-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEYrygdx1GDec9TV8EZ0GeRcM5nt0FAmijmqEFAwAAAAAACgkQZ0GeRcM5nt27
IAgApTl1g6sohx8Nj4F5oRHb0fsgXZivySOl+rO6sK9rqyfn++uOX7nnnWLfhGjjs58mbjTVUeE+
vPm5Tz1/alhWos4SMZ1a9cMZu05+J5egfcTAZSWE8kq3nA7ssP7voXMZwkeR0L7+jAeZZhDTUwcQ
M3vMuSLiZe0yWE3dMyUUiAINsagDEg4ZG+0OSQud9JkLQ15FQKm0aR6NA3y23hbnLijNny1wMXcv
QnUWnDInuFMoEhEYx9ILT5vLWq8Mmi4DFHB1DxuXi4vs46TmzzkbNdacihMaTbbfEVL8MR5KtAyB
t1yG1iUx+QZeytmaPQPCYwTyD1LitFTjOMheR7DIDg==
=VwIy
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7699-1
August 18, 2025
linux, linux-aws, linux-aws-6.14, linux-gcp, linux-gcp-6.14, linux-oracle,
linux-oracle-6.14, linux-raspi, linux-realtime vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle: Linux kernel for Oracle Cloud systems
- linux-raspi: Linux kernel for Raspberry Pi systems
- linux-realtime: Linux kernel for Real-time systems
- linux-aws-6.14: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp-6.14: Linux kernel for Google Cloud Platform (GCP) systems
- linux-oracle-6.14: Linux kernel for Oracle Cloud systems
Details:
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- ARM64 architecture;
- RISC-V architecture;
- x86 architecture;
- Buffer Sharing and Synchronization framework;
- DMA engine subsystem;
- GPU drivers;
- HID subsystem;
- IIO ADC drivers;
- IIO subsystem;
- InfiniBand drivers;
- Input Device core drivers;
- Network drivers;
- Mellanox network drivers;
- PHY drivers;
- Voltage and Current Regulator drivers;
- VideoCore services drivers;
- USB Type-C Connector System Software Interface driver;
- Xen hypervisor drivers;
- EROFS file system;
- Network file system (NFS) client;
- File systems infrastructure;
- SMB network file system;
- Network traffic control;
- io_uring subsystem;
- Kernel command line parsing driver;
- Scheduler infrastructure;
- Memory management;
- Networking core;
- MAC80211 subsystem;
- Management Component Transport Protocol (MCTP);
- Netfilter;
- Open vSwitch;
- TLS protocol;
- Wireless networking;
- SOF drivers;
(CVE-2025-38011, CVE-2025-38095, CVE-2025-37967, CVE-2025-38012,
CVE-2025-38019, CVE-2025-37960, CVE-2025-37973, CVE-2025-37958,
CVE-2025-38094, CVE-2025-37963, CVE-2025-37955, CVE-2025-38014,
CVE-2025-38025, CVE-2025-37970, CVE-2025-37947, CVE-2025-37966,
CVE-2025-37948, CVE-2025-38013, CVE-2025-37957, CVE-2025-38028,
CVE-2025-37962, CVE-2025-38002, CVE-2025-37996, CVE-2025-37992,
CVE-2025-37969, CVE-2025-38009, CVE-2025-38027, CVE-2025-38020,
CVE-2025-38023, CVE-2025-38008, CVE-2025-38015, CVE-2025-37954,
CVE-2025-38007, CVE-2025-38005, CVE-2025-37956, CVE-2025-37965,
CVE-2025-37972, CVE-2025-38006, CVE-2025-37971, CVE-2025-38056,
CVE-2025-37968, CVE-2025-38024, CVE-2025-37951, CVE-2025-38016,
CVE-2025-38022, CVE-2025-37964, CVE-2025-37994, CVE-2025-37952,
CVE-2025-37998, CVE-2025-37993, CVE-2025-38018, CVE-2025-38010,
CVE-2025-37995, CVE-2025-38021, CVE-2025-37999, CVE-2025-37961,
CVE-2025-37959, CVE-2025-37950, CVE-2025-37949)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
linux-image-6.14.0-1010-realtime 6.14.0-1010.10
linux-image-6.14.0-1011-aws 6.14.0-1011.11
linux-image-6.14.0-1011-aws-64k 6.14.0-1011.11
linux-image-6.14.0-1011-oracle 6.14.0-1011.11
linux-image-6.14.0-1011-oracle-64k 6.14.0-1011.11
linux-image-6.14.0-1012-raspi 6.14.0-1012.12
linux-image-6.14.0-1014-gcp 6.14.0-1014.15
linux-image-6.14.0-1014-gcp-64k 6.14.0-1014.15
linux-image-6.14.0-28-generic 6.14.0-28.28
linux-image-6.14.0-28-generic-64k 6.14.0-28.28
linux-image-aws 6.14.0-1011.11
linux-image-aws-6.14 6.14.0-1011.11
linux-image-aws-64k 6.14.0-1011.11
linux-image-aws-64k-6.14 6.14.0-1011.11
linux-image-gcp 6.14.0-1014.15
linux-image-gcp-6.14 6.14.0-1014.15
linux-image-gcp-64k 6.14.0-1014.15
linux-image-gcp-64k-6.14 6.14.0-1014.15
linux-image-generic 6.14.0-28.28
linux-image-generic-6.14 6.14.0-28.28
linux-image-generic-64k 6.14.0-28.28
linux-image-generic-64k-6.14 6.14.0-28.28
linux-image-oem-24.04 6.14.0-28.28
linux-image-oem-24.04a 6.14.0-28.28
linux-image-oracle 6.14.0-1011.11
linux-image-oracle-6.14 6.14.0-1011.11
linux-image-oracle-64k 6.14.0-1011.11
linux-image-oracle-64k-6.14 6.14.0-1011.11
linux-image-raspi 6.14.0-1012.12
linux-image-raspi-6.14 6.14.0-1012.12
linux-image-realtime 6.14.0-1010.10
linux-image-realtime-6.14 6.14.0-1010.10
linux-image-virtual 6.14.0-28.28
linux-image-virtual-6.14 6.14.0-28.28
Ubuntu 24.04 LTS
linux-image-6.14.0-1011-aws 6.14.0-1011.11~24.04.1
linux-image-6.14.0-1011-aws-64k 6.14.0-1011.11~24.04.1
linux-image-6.14.0-1011-oracle 6.14.0-1011.11~24.04.1
linux-image-6.14.0-1011-oracle-64k 6.14.0-1011.11~24.04.1
linux-image-6.14.0-1014-gcp 6.14.0-1014.15~24.04.1
linux-image-6.14.0-1014-gcp-64k 6.14.0-1014.15~24.04.1
linux-image-aws 6.14.0-1011.11~24.04.1
linux-image-aws-6.14 6.14.0-1011.11~24.04.1
linux-image-aws-64k 6.14.0-1011.11~24.04.1
linux-image-aws-64k-6.14 6.14.0-1011.11~24.04.1
linux-image-gcp 6.14.0-1014.15~24.04.1
linux-image-gcp-6.14 6.14.0-1014.15~24.04.1
linux-image-gcp-64k 6.14.0-1014.15~24.04.1
linux-image-gcp-64k-6.14 6.14.0-1014.15~24.04.1
linux-image-oracle 6.14.0-1011.11~24.04.1
linux-image-oracle-6.14 6.14.0-1011.11~24.04.1
linux-image-oracle-64k 6.14.0-1011.11~24.04.1
linux-image-oracle-64k-6.14 6.14.0-1011.11~24.04.1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://ubuntu.com/security/notices/USN-7699-1
CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37950,
CVE-2025-37951, CVE-2025-37952, CVE-2025-37954, CVE-2025-37955,
CVE-2025-37956, CVE-2025-37957, CVE-2025-37958, CVE-2025-37959,
CVE-2025-37960, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963,
CVE-2025-37964, CVE-2025-37965, CVE-2025-37966, CVE-2025-37967,
CVE-2025-37968, CVE-2025-37969, CVE-2025-37970, CVE-2025-37971,
CVE-2025-37972, CVE-2025-37973, CVE-2025-37992, CVE-2025-37993,
CVE-2025-37994, CVE-2025-37995, CVE-2025-37996, CVE-2025-37998,
CVE-2025-37999, CVE-2025-38002, CVE-2025-38005, CVE-2025-38006,
CVE-2025-38007, CVE-2025-38008, CVE-2025-38009, CVE-2025-38010,
CVE-2025-38011, CVE-2025-38012, CVE-2025-38013, CVE-2025-38014,
CVE-2025-38015, CVE-2025-38016, CVE-2025-38018, CVE-2025-38019,
CVE-2025-38020, CVE-2025-38021, CVE-2025-38022, CVE-2025-38023,
CVE-2025-38024, CVE-2025-38025, CVE-2025-38027, CVE-2025-38028,
CVE-2025-38056, CVE-2025-38094, CVE-2025-38095
Package Information:
https://launchpad.net/ubuntu/+source/linux/6.14.0-28.28
https://launchpad.net/ubuntu/+source/linux-aws/6.14.0-1011.11
https://launchpad.net/ubuntu/+source/linux-gcp/6.14.0-1014.15
https://launchpad.net/ubuntu/+source/linux-oracle/6.14.0-1011.11
https://launchpad.net/ubuntu/+source/linux-raspi/6.14.0-1012.12
https://launchpad.net/ubuntu/+source/linux-realtime/6.14.0-1010.10
https://launchpad.net/ubuntu/+source/linux-aws-6.14/6.14.0-1011.11~24.04.1
https://launchpad.net/ubuntu/+source/linux-gcp-6.14/6.14.0-1014.15~24.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-6.14/6.14.0-1011.11~24.04.1
No comments:
Post a Comment