CVE-2025-21772, CVE-2025-21776, CVE-2025-21779, CVE-2025-21781,
CVE-2025-21782, CVE-2025-21785, CVE-2025-21787, CVE-2025-21791,
CVE-2025-21795, CVE-2025-21796, CVE-2025-21799, CVE-2025-21802,
CVE-2025-21804, CVE-2025-21806, CVE-2025-21811, CVE-2025-21814,
CVE-2025-21820, CVE-2025-21823, CVE-2025-21826, CVE-2025-21830,
CVE-2025-21835, CVE-2025-21844, CVE-2025-21846, CVE-2025-21848,
CVE-2025-21858, CVE-2025-21859, CVE-2025-21862, CVE-2025-21865,
CVE-2025-21866, CVE-2025-21871, CVE-2025-21875, CVE-2025-21877,
CVE-2025-21878, CVE-2025-21887, CVE-2025-21898, CVE-2025-21904,
CVE-2025-21905, CVE-2025-21909, CVE-2025-21910, CVE-2025-21912,
CVE-2025-21914, CVE-2025-21916, CVE-2025-21917, CVE-2025-21919,
CVE-2025-21920, CVE-2025-21922, CVE-2025-21924, CVE-2025-21925,
CVE-2025-21926, CVE-2025-21928, CVE-2025-21934, CVE-2025-21935,
CVE-2025-21941, CVE-2025-21943, CVE-2025-21948, CVE-2025-21950,
CVE-2025-21951, CVE-2025-21956, CVE-2025-21957, CVE-2025-21959,
CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-21968,
CVE-2025-21970, CVE-2025-21971, CVE-2025-21975, CVE-2025-21981,
CVE-2025-21991, CVE-2025-21992, CVE-2025-21994, CVE-2025-21996,
CVE-2025-21999, CVE-2025-22004, CVE-2025-22005, CVE-2025-22007,
CVE-2025-22008, CVE-2025-22010, CVE-2025-22014, CVE-2025-22018,
CVE-2025-22020, CVE-2025-22021, CVE-2025-22025, CVE-2025-22035,
CVE-2025-22044, CVE-2025-22045, CVE-2025-22050, CVE-2025-22054,
CVE-2025-22055, CVE-2025-22056, CVE-2025-22060, CVE-2025-22063,
CVE-2025-22066, CVE-2025-22071, CVE-2025-22073, CVE-2025-22075,
CVE-2025-22079, CVE-2025-22081, CVE-2025-22086, CVE-2025-22089,
CVE-2025-22097, CVE-2025-2312, CVE-2025-23136, CVE-2025-23138,
CVE-2025-37785, CVE-2025-37889, CVE-2025-37937, CVE-2025-38152,
CVE-2025-38575, CVE-2025-38637, CVE-2025-39728, CVE-2025-39735

Package Information:
https://launchpad.net/ubuntu/+source/linux-xilinx-zynqmp/5.15.0-1050.54

[USN-7595-4] Linux kernel vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhdQhkFAwAAAAAACgkQZ0GeRcM5nt3i
7Af/Wz5Xo/3b2J1MrSF10hzvS99RlTaW1nDZBzs7G3ygTjg1HQyfCaWIApAX4y/4+XnaQRl7AQvY
LaZ+hl1PHDetxTssUuSfJjA5SrC9V0ISjLh1nm4W4VC44J3WHk8vHXZaPeNTaE26wG3Bii8MY7Jk
LS2072AxTOESImQfdkAfOMh7vMdrLJ1KTSQ5WV3LosKKNHCPaiDbVU1OfEP1kN8U9oLRtJcFSOdl
yT0kiV/cRvGiPHXzjRBO/JtYdZmNhnjw2bJuehn+ud9gD158K+hErmzuJp/U02o+9hYBkaNXUrke
fuctA5fbKX/i8dgfH78EgVTUwJupevChKEtOGLn7BQ==
=Leoe
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7595-4
June 26, 2025

linux-oracle, linux-oracle-6.8, linux-raspi vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-oracle-6.8: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the CIFS network file system implementation in the
Linux kernel did not properly verify the target namespace when handling
upcalls. An attacker could use this to expose sensitive information.
(CVE-2025-2312)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPIO subsystem;
- GPU drivers;
- InfiniBand drivers;
- IRQ chip drivers;
- Network drivers;
- Mellanox network drivers;
- i.MX PM domains;
- SCSI subsystem;
- USB Serial drivers;
- AFS file system;
- GFS2 file system;
- File systems infrastructure;
- File system notification infrastructure;
- Overlay file system;
- Proc file system;
- SMB network file system;
- Timer subsystem;
- Kernel CPU control infrastructure;
- Memory management;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Open vSwitch;
- Network traffic control;
- VMware vSockets driver;
(CVE-2025-21943, CVE-2025-21672, CVE-2024-57952, CVE-2024-57949,
CVE-2025-21683, CVE-2025-21690, CVE-2025-21699, CVE-2025-21676,
CVE-2024-57924, CVE-2025-21694, CVE-2024-57948, CVE-2025-21675,
CVE-2024-57951, CVE-2025-21692, CVE-2025-21684, CVE-2025-21668,
CVE-2025-21665, CVE-2025-21667, CVE-2025-21670, CVE-2025-21674,
CVE-2025-21697, CVE-2024-53124, CVE-2025-21666, CVE-2025-21682,
CVE-2025-21680, CVE-2025-21681, CVE-2025-21691, CVE-2025-21669,
CVE-2025-21673, CVE-2024-50157, CVE-2025-21689, CVE-2025-21678)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1027-oracle 6.8.0-1027.28
linux-image-6.8.0-1027-oracle-64k 6.8.0-1027.28
linux-image-6.8.0-1029-raspi 6.8.0-1029.33
linux-image-oracle 6.8.0-1027.28
linux-image-oracle-64k 6.8.0-1027.28
linux-image-oracle-64k-lts-24.04 6.8.0-1027.28
linux-image-oracle-lts-24.04 6.8.0-1027.28
linux-image-raspi 6.8.0-1029.33

Ubuntu 22.04 LTS
linux-image-6.8.0-1027-oracle 6.8.0-1027.28~22.04.1
linux-image-6.8.0-1027-oracle-64k 6.8.0-1027.28~22.04.1
linux-image-oracle 6.8.0-1027.28~22.04.1
linux-image-oracle-64k 6.8.0-1027.28~22.04.1

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7595-4
https://ubuntu.com/security/notices/USN-7595-3
https://ubuntu.com/security/notices/USN-7595-2
https://ubuntu.com/security/notices/USN-7595-1
CVE-2024-50157, CVE-2024-53124, CVE-2024-57924, CVE-2024-57948,
CVE-2024-57949, CVE-2024-57951, CVE-2024-57952, CVE-2025-21665,
CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669,
CVE-2025-21670, CVE-2025-21672, CVE-2025-21673, CVE-2025-21674,
CVE-2025-21675, CVE-2025-21676, CVE-2025-21678, CVE-2025-21680,
CVE-2025-21681, CVE-2025-21682, CVE-2025-21683, CVE-2025-21684,
CVE-2025-21689, CVE-2025-21690, CVE-2025-21691, CVE-2025-21692,
CVE-2025-21694, CVE-2025-21697, CVE-2025-21699, CVE-2025-21943,
CVE-2025-2312

Package Information:
https://launchpad.net/ubuntu/+source/linux-oracle/6.8.0-1027.28
https://launchpad.net/ubuntu/+source/linux-raspi/6.8.0-1029.33
https://launchpad.net/ubuntu/+source/linux-oracle-6.8/6.8.0-1027.28~22.04.1

Wednesday, June 25, 2025

[USN-7599-1] urllib3 vulnerabilities

==========================================================================
Ubuntu Security Notice USN-7599-1
June 25, 2025

python-urllib3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.04
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

urllib3 could be made to expose sensitive information over the network.

Software Description:
- python-urllib3: HTTP library with thread-safe connection pooling

Details:

Jacob Sandum discovered that urllib3 handled redirects even when they were
explicitly disabled while using the PoolManager. An attacker could possibly
use this issue to obtain sensitive information. (CVE-2025-50181)

Illia Volochii discovered that urllib3 incorrectly handled retry and
redirect parameters when using Node.js. An attacker could possibly use this
issue to obtain sensitive information. This issue only affected Ubuntu
25.04. (CVE-2025-50182)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.04
python3-urllib3 2.3.0-2ubuntu0.1

Ubuntu 24.10
python3-urllib3 2.0.7-2ubuntu0.2

Ubuntu 24.04 LTS
python3-urllib3 2.0.7-1ubuntu0.2

Ubuntu 22.04 LTS
python3-urllib3 1.26.5-1~exp1ubuntu0.3

Ubuntu 20.04 LTS
python3-urllib3 1.25.8-2ubuntu0.4+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python-urllib3 1.22-1ubuntu0.18.04.2+esm3
Available with Ubuntu Pro
python3-urllib3 1.22-1ubuntu0.18.04.2+esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-urllib3 1.13.1-2ubuntu0.16.04.4+esm3
Available with Ubuntu Pro
python3-urllib3 1.13.1-2ubuntu0.16.04.4+esm3
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7599-1
CVE-2025-50181, CVE-2025-50182

Package Information:
https://launchpad.net/ubuntu/+source/python-urllib3/2.3.0-2ubuntu0.1
https://launchpad.net/ubuntu/+source/python-urllib3/2.0.7-2ubuntu0.2
https://launchpad.net/ubuntu/+source/python-urllib3/2.0.7-1ubuntu0.2
https://launchpad.net/ubuntu/+source/python-urllib3/1.26.5-1~exp1ubuntu0.3

[USN-7596-2] Linux kernel (Azure, N-Series) vulnerabilities

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmhcOl8FAwAAAAAACgkQZ0GeRcM5nt1r
gwf+Od9UZTeRl4/tpQBeUCywm1F0O0RtoV4vsA5N7JcvHiR2Jb6CsnFMkkSVwRKSJpBku+5f+ea8
ipQUKELd5ufLbOXbauexUMbkza+kz86bv5MlpIvFC4WcQ3e58ENqIJcu+EUKtVlmpG2lBrnTi2wn
CfxdI7F31mS88DGfPKdchdX4sJntIOQBb3s5pSSfn6BFFXpac/St/SnYD4HeqGn+/vuGTaG7crVd
ydprCh/inlJPG549inQXFxBqHSh7M4ElAeme3zjiwmQjLFd9HyEkH4TyvgIWGgFTzgIbQoS6mkxM
ymfGX6hVdMN3L5Kiadrmo9i8O4eVuSAYTf1xwwwgZQ==
=iJi3
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7596-2
June 25, 2025

linux-azure-nvidia vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-azure-nvidia: Linux kernel for Microsoft Azure Cloud systems, N-Series

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- GPIO subsystem;
- GPU drivers;
- InfiniBand drivers;
- IRQ chip drivers;
- Network drivers;
- Mellanox network drivers;
- i.MX PM domains;
- SCSI subsystem;
- USB Serial drivers;
- AFS file system;
- GFS2 file system;
- File systems infrastructure;
- File system notification infrastructure;
- Overlay file system;
- Proc file system;
- SMB network file system;
- Timer subsystem;
- Kernel CPU control infrastructure;
- Memory management;
- Networking core;
- DCCP (Datagram Congestion Control Protocol);
- IPv6 networking;
- IEEE 802.15.4 subsystem;
- Open vSwitch;
- Network traffic control;
- VMware vSockets driver;
(CVE-2025-21675, CVE-2025-21697, CVE-2025-21668, CVE-2024-57951,
CVE-2025-21680, CVE-2024-50157, CVE-2025-21699, CVE-2025-21669,
CVE-2025-21678, CVE-2025-21665, CVE-2024-57924, CVE-2024-57949,
CVE-2024-53124, CVE-2025-21684, CVE-2025-21676, CVE-2025-21672,
CVE-2025-21682, CVE-2025-21670, CVE-2025-21690, CVE-2025-21673,
CVE-2025-21691, CVE-2024-57952, CVE-2025-21674, CVE-2025-21689,
CVE-2025-21943, CVE-2025-21692, CVE-2025-21667, CVE-2025-21666,
CVE-2024-57948, CVE-2025-21694, CVE-2025-21683, CVE-2025-21681)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
linux-image-6.8.0-1018-azure-nvidia 6.8.0-1018.19
linux-image-azure-nvidia 6.8.0-1018.19

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-7596-2
https://ubuntu.com/security/notices/USN-7596-1
CVE-2024-50157, CVE-2024-53124, CVE-2024-57924, CVE-2024-57948,
CVE-2024-57949, CVE-2024-57951, CVE-2024-57952, CVE-2025-21665,
CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669,
CVE-2025-21670, CVE-2025-21672, CVE-2025-21673, CVE-2025-21674,
CVE-2025-21675, CVE-2025-21676, CVE-2025-21678, CVE-2025-21680,
CVE-2025-21681, CVE-2025-21682, CVE-2025-21683, CVE-2025-21684,
CVE-2025-21689, CVE-2025-21690, CVE-2025-21691, CVE-2025-21692,
CVE-2025-21694, CVE-2025-21697, CVE-2025-21699, CVE-2025-21943

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure-nvidia/6.8.0-1018.19